]>
Commit | Line | Data |
---|---|---|
f094af7b | 1 | /* |
e60e935b | 2 | * Copyright (c) 2009, 2010, 2011, 2012, 2013, 2014, 2015 Nicira, Inc. |
f094af7b SH |
3 | * Copyright (c) 2013 Simon Horman |
4 | * | |
5 | * Licensed under the Apache License, Version 2.0 (the "License"); | |
6 | * you may not use this file except in compliance with the License. | |
7 | * You may obtain a copy of the License at: | |
8 | * | |
9 | * http://www.apache.org/licenses/LICENSE-2.0 | |
10 | * | |
11 | * Unless required by applicable law or agreed to in writing, software | |
12 | * distributed under the License is distributed on an "AS IS" BASIS, | |
13 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |
14 | * See the License for the specific language governing permissions and | |
15 | * limitations under the License. | |
16 | */ | |
17 | ||
18 | #include <config.h> | |
19 | #include "odp-execute.h" | |
6d670e7f | 20 | #include <arpa/inet.h> |
1368af0c | 21 | #include <netinet/in.h> |
e60e935b | 22 | #include <netinet/icmp6.h> |
6d670e7f | 23 | #include <netinet/ip6.h> |
f094af7b SH |
24 | #include <stdlib.h> |
25 | #include <string.h> | |
26 | ||
e14deea0 | 27 | #include "dp-packet.h" |
758c456d | 28 | #include "dpif.h" |
f094af7b | 29 | #include "netlink.h" |
837eefc7 | 30 | #include "odp-netlink.h" |
6c13071b | 31 | #include "odp-util.h" |
f094af7b | 32 | #include "packets.h" |
c6bf49f3 | 33 | #include "flow.h" |
f6c8a6b1 | 34 | #include "unaligned.h" |
f094af7b SH |
35 | #include "util.h" |
36 | ||
6d670e7f | 37 | /* Masked copy of an ethernet address. 'src' is already properly masked. */ |
f094af7b | 38 | static void |
74ff3298 JR |
39 | ether_addr_copy_masked(struct eth_addr *dst, const struct eth_addr src, |
40 | const struct eth_addr mask) | |
6d670e7f JR |
41 | { |
42 | int i; | |
43 | ||
74ff3298 JR |
44 | for (i = 0; i < ARRAY_SIZE(dst->be16); i++) { |
45 | dst->be16[i] = src.be16[i] | (dst->be16[i] & ~mask.be16[i]); | |
6d670e7f JR |
46 | } |
47 | } | |
48 | ||
49 | static void | |
cf62fa4c | 50 | odp_eth_set_addrs(struct dp_packet *packet, const struct ovs_key_ethernet *key, |
6d670e7f | 51 | const struct ovs_key_ethernet *mask) |
f094af7b | 52 | { |
cf62fa4c | 53 | struct eth_header *eh = dp_packet_l2(packet); |
f094af7b | 54 | |
cf3b7538 | 55 | if (eh) { |
6d670e7f | 56 | if (!mask) { |
74ff3298 JR |
57 | eh->eth_src = key->eth_src; |
58 | eh->eth_dst = key->eth_dst; | |
6d670e7f | 59 | } else { |
74ff3298 JR |
60 | ether_addr_copy_masked(&eh->eth_src, key->eth_src, mask->eth_src); |
61 | ether_addr_copy_masked(&eh->eth_dst, key->eth_dst, mask->eth_dst); | |
