]> git.proxmox.com Git - mirror_ovs.git/blame - lib/netdev-native-tnl.c
doc: Remove final markdown references
[mirror_ovs.git] / lib / netdev-native-tnl.c
CommitLineData
6b241d64
PS
1/*
2 * Copyright (c) 2016 Nicira, Inc.
68da36fe 3 * Copyright (c) 2016 Red Hat, Inc.
6b241d64
PS
4 *
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at:
8 *
9 * http://www.apache.org/licenses/LICENSE-2.0
10 *
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
16 */
17
18#include <config.h>
19
aca40d4f
TLSC
20#include "netdev-native-tnl.h"
21
6b241d64
PS
22#include <errno.h>
23#include <fcntl.h>
24#include <sys/socket.h>
25#include <net/if.h>
67eaddc0 26#include <netinet/in.h>
aca40d4f 27#include <netinet/ip.h>
6b241d64
PS
28#include <netinet/ip6.h>
29#include <sys/ioctl.h>
30
31#include <errno.h>
32#include <stdlib.h>
33#include <sys/time.h>
34
6b241d64
PS
35#include "byte-order.h"
36#include "csum.h"
6b241d64 37#include "dp-packet.h"
aca40d4f 38#include "netdev.h"
6b241d64
PS
39#include "netdev-vport.h"
40#include "netdev-vport-private.h"
41#include "odp-netlink.h"
6b241d64 42#include "packets.h"
aca40d4f 43#include "seq.h"
6b241d64
PS
44#include "unaligned.h"
45#include "unixctl.h"
aca40d4f 46#include "openvswitch/vlog.h"
6b241d64
PS
47
48VLOG_DEFINE_THIS_MODULE(native_tnl);
49static struct vlog_rate_limit err_rl = VLOG_RATE_LIMIT_INIT(60, 5);
50
51#define VXLAN_HLEN (sizeof(struct udp_header) + \
52 sizeof(struct vxlanhdr))
53
54#define GENEVE_BASE_HLEN (sizeof(struct udp_header) + \
55 sizeof(struct genevehdr))
56
57uint16_t tnl_udp_port_min = 32768;
58uint16_t tnl_udp_port_max = 61000;
59
60void *
61netdev_tnl_ip_extract_tnl_md(struct dp_packet *packet, struct flow_tnl *tnl,
62 unsigned int *hlen)
63{
64 void *nh;
65 struct ip_header *ip;
66 struct ovs_16aligned_ip6_hdr *ip6;
67 void *l4;
68 int l3_size;
69
70 nh = dp_packet_l3(packet);
71 ip = nh;
72 ip6 = nh;
73 l4 = dp_packet_l4(packet);
74
75 if (!nh || !l4) {
76 return NULL;
77 }
78
79 *hlen = sizeof(struct eth_header);
80
81 l3_size = dp_packet_size(packet) -
82 ((char *)nh - (char *)dp_packet_data(packet));
83
84 if (IP_VER(ip->ip_ihl_ver) == 4) {
85
86 ovs_be32 ip_src, ip_dst;
87
88 if (csum(ip, IP_IHL(ip->ip_ihl_ver) * 4)) {
89 VLOG_WARN_RL(&err_rl, "ip packet has invalid checksum");
90 return NULL;
91 }
92
93 if (ntohs(ip->ip_tot_len) > l3_size) {
94 VLOG_WARN_RL(&err_rl, "ip packet is truncated (IP length %d, actual %d)",
95 ntohs(ip->ip_tot_len), l3_size);
96 return NULL;
97 }
98 if (IP_IHL(ip->ip_ihl_ver) * 4 > sizeof(struct ip_header)) {
99 VLOG_WARN_RL(&err_rl, "ip options not supported on tunnel packets "