6d670e7f | 62 | } |
cf3b7538 | 63 | } |
f094af7b SH |
64 | } |
65 | ||
6d670e7f | 66 | static void |
cf62fa4c | 67 | odp_set_ipv4(struct dp_packet *packet, const struct ovs_key_ipv4 *key, |
6d670e7f JR |
68 | const struct ovs_key_ipv4 *mask) |
69 | { | |
cf62fa4c | 70 | struct ip_header *nh = dp_packet_l3(packet); |
6d670e7f JR |
71 | |
72 | packet_set_ipv4( | |
73 | packet, | |
74 | key->ipv4_src | (get_16aligned_be32(&nh->ip_src) & ~mask->ipv4_src), | |
75 | key->ipv4_dst | (get_16aligned_be32(&nh->ip_dst) & ~mask->ipv4_dst), | |
76 | key->ipv4_tos | (nh->ip_tos & ~mask->ipv4_tos), | |
77 | key->ipv4_ttl | (nh->ip_ttl & ~mask->ipv4_ttl)); | |
78 | } | |
79 | ||
80 | static const ovs_be32 * | |
81 | mask_ipv6_addr(const ovs_16aligned_be32 *old, const ovs_be32 *addr, | |
82 | const ovs_be32 *mask, ovs_be32 *masked) | |
83 | { | |
84 | for (int i = 0; i < 4; i++) { | |
85 | masked[i] = addr[i] | (get_16aligned_be32(&old[i]) & ~mask[i]); | |
86 | } | |
87 | ||
88 | return masked; | |
89 | } | |
90 | ||
91 | static void | |
cf62fa4c | 92 | odp_set_ipv6(struct dp_packet *packet, const struct ovs_key_ipv6 *key, |
6d670e7f JR |
93 | const struct ovs_key_ipv6 *mask) |
94 | { | |
cf62fa4c | 95 | struct ovs_16aligned_ip6_hdr *nh = dp_packet_l3(packet); |
6d670e7f JR |
96 | ovs_be32 sbuf[4], dbuf[4]; |
97 | uint8_t old_tc = ntohl(get_16aligned_be32(&nh->ip6_flow)) >> 20; | |
98 | ovs_be32 old_fl = get_16aligned_be32(&nh->ip6_flow) & htonl(0xfffff); | |
99 | ||
100 | packet_set_ipv6( | |
101 | packet, | |
6d670e7f JR |
102 | mask_ipv6_addr(nh->ip6_src.be32, key->ipv6_src, mask->ipv6_src, sbuf), |
103 | mask_ipv6_addr(nh->ip6_dst.be32, key->ipv6_dst, mask->ipv6_dst, dbuf), | |
104 | key->ipv6_tclass | (old_tc & ~mask->ipv6_tclass), | |
105 | key->ipv6_label | (old_fl & ~mask->ipv6_label), | |
106 | key->ipv6_hlimit | (nh->ip6_hlim & ~mask->ipv6_hlimit)); | |
107 | } | |
108 | ||
109 | static void | |
cf62fa4c | 110 | odp_set_tcp(struct dp_packet *packet, const struct ovs_key_tcp *key, |
6d670e7f JR |
111 | const struct ovs_key_tcp *mask) |
112 | { | |
cf62fa4c | 113 | struct tcp_header *th = dp_packet_l4(packet); |
6d670e7f | 114 | |
cf62fa4c | 115 | if (OVS_LIKELY(th && dp_packet_get_tcp_payload(packet))) { |
b8778a0d JR |
116 | packet_set_tcp_port(packet, |
117 | key->tcp_src | (th->tcp_src & ~mask->tcp_src), | |
118 | key->tcp_dst | (th->tcp_dst & ~mask->tcp_dst)); | |
119 | } | |
6d670e7f JR |
120 | } |
121 | ||
122 | static void | |
cf62fa4c | 123 | odp_set_udp(struct dp_packet *packet, const struct ovs_key_udp *key, |
6d670e7f JR |
124 | const struct ovs_key_udp *mask) |
125 | { | |
cf62fa4c | 126 | struct udp_header *uh = dp_packet_l4(packet); |
6d670e7f | 127 | |
cf62fa4c | 128 | if (OVS_LIKELY(uh && dp_packet_get_udp_payload(packet))) { |
b8778a0d JR |
129 | packet_set_udp_port(packet, |
130 | key->udp_src | (uh->udp_src & ~mask->udp_src), | |
131 | key->udp_dst | (uh->udp_dst & ~mask->udp_dst)); | |
132 | } | |
6d670e7f JR |
133 | } |
134 | ||
135 | static void | |
cf62fa4c | 136 | odp_set_sctp(struct dp_packet *packet, const struct ovs_key_sctp *key, |
6d670e7f JR |
137 | const struct ovs_key_sctp *mask) |
138 | { | |
cf62fa4c | 139 | struct sctp_header *sh = dp_packet_l4(packet); |
6d670e7f | 140 | |
cf62fa4c | 141 | if (OVS_LIKELY(sh && dp_packet_get_sctp_payload(packet))) { |
b8778a0d JR |
142 | packet_set_sctp_port(packet, |
143 | key->sctp_src | (sh->sctp_src & ~mask->sctp_src), | |
144 | key->sctp_dst | (sh->sctp_dst & ~mask->sctp_dst)); | |
145 | } | |
6d670e7f JR |
146 | } |
147 | ||
f094af7b | 148 | static void |
6c13071b SH |
149 | odp_set_tunnel_action(const struct nlattr *a, struct flow_tnl *tun_key) |
150 | { | |
151 | enum odp_key_fitness fitness; | |
152 | ||
8d8ab6c2 | 153 | fitness = odp_tun_key_from_attr(a, tun_key); |
6c13071b SH |
154 | ovs_assert(fitness != ODP_FIT_ERROR); |
155 | } | |
156 | ||
f6c8a6b1 | 157 | static void |
cf62fa4c | 158 | set_arp(struct dp_packet *packet, const struct ovs_key_arp *key, |
6d670e7f | 159 | const struct ovs_key_arp *mask) |
f6c8a6b1 | 160 | { |
cf62fa4c | 161 | struct arp_eth_header *arp = dp_packet_l3(packet); |
f6c8a6b1 | 162 | |
6d670e7f JR |
163 | if (!mask) { |
164 | arp->ar_op = key->arp_op; | |
74ff3298 | 165 | arp->ar_sha = key->arp_sha; |
6d670e7f | 166 | put_16aligned_be32(&arp->ar_spa, key->arp_sip); |
74ff3298 | 167 | arp->ar_tha = key->arp_tha; |
6d670e7f JR |
168 | put_16aligned_be32(&arp->ar_tpa, key->arp_tip); |
169 | } else { | |
170 | ovs_be32 ar_spa = get_16aligned_be32(&arp->ar_spa); | |
171 | ovs_be32 ar_tpa = get_16aligned_be32(&arp->ar_tpa); | |
172 | ||
173 | arp->ar_op = key->arp_op | (arp->ar_op & ~mask->arp_op); | |
74ff3298 | 174 | ether_addr_copy_masked(&arp->ar_sha, key->arp_sha, mask->arp_sha); |
6d670e7f JR |
175 | put_16aligned_be32(&arp->ar_spa, |
176 | key->arp_sip | (ar_spa & ~mask->arp_sip)); | |
74ff3298 | 177 | ether_addr_copy_masked(&arp->ar_tha, key->arp_tha, mask->arp_tha); |
6d670e7f JR |
178 | put_16aligned_be32(&arp->ar_tpa, |
179 | key->arp_tip | (ar_tpa & ~mask->arp_tip)); | |
180 | } | |
f6c8a6b1 BP |
181 | } |
182 | ||
e60e935b | 183 | static void |