100 "(%d bytes)", IP_IHL(ip->ip_ihl_ver) * 4);
101 return NULL;
102 }
103
104 ip_src = get_16aligned_be32(&ip->ip_src);
105 ip_dst = get_16aligned_be32(&ip->ip_dst);
106
107 tnl->ip_src = ip_src;
108 tnl->ip_dst = ip_dst;
109 tnl->ip_tos = ip->ip_tos;
110 tnl->ip_ttl = ip->ip_ttl;
111
112 *hlen += IP_HEADER_LEN;
113
114 } else if (IP_VER(ip->ip_ihl_ver) == 6) {
98c086db 115 ovs_be32 tc_flow = get_16aligned_be32(&ip6->ip6_flow);
6b241d64
PS
116
117 memcpy(tnl->ipv6_src.s6_addr, ip6->ip6_src.be16, sizeof ip6->ip6_src);
118 memcpy(tnl->ipv6_dst.s6_addr, ip6->ip6_dst.be16, sizeof ip6->ip6_dst);
98c086db
PS
119
120 tnl->ip_tos = ntohl(tc_flow) >> 20;
6b241d64
PS
121 tnl->ip_ttl = ip6->ip6_hlim;
122
123 *hlen += IPV6_HEADER_LEN;
124
125 } else {
126 VLOG_WARN_RL(&err_rl, "ipv4 packet has invalid version (%d)",
127 IP_VER(ip->ip_ihl_ver));
128 return NULL;
129 }
130
131 return l4;
132}
133
134/* Pushes the 'size' bytes of 'header' into the headroom of 'packet',
135 * reallocating the packet if necessary. 'header' should contain an Ethernet
136 * header, followed by an IPv4 header (without options), and an L4 header.
137 *
138 * This function sets the IP header's ip_tot_len field (which should be zeroed
139 * as part of 'header') and puts its value into '*ip_tot_size' as well. Also
140 * updates IP header checksum.
141 *
142 * Return pointer to the L4 header added to 'packet'. */
143void *
144netdev_tnl_push_ip_header(struct dp_packet *packet,
145 const void *header, int size, int *ip_tot_size)
146{
147 struct eth_header *eth;
148 struct ip_header *ip;
149 struct ovs_16aligned_ip6_hdr *ip6;
150
151 eth = dp_packet_push_uninit(packet, size);
152 *ip_tot_size = dp_packet_size(packet) - sizeof (struct eth_header);
153
154 memcpy(eth, header, size);
155
156 if (netdev_tnl_is_header_ipv6(header)) {
157 ip6 = netdev_tnl_ipv6_hdr(eth);
158 *ip_tot_size -= IPV6_HEADER_LEN;
159 ip6->ip6_plen = htons(*ip_tot_size);
160 return ip6 + 1;
161 } else {
162 ip = netdev_tnl_ip_hdr(eth);
163 ip->ip_tot_len = htons(*ip_tot_size);
164 ip->ip_csum = recalc_csum16(ip->ip_csum, 0, ip->ip_tot_len);
165 *ip_tot_size -= IP_HEADER_LEN;
166 return ip + 1;
167 }
168}
169
170static void *
171udp_extract_tnl_md(struct dp_packet *packet, struct flow_tnl *tnl,
172 unsigned int *hlen)
173{
174 struct udp_header *udp;
175
176 udp = netdev_tnl_ip_extract_tnl_md(packet, tnl, hlen);
177 if (!udp) {
178 return NULL;
179 }
180
181 if (udp->udp_csum) {
182 uint32_t csum;
183 if (netdev_tnl_is_header_ipv6(dp_packet_data(packet))) {
184 csum = packet_csum_pseudoheader6(dp_packet_l3(packet));
185 } else {