cf62fa4c | 184 | odp_set_nd(struct dp_packet *packet, const struct ovs_key_nd *key, |
e60e935b SRCSA |
185 | const struct ovs_key_nd *mask) |
186 | { | |
cf62fa4c PS |
187 | const struct ovs_nd_msg *ns = dp_packet_l4(packet); |
188 | const struct ovs_nd_opt *nd_opt = dp_packet_get_nd_payload(packet); | |
e60e935b SRCSA |
189 | |
190 | if (OVS_LIKELY(ns && nd_opt)) { | |
cf62fa4c | 191 | int bytes_remain = dp_packet_l4_size(packet) - sizeof(*ns); |
e60e935b | 192 | ovs_be32 tgt_buf[4]; |
74ff3298 JR |
193 | struct eth_addr sll_buf = eth_addr_zero; |
194 | struct eth_addr tll_buf = eth_addr_zero; | |
e60e935b SRCSA |
195 | |
196 | while (bytes_remain >= ND_OPT_LEN && nd_opt->nd_opt_len != 0) { | |
197 | if (nd_opt->nd_opt_type == ND_OPT_SOURCE_LINKADDR | |
198 | && nd_opt->nd_opt_len == 1) { | |
74ff3298 JR |
199 | sll_buf = nd_opt->nd_opt_mac; |
200 | ether_addr_copy_masked(&sll_buf, key->nd_sll, mask->nd_sll); | |
e60e935b SRCSA |
201 | |
202 | /* A packet can only contain one SLL or TLL option */ | |
203 | break; | |
204 | } else if (nd_opt->nd_opt_type == ND_OPT_TARGET_LINKADDR | |
205 | && nd_opt->nd_opt_len == 1) { | |
74ff3298 JR |
206 | tll_buf = nd_opt->nd_opt_mac; |
207 | ether_addr_copy_masked(&tll_buf, key->nd_tll, mask->nd_tll); | |
e60e935b SRCSA |
208 | |
209 | /* A packet can only contain one SLL or TLL option */ | |
210 | break; | |
211 | } | |
212 | ||
213 | nd_opt += nd_opt->nd_opt_len; | |
214 | bytes_remain -= nd_opt->nd_opt_len * ND_OPT_LEN; | |
215 | } | |
216 | ||
217 | packet_set_nd(packet, | |
218 | mask_ipv6_addr(ns->target.be32, | |
219 | key->nd_target, mask->nd_target, tgt_buf), | |
220 | sll_buf, | |
221 | tll_buf); | |
222 | } | |
223 | } | |
224 | ||
6c13071b | 225 | static void |
e14deea0 | 226 | odp_execute_set_action(struct dp_packet *packet, const struct nlattr *a) |
f094af7b SH |
227 | { |
228 | enum ovs_key_attr type = nl_attr_type(a); | |
229 | const struct ovs_key_ipv4 *ipv4_key; | |
230 | const struct ovs_key_ipv6 *ipv6_key; | |
41ccaa24 | 231 | struct pkt_metadata *md = &packet->md; |
f094af7b SH |
232 | |
233 | switch (type) { | |
234 | case OVS_KEY_ATTR_PRIORITY: | |
09f9da0b | 235 | md->skb_priority = nl_attr_get_u32(a); |
6c13071b SH |
236 | break; |
237 | ||
f094af7b | 238 | case OVS_KEY_ATTR_TUNNEL: |
09f9da0b | 239 | odp_set_tunnel_action(a, &md->tunnel); |
6c13071b SH |
240 | break; |
241 | ||
f094af7b | 242 | case OVS_KEY_ATTR_SKB_MARK: |
09f9da0b | 243 | md->pkt_mark = nl_attr_get_u32(a); |
f094af7b SH |
244 | break; |
245 | ||
246 | case OVS_KEY_ATTR_ETHERNET: | |
cf62fa4c | 247 | odp_eth_set_addrs(packet, nl_attr_get(a), NULL); |