186 csum = packet_csum_pseudoheader(dp_packet_l3(packet));
187 }
188
189 csum = csum_continue(csum, udp, dp_packet_size(packet) -
190 ((const unsigned char *)udp -
191 (const unsigned char *)dp_packet_l2(packet)));
192 if (csum_finish(csum)) {
193 return NULL;
194 }
195 tnl->flags |= FLOW_TNL_F_CSUM;
196 }
197
198 tnl->tp_src = udp->udp_src;
199 tnl->tp_dst = udp->udp_dst;
200
201 return udp + 1;
202}
203
204
205void
206netdev_tnl_push_udp_header(struct dp_packet *packet,
207 const struct ovs_action_push_tnl *data)
208{
209 struct udp_header *udp;
210 int ip_tot_size;
211
212 udp = netdev_tnl_push_ip_header(packet, data->header, data->header_len, &ip_tot_size);
213
214 /* set udp src port */
215 udp->udp_src = netdev_tnl_get_src_port(packet);
216 udp->udp_len = htons(ip_tot_size);
217
218 if (udp->udp_csum) {
219 uint32_t csum;
220 if (netdev_tnl_is_header_ipv6(dp_packet_data(packet))) {
221 csum = packet_csum_pseudoheader6(netdev_tnl_ipv6_hdr(dp_packet_data(packet)));
222 } else {
223 csum = packet_csum_pseudoheader(netdev_tnl_ip_hdr(dp_packet_data(packet)));
224 }
225
226 csum = csum_continue(csum, udp, ip_tot_size);
227 udp->udp_csum = csum_finish(csum);
228
229 if (!udp->udp_csum) {
230 udp->udp_csum = htons(0xffff);
231 }
232 }
233}
234
235static void *
4975aa3e
PS
236eth_build_header(struct ovs_action_push_tnl *data,
237 const struct netdev_tnl_build_header_params *params)
6b241d64 238{
4975aa3e
PS
239 uint16_t eth_proto = params->is_ipv6 ? ETH_TYPE_IPV6 : ETH_TYPE_IP;
240 struct eth_header *eth;
6b241d64 241
4975aa3e 242 memset(data->header, 0, sizeof data->header);
6b241d64 243
4975aa3e
PS
244 eth = (struct eth_header *)data->header;
245 eth->eth_dst = params->dmac;
246 eth->eth_src = params->smac;
247 eth->eth_type = htons(eth_proto);
248 data->header_len = sizeof(struct eth_header);
249 return eth + 1;
250}
6b241d64 251
4975aa3e
PS
252void *
253netdev_tnl_ip_build_header(struct ovs_action_push_tnl *data,
254 const struct netdev_tnl_build_header_params *params,
255 uint8_t next_proto)
256{
257 void *l3;
258
259 l3 = eth_build_header(data, params);
260 if (!params->is_ipv6) {
261 ovs_be32 ip_src = in6_addr_get_mapped_ipv4(params->s_ip);
262 struct ip_header *ip;
263
264 ip = (struct ip_header *) l3;
265
266 ip->ip_ihl_ver = IP_IHL_VER(5, 4);
267 ip->ip_tos = params->flow->tunnel.ip_tos;
268 ip->ip_ttl = params->flow->tunnel.ip_ttl;
269 ip->ip_proto = next_proto;
270 put_16aligned_be32(&ip->ip_src, ip_src);
271 put_16aligned_be32(&ip->ip_dst, params->flow->tunnel.ip_dst);
272
273 ip->ip_frag_off = (params->flow->tunnel.flags & FLOW_TNL_F_DONT_FRAGMENT) ?
274 htons(IP_DF) : 0;
275
ece9c294 276 /* Checksum has already been zeroed by eth_build_header. */
4975aa3e
PS
277 ip->ip_csum = csum(ip, sizeof *ip);
278
279 data->header_len += IP_HEADER_LEN;
280 return ip + 1;
6b241d64 281 } else {
4975aa3e
PS
282 struct ovs_16aligned_ip6_hdr *ip6;
283
284 ip6 = (struct ovs_16aligned_ip6_hdr *) l3;
285
98c086db
PS
286 put_16aligned_be32(&ip6->ip6_flow, htonl(6 << 28) |
287 htonl(params->flow->tunnel.ip_tos << 20));
4975aa3e
PS
288 ip6->ip6_hlim = params->flow->tunnel.ip_ttl;
289 ip6->ip6_nxt = next_proto;
290 memcpy(&ip6->ip6_src, params->s_ip, sizeof(ovs_be32[4]));
291 memcpy(&ip6->ip6_dst, &params->flow->tunnel.ipv6_dst, sizeof(ovs_be32[4]));
292
293 data->header_len += IPV6_HEADER_LEN;
294 return ip6 + 1;
6b241d64 295 }
4975aa3e
PS
296}
297
298static void *
299udp_build_header(struct netdev_tunnel_config *tnl_cfg,
300 struct ovs_action_push_tnl *data,
301 const struct netdev_tnl_build_header_params *params)
302{
303 struct udp_header *udp;
6b241d64 304
4975aa3e 305 udp = netdev_tnl_ip_build_header(data, params, IPPROTO_UDP);
6b241d64
PS
306 udp->udp_dst = tnl_cfg->dst_port;
307
4975aa3e 308 if (params->is_ipv6 || params->flow->tunnel.flags & FLOW_TNL_F_CSUM) {
6b241d64
PS
309 /* Write a value in now to mark that we should compute the checksum
310 * later. 0xffff is handy because it is transparent to the
311 * calculation. */
312 udp->udp_csum = htons(0xffff);
313 }
4975aa3e 314 data->header_len += sizeof *udp;
6b241d64
PS
315 return udp + 1;
316}
317
318static int
319gre_header_len(ovs_be16 flags)
320{
321 int hlen = 4;
322
323 if (flags & htons(GRE_CSUM)) {
324 hlen += 4;
325 }
326 if (flags & htons(GRE_KEY)) {
327 hlen += 4;
328 }
329 if (flags & htons(GRE_SEQ)) {
330 hlen += 4;
331 }
332 return hlen;
333}
334
335static int
336parse_gre_header(struct dp_packet *packet,
337 struct flow_tnl *tnl)
338{
339 const struct gre_base_hdr *greh;
340 ovs_16aligned_be32 *options;
341 int hlen;
342 unsigned int ulen;
343
344 greh = netdev_tnl_ip_extract_tnl_md(packet, tnl, &ulen);
345 if (!greh) {
346 return -EINVAL;
347 }
348
349 if (greh->flags & ~(htons(GRE_CSUM | GRE_KEY | GRE_SEQ))) {
350 return -EINVAL;
351 }
352
353 if (greh->protocol != htons(ETH_TYPE_TEB)) {
354 return -EINVAL;
355 }
356
357 hlen = ulen + gre_header_len(greh->flags);
358 if (hlen > dp_packet_size(packet)) {
359 return -EINVAL;
360 }
361
362 options = (ovs_16aligned_be32 *)(greh + 1);
363 if (greh->flags & htons(GRE_CSUM)) {
364 ovs_be16 pkt_csum;
365
366 pkt_csum = csum(greh, dp_packet_size(packet) -
367 ((const unsigned char *)greh -
368 (const unsigned char *)dp_packet_l2(packet)));
369 if (pkt_csum) {
370 return -EINVAL;
371 }
372 tnl->flags = FLOW_TNL_F_CSUM;
373 options++;
374 }
375
376 if (greh->flags & htons(GRE_KEY)) {
3d75c660 377 tnl->tun_id = be32_to_be64(get_16aligned_be32(options));
6b241d64
PS
378 tnl->flags |= FLOW_TNL_F_KEY;
379 options++;
380 }
381
382 if (greh->flags & htons(GRE_SEQ)) {
383 options++;
384 }
385
386 return hlen;
387}
388
1c8f98d9 389struct dp_packet *
6b241d64
PS
390netdev_gre_pop_header(struct dp_packet *packet)
391{
392 struct pkt_metadata *md = &packet->md;
393 struct flow_tnl *tnl = &md->tunnel;
394 int hlen = sizeof(struct eth_header) + 4;
395
396 hlen += netdev_tnl_is_header_ipv6(dp_packet_data(packet)) ?