f094af7b SH |
248 | break; |
249 | ||
250 | case OVS_KEY_ATTR_IPV4: | |
251 | ipv4_key = nl_attr_get_unspec(a, sizeof(struct ovs_key_ipv4)); | |
cf62fa4c | 252 | packet_set_ipv4(packet, ipv4_key->ipv4_src, |
91088554 DDP |
253 | ipv4_key->ipv4_dst, ipv4_key->ipv4_tos, |
254 | ipv4_key->ipv4_ttl); | |
f094af7b SH |
255 | break; |
256 | ||
257 | case OVS_KEY_ATTR_IPV6: | |
258 | ipv6_key = nl_attr_get_unspec(a, sizeof(struct ovs_key_ipv6)); | |
31a9a584 | 259 | packet_set_ipv6(packet, ipv6_key->ipv6_src, ipv6_key->ipv6_dst, |
91088554 DDP |
260 | ipv6_key->ipv6_tclass, ipv6_key->ipv6_label, |
261 | ipv6_key->ipv6_hlimit); | |
f094af7b SH |
262 | break; |
263 | ||
264 | case OVS_KEY_ATTR_TCP: | |
cf62fa4c | 265 | if (OVS_LIKELY(dp_packet_get_tcp_payload(packet))) { |
b8778a0d JR |
266 | const struct ovs_key_tcp *tcp_key |
267 | = nl_attr_get_unspec(a, sizeof(struct ovs_key_tcp)); | |
268 | ||
cf62fa4c | 269 | packet_set_tcp_port(packet, tcp_key->tcp_src, |
b8778a0d JR |
270 | tcp_key->tcp_dst); |
271 | } | |
f094af7b SH |
272 | break; |
273 | ||
2b06df54 | 274 | case OVS_KEY_ATTR_UDP: |
cf62fa4c | 275 | if (OVS_LIKELY(dp_packet_get_udp_payload(packet))) { |
b8778a0d JR |
276 | const struct ovs_key_udp *udp_key |
277 | = nl_attr_get_unspec(a, sizeof(struct ovs_key_udp)); | |
278 | ||
cf62fa4c | 279 | packet_set_udp_port(packet, udp_key->udp_src, |
b8778a0d JR |
280 | udp_key->udp_dst); |
281 | } | |
f094af7b SH |
282 | break; |
283 | ||
c6bcb685 | 284 | case OVS_KEY_ATTR_SCTP: |
cf62fa4c | 285 | if (OVS_LIKELY(dp_packet_get_sctp_payload(packet))) { |
b8778a0d JR |
286 | const struct ovs_key_sctp *sctp_key |
287 | = nl_attr_get_unspec(a, sizeof(struct ovs_key_sctp)); | |
288 | ||
cf62fa4c | 289 | packet_set_sctp_port(packet, sctp_key->sctp_src, |
b8778a0d JR |
290 | sctp_key->sctp_dst); |
291 | } | |
c6bcb685 JS |
292 | break; |
293 | ||
2b06df54 | 294 | case OVS_KEY_ATTR_MPLS: |
cf62fa4c | 295 | set_mpls_lse(packet, nl_attr_get_be32(a)); |
6d670e7f | 296 | break; |
f094af7b | 297 | |
f6c8a6b1 | 298 | case OVS_KEY_ATTR_ARP: |
cf62fa4c | 299 | set_arp(packet, nl_attr_get(a), NULL); |
f6c8a6b1 BP |
300 | break; |
301 | ||
f6ecf944 JP |
302 | case OVS_KEY_ATTR_ICMP: |
303 | case OVS_KEY_ATTR_ICMPV6: | |
304 | if (OVS_LIKELY(dp_packet_get_icmp_payload(packet))) { | |
305 | const struct ovs_key_icmp *icmp_key | |
306 | = nl_attr_get_unspec(a, sizeof(struct ovs_key_icmp)); | |
307 | ||
308 | packet_set_icmp(packet, icmp_key->icmp_type, icmp_key->icmp_code); | |
309 | } | |
310 | break; | |
311 | ||
e60e935b | 312 | case OVS_KEY_ATTR_ND: |
cf62fa4c | 313 | if (OVS_LIKELY(dp_packet_get_nd_payload(packet))) { |
e60e935b SRCSA |
314 | const struct ovs_key_nd *nd_key |
315 | = nl_attr_get_unspec(a, sizeof(struct ovs_key_nd)); | |
74ff3298 JR |
316 | packet_set_nd(packet, nd_key->nd_target, nd_key->nd_sll, |
317 | nd_key->nd_tll); | |
e60e935b SRCSA |
318 | } |
319 | break; | |
320 | ||
572f732a | 321 | case OVS_KEY_ATTR_DP_HASH: |
61a2647e | 322 | md->dp_hash = nl_attr_get_u32(a); |
572f732a AZ |
323 | break; |
324 | ||
325 | case OVS_KEY_ATTR_RECIRC_ID: | |
326 | md->recirc_id = nl_attr_get_u32(a); | |
327 | break; | |
328 | ||
2b06df54 JS |
329 | case OVS_KEY_ATTR_UNSPEC: |
330 | case OVS_KEY_ATTR_ENCAP: | |
331 | case OVS_KEY_ATTR_ETHERTYPE: | |
332 | case OVS_KEY_ATTR_IN_PORT: | |
333 | case OVS_KEY_ATTR_VLAN: | |
dc235f7f | 334 | case OVS_KEY_ATTR_TCP_FLAGS: |
07659514 JS |
335 | case OVS_KEY_ATTR_CT_STATE: |
336 | case OVS_KEY_ATTR_CT_ZONE: | |
8e53fe8c | 337 | case OVS_KEY_ATTR_CT_MARK: |
9daf2348 | 338 | case OVS_KEY_ATTR_CT_LABELS: |
2b06df54 JS |
339 | case __OVS_KEY_ATTR_MAX: |
340 | default: | |
428b2edd | 341 | OVS_NOT_REACHED(); |
f094af7b SH |
342 | } |
343 | } | |
344 | ||
6d670e7f JR |
345 | #define get_mask(a, type) ((const type *)(const void *)(a + 1) + 1) |
346 | ||
347 | static void | |
e14deea0 | 348 | odp_execute_masked_set_action(struct dp_packet *packet, |
41ccaa24 | 349 | const struct nlattr *a) |
6d670e7f | 350 | { |
41ccaa24 | 351 | struct pkt_metadata *md = &packet->md; |
6d670e7f JR |
352 | enum ovs_key_attr type = nl_attr_type(a); |
353 | struct mpls_hdr *mh; | |
354 | ||
355 | switch (type) { | |
356 | case OVS_KEY_ATTR_PRIORITY: | |
357 | md->skb_priority = nl_attr_get_u32(a) | |
358 | | (md->skb_priority & ~*get_mask(a, uint32_t)); | |
359 | break; | |
360 | ||
361 | case OVS_KEY_ATTR_SKB_MARK: | |
362 | md->pkt_mark = nl_attr_get_u32(a) | |
363 | | (md->pkt_mark & ~*get_mask(a, uint32_t)); | |
364 | break; | |
365 | ||
366 | case OVS_KEY_ATTR_ETHERNET: | |
cf62fa4c | 367 | odp_eth_set_addrs(packet, nl_attr_get(a), |
6d670e7f JR |
368 | get_mask(a, struct ovs_key_ethernet)); |
369 | break; | |
370 | ||
371 | case OVS_KEY_ATTR_IPV4: | |
cf62fa4c | 372 | odp_set_ipv4(packet, nl_attr_get(a), |
6d670e7f JR |
373 | get_mask(a, struct ovs_key_ipv4)); |
374 | break; | |
375 | ||
376 | case OVS_KEY_ATTR_IPV6: | |
cf62fa4c | 377 | odp_set_ipv6(packet, nl_attr_get(a), |
6d670e7f JR |
378 | get_mask(a, struct ovs_key_ipv6)); |
379 | break; | |
380 | ||
381 | case OVS_KEY_ATTR_TCP: | |
cf62fa4c | 382 | odp_set_tcp(packet, nl_attr_get(a), |
6d670e7f JR |
383 | get_mask(a, struct ovs_key_tcp)); |