397 IPV6_HEADER_LEN : IP_HEADER_LEN;
398
399 pkt_metadata_init_tnl(md);
400 if (hlen > dp_packet_size(packet)) {
1c8f98d9 401 goto err;
6b241d64
PS
402 }
403
404 hlen = parse_gre_header(packet, tnl);
405 if (hlen < 0) {
1c8f98d9 406 goto err;
6b241d64
PS
407 }
408
409 dp_packet_reset_packet(packet, hlen);
410
1c8f98d9
PS
411 return packet;
412err:
413 dp_packet_delete(packet);
414 return NULL;
6b241d64
PS
415}
416
417void
418netdev_gre_push_header(struct dp_packet *packet,
419 const struct ovs_action_push_tnl *data)
420{
421 struct gre_base_hdr *greh;
422 int ip_tot_size;
423
424 greh = netdev_tnl_push_ip_header(packet, data->header, data->header_len, &ip_tot_size);
425
426 if (greh->flags & htons(GRE_CSUM)) {
427 ovs_be16 *csum_opt = (ovs_be16 *) (greh + 1);
428 *csum_opt = csum(greh, ip_tot_size);
429 }
430}
431
432int
433netdev_gre_build_header(const struct netdev *netdev,
434 struct ovs_action_push_tnl *data,
4975aa3e 435 const struct netdev_tnl_build_header_params *params)
6b241d64
PS
436{
437 struct netdev_vport *dev = netdev_vport_cast(netdev);
438 struct netdev_tunnel_config *tnl_cfg;
6b241d64
PS
439 struct gre_base_hdr *greh;
440 ovs_16aligned_be32 *options;
4975aa3e 441 unsigned int hlen;
6b241d64
PS
442
443 /* XXX: RCUfy tnl_cfg. */
444 ovs_mutex_lock(&dev->mutex);
445 tnl_cfg = &dev->tnl_cfg;
446
4975aa3e 447 greh = netdev_tnl_ip_build_header(data, params, IPPROTO_GRE);
6b241d64
PS
448
449 greh->protocol = htons(ETH_TYPE_TEB);
450 greh->flags = 0;
451
452 options = (ovs_16aligned_be32 *) (greh + 1);
4975aa3e 453 if (params->flow->tunnel.flags & FLOW_TNL_F_CSUM) {
6b241d64
PS
454 greh->flags |= htons(GRE_CSUM);
455 put_16aligned_be32(options, 0);
456 options++;
457 }
458
459 if (tnl_cfg->out_key_present) {
460 greh->flags |= htons(GRE_KEY);
3d75c660 461 put_16aligned_be32(options, be64_to_be32(params->flow->tunnel.tun_id));
6b241d64
PS
462 options++;
463 }
464
465 ovs_mutex_unlock(&dev->mutex);
466
467 hlen = (uint8_t *) options - (uint8_t *) greh;
468
4975aa3e 469 data->header_len += hlen;
6b241d64
PS
470 data->tnl_type = OVS_VPORT_TYPE_GRE;
471 return 0;
472}
473
1c8f98d9 474struct dp_packet *
6b241d64
PS
475netdev_vxlan_pop_header(struct dp_packet *packet)
476{
477 struct pkt_metadata *md = &packet->md;
478 struct flow_tnl *tnl = &md->tunnel;
479 struct vxlanhdr *vxh;
480 unsigned int hlen;
481
482 pkt_metadata_init_tnl(md);
483 if (VXLAN_HLEN > dp_packet_l4_size(packet)) {
1c8f98d9 484 goto err;
6b241d64
PS
485 }
486
487 vxh = udp_extract_tnl_md(packet, tnl, &hlen);
488 if (!vxh) {
1c8f98d9 489 goto err;
6b241d64
PS
490 }
491
492 if (get_16aligned_be32(&vxh->vx_flags) != htonl(VXLAN_FLAGS) ||