384 | break; | |
385 | ||
386 | case OVS_KEY_ATTR_UDP: | |
cf62fa4c | 387 | odp_set_udp(packet, nl_attr_get(a), |
6d670e7f JR |
388 | get_mask(a, struct ovs_key_udp)); |
389 | break; | |
390 | ||
391 | case OVS_KEY_ATTR_SCTP: | |
cf62fa4c | 392 | odp_set_sctp(packet, nl_attr_get(a), |
6d670e7f JR |
393 | get_mask(a, struct ovs_key_sctp)); |
394 | break; | |
395 | ||
396 | case OVS_KEY_ATTR_MPLS: | |
cf62fa4c | 397 | mh = dp_packet_l2_5(packet); |
6d670e7f JR |
398 | if (mh) { |
399 | put_16aligned_be32(&mh->mpls_lse, nl_attr_get_be32(a) | |
400 | | (get_16aligned_be32(&mh->mpls_lse) | |
401 | & ~*get_mask(a, ovs_be32))); | |
402 | } | |
403 | break; | |
404 | ||
405 | case OVS_KEY_ATTR_ARP: | |
cf62fa4c | 406 | set_arp(packet, nl_attr_get(a), |
6d670e7f JR |
407 | get_mask(a, struct ovs_key_arp)); |
408 | break; | |
409 | ||
e60e935b | 410 | case OVS_KEY_ATTR_ND: |
cf62fa4c | 411 | odp_set_nd(packet, nl_attr_get(a), |
e60e935b SRCSA |
412 | get_mask(a, struct ovs_key_nd)); |
413 | break; | |
414 | ||
6d670e7f | 415 | case OVS_KEY_ATTR_DP_HASH: |
f7c2f97d | 416 | md->dp_hash = nl_attr_get_u32(a) |
2bc1bbd2 | 417 | | (md->dp_hash & ~*get_mask(a, uint32_t)); |
6d670e7f JR |
418 | break; |
419 | ||
420 | case OVS_KEY_ATTR_RECIRC_ID: | |
421 | md->recirc_id = nl_attr_get_u32(a) | |
422 | | (md->recirc_id & ~*get_mask(a, uint32_t)); | |
423 | break; | |
424 | ||
425 | case OVS_KEY_ATTR_TUNNEL: /* Masked data not supported for tunnel. */ | |
426 | case OVS_KEY_ATTR_UNSPEC: | |
07659514 JS |
427 | case OVS_KEY_ATTR_CT_STATE: |
428 | case OVS_KEY_ATTR_CT_ZONE: | |
8e53fe8c | 429 | case OVS_KEY_ATTR_CT_MARK: |
9daf2348 | 430 | case OVS_KEY_ATTR_CT_LABELS: |
6d670e7f JR |
431 | case OVS_KEY_ATTR_ENCAP: |
432 | case OVS_KEY_ATTR_ETHERTYPE: | |
433 | case OVS_KEY_ATTR_IN_PORT: | |
434 | case OVS_KEY_ATTR_VLAN: | |
435 | case OVS_KEY_ATTR_ICMP: | |
436 | case OVS_KEY_ATTR_ICMPV6: | |
6d670e7f JR |
437 | case OVS_KEY_ATTR_TCP_FLAGS: |
438 | case __OVS_KEY_ATTR_MAX: | |
439 | default: | |
440 | OVS_NOT_REACHED(); | |
441 | } | |
442 | } | |
443 | ||
f094af7b | 444 | static void |
e14deea0 | 445 | odp_execute_sample(void *dp, struct dp_packet *packet, bool steal, |
41ccaa24 | 446 | const struct nlattr *action, |
1164afb6 | 447 | odp_execute_cb dp_execute_action) |
f094af7b SH |
448 | { |
449 | const struct nlattr *subactions = NULL; | |
450 | const struct nlattr *a; | |
1895cc8d | 451 | struct dp_packet_batch pb; |
f094af7b SH |
452 | size_t left; |
453 | ||
454 | NL_NESTED_FOR_EACH_UNSAFE (a, left, action) { | |
455 | int type = nl_attr_type(a); | |
456 | ||