493 (get_16aligned_be32(&vxh->vx_vni) & htonl(0xff))) {
494 VLOG_WARN_RL(&err_rl, "invalid vxlan flags=%#x vni=%#x\n",
495 ntohl(get_16aligned_be32(&vxh->vx_flags)),
496 ntohl(get_16aligned_be32(&vxh->vx_vni)));
1c8f98d9 497 goto err;
6b241d64
PS
498 }
499 tnl->tun_id = htonll(ntohl(get_16aligned_be32(&vxh->vx_vni)) >> 8);
500 tnl->flags |= FLOW_TNL_F_KEY;
501
502 dp_packet_reset_packet(packet, hlen + VXLAN_HLEN);
503
1c8f98d9
PS
504 return packet;
505err:
506 dp_packet_delete(packet);
507 return NULL;
6b241d64
PS
508}
509
510int
511netdev_vxlan_build_header(const struct netdev *netdev,
512 struct ovs_action_push_tnl *data,
4975aa3e 513 const struct netdev_tnl_build_header_params *params)
6b241d64
PS
514{
515 struct netdev_vport *dev = netdev_vport_cast(netdev);
516 struct netdev_tunnel_config *tnl_cfg;
517 struct vxlanhdr *vxh;
6b241d64
PS
518
519 /* XXX: RCUfy tnl_cfg. */
520 ovs_mutex_lock(&dev->mutex);
521 tnl_cfg = &dev->tnl_cfg;
522
4975aa3e 523 vxh = udp_build_header(tnl_cfg, data, params);
6b241d64
PS
524
525 put_16aligned_be32(&vxh->vx_flags, htonl(VXLAN_FLAGS));
4975aa3e 526 put_16aligned_be32(&vxh->vx_vni, htonl(ntohll(params->flow->tunnel.tun_id) << 8));
6b241d64
PS
527
528 ovs_mutex_unlock(&dev->mutex);
4975aa3e 529 data->header_len += sizeof *vxh;
6b241d64
PS
530 data->tnl_type = OVS_VPORT_TYPE_VXLAN;
531 return 0;
532}
533
1c8f98d9 534struct dp_packet *
6b241d64
PS
535netdev_geneve_pop_header(struct dp_packet *packet)
536{
537 struct pkt_metadata *md = &packet->md;
538 struct flow_tnl *tnl = &md->tunnel;
539 struct genevehdr *gnh;
540 unsigned int hlen, opts_len, ulen;
541
542 pkt_metadata_init_tnl(md);
543 if (GENEVE_BASE_HLEN > dp_packet_l4_size(packet)) {
544 VLOG_WARN_RL(&err_rl, "geneve packet too small: min header=%u packet size=%"PRIuSIZE"\n",
545 (unsigned int)GENEVE_BASE_HLEN, dp_packet_l4_size(packet));
1c8f98d9 546 goto err;
6b241d64
PS
547 }
548
549 gnh = udp_extract_tnl_md(packet, tnl, &ulen);
550 if (!gnh) {
1c8f98d9 551 goto err;
6b241d64
PS
552 }
553
554 opts_len = gnh->opt_len * 4;
555 hlen = ulen + GENEVE_BASE_HLEN + opts_len;
556 if (hlen > dp_packet_size(packet)) {
557 VLOG_WARN_RL(&err_rl, "geneve packet too small: header len=%u packet size=%u\n",
558 hlen, dp_packet_size(packet));
1c8f98d9 559 goto err;
6b241d64
PS
560 }
561
562 if (gnh->ver != 0) {
563 VLOG_WARN_RL(&err_rl, "unknown geneve version: %"PRIu8"\n", gnh->ver);
1c8f98d9 564 goto err;
6b241d64
PS
565 }
566
567 if (gnh->proto_type != htons(ETH_TYPE_TEB)) {
568 VLOG_WARN_RL(&err_rl, "unknown geneve encapsulated protocol: %#x\n",
569 ntohs(gnh->proto_type));
1c8f98d9 570 goto err;
6b241d64
PS
571 }
572
573 tnl->flags |= gnh->oam ? FLOW_TNL_F_OAM : 0;
574 tnl->tun_id = htonll(ntohl(get_16aligned_be32(&gnh->vni)) >> 8);
575 tnl->flags |= FLOW_TNL_F_KEY;
576
577 memcpy(tnl->metadata.opts.gnv, gnh->options, opts_len);
578 tnl->metadata.present.len = opts_len;
579 tnl->flags |= FLOW_TNL_F_UDPIF;
580
581 dp_packet_reset_packet(packet, hlen);
582
1c8f98d9
PS
583 return packet;
584err:
585 dp_packet_delete(packet);
586 return NULL;
6b241d64
PS
587}
588
589int
590netdev_geneve_build_header(const struct netdev *netdev,
591 struct ovs_action_push_tnl *data,
4975aa3e 592 const struct netdev_tnl_build_header_params *params)
6b241d64
PS
593{
594 struct netdev_vport *dev = netdev_vport_cast(netdev);
595 struct netdev_tunnel_config *tnl_cfg;
596 struct genevehdr *gnh;
597 int opt_len;
598 bool crit_opt;
6b241d64
PS
599
600 /* XXX: RCUfy tnl_cfg. */
601 ovs_mutex_lock(&dev->mutex);
602 tnl_cfg = &dev->tnl_cfg;
603
4975aa3e 604 gnh = udp_build_header(tnl_cfg, data, params);
6b241d64 605
4975aa3e 606 put_16aligned_be32(&gnh->vni, htonl(ntohll(params->flow->tunnel.tun_id) << 8));
6b241d64
PS
607
608 ovs_mutex_unlock(&dev->mutex);
609
4975aa3e 610 opt_len = tun_metadata_to_geneve_header(&params->flow->tunnel,
6b241d64
PS
611 gnh->options, &crit_opt);
612
613 gnh->opt_len = opt_len / 4;
4975aa3e 614 gnh->oam = !!(params->flow->tunnel.flags & FLOW_TNL_F_OAM);
6b241d64
PS
615 gnh->critical = crit_opt ? 1 : 0;
616 gnh->proto_type = htons(ETH_TYPE_TEB);
617
4975aa3e 618 data->header_len += sizeof *gnh + opt_len;
6b241d64
PS
619 data->tnl_type = OVS_VPORT_TYPE_GENEVE;
620 return 0;
621}
622
623\f
624void
625netdev_tnl_egress_port_range(struct unixctl_conn *conn, int argc,
626 const char *argv[], void *aux OVS_UNUSED)
627{
628 int val1, val2;
629
630 if (argc < 3) {
631 struct ds ds = DS_EMPTY_INITIALIZER;
632
633 ds_put_format(&ds, "Tunnel UDP source port range: %"PRIu16"-%"PRIu16"\n",
634 tnl_udp_port_min, tnl_udp_port_max);
635
636 unixctl_command_reply(conn, ds_cstr(&ds));
637 ds_destroy(&ds);
638 return;
639 }
640
641 if (argc != 3) {
642 return;
643 }
644
645 val1 = atoi(argv[1]);
646 if (val1 <= 0 || val1 > UINT16_MAX) {
647 unixctl_command_reply(conn, "Invalid min.");
648 return;
649 }
650 val2 = atoi(argv[2]);
651 if (val2 <= 0 || val2 > UINT16_MAX) {
652 unixctl_command_reply(conn, "Invalid max.");
653 return;
654 }
655
656 if (val1 > val2) {
657 tnl_udp_port_min = val2;
658 tnl_udp_port_max = val1;
659 } else {
660 tnl_udp_port_min = val1;
661 tnl_udp_port_max = val2;
662 }
663 seq_change(tnl_conf_seq);
664
665 unixctl_command_reply(conn, "OK");
666}