457 | switch ((enum ovs_sample_attr) type) { | |
458 | case OVS_SAMPLE_ATTR_PROBABILITY: | |
459 | if (random_uint32() >= nl_attr_get_u32(a)) { | |
1164afb6 | 460 | if (steal) { |
e14deea0 | 461 | dp_packet_delete(packet); |
1164afb6 | 462 | } |
f094af7b SH |
463 | return; |
464 | } | |
465 | break; | |
466 | ||
467 | case OVS_SAMPLE_ATTR_ACTIONS: | |
468 | subactions = a; | |
469 | break; | |
470 | ||
471 | case OVS_SAMPLE_ATTR_UNSPEC: | |
472 | case __OVS_SAMPLE_ATTR_MAX: | |
473 | default: | |
428b2edd | 474 | OVS_NOT_REACHED(); |
f094af7b SH |
475 | } |
476 | } | |
477 | ||
1895cc8d PS |
478 | packet_batch_init_packet(&pb, packet); |
479 | odp_execute_actions(dp, &pb, steal, nl_attr_get(subactions), | |
1164afb6 | 480 | nl_attr_get_size(subactions), dp_execute_action); |
f094af7b SH |
481 | } |
482 | ||
db8bb9a5 JS |
483 | static bool |
484 | requires_datapath_assistance(const struct nlattr *a) | |
485 | { | |
486 | enum ovs_action_attr type = nl_attr_type(a); | |
487 | ||
488 | switch (type) { | |
489 | /* These only make sense in the context of a datapath. */ | |
490 | case OVS_ACTION_ATTR_OUTPUT: | |
491 | case OVS_ACTION_ATTR_TUNNEL_PUSH: | |
492 | case OVS_ACTION_ATTR_TUNNEL_POP: | |
493 | case OVS_ACTION_ATTR_USERSPACE: | |
494 | case OVS_ACTION_ATTR_RECIRC: | |
07659514 | 495 | case OVS_ACTION_ATTR_CT: |
db8bb9a5 JS |
496 | return true; |
497 | ||
498 | case OVS_ACTION_ATTR_SET: | |
499 | case OVS_ACTION_ATTR_SET_MASKED: | |
500 | case OVS_ACTION_ATTR_PUSH_VLAN: | |
501 | case OVS_ACTION_ATTR_POP_VLAN: | |
502 | case OVS_ACTION_ATTR_SAMPLE: | |
503 | case OVS_ACTION_ATTR_HASH: | |
504 | case OVS_ACTION_ATTR_PUSH_MPLS: | |
505 | case OVS_ACTION_ATTR_POP_MPLS: | |
aaca4fe0 | 506 | case OVS_ACTION_ATTR_TRUNC: |
db8bb9a5 JS |
507 | return false; |
508 | ||
509 | case OVS_ACTION_ATTR_UNSPEC: | |
510 | case __OVS_ACTION_ATTR_MAX: | |
511 | OVS_NOT_REACHED(); | |
512 | } | |
513 | ||
514 | return false; | |
515 | } | |
516 | ||
1164afb6 | 517 | void |
1895cc8d | 518 | odp_execute_actions(void *dp, struct dp_packet_batch *batch, bool steal, |
1164afb6 DDP |
519 | const struct nlattr *actions, size_t actions_len, |
520 | odp_execute_cb dp_execute_action) | |
f094af7b | 521 | { |
1895cc8d PS |
522 | struct dp_packet **packets = batch->packets; |
523 | int cnt = batch->count; | |
f094af7b SH |
524 | const struct nlattr *a; |
525 | unsigned int left; | |
8cbf4f47 DDP |
526 | int i; |
527 | ||
f094af7b SH |
528 | NL_ATTR_FOR_EACH_UNSAFE (a, left, actions, actions_len) { |
529 | int type = nl_attr_type(a); | |
1164afb6 | 530 | bool last_action = (left <= NLA_ALIGN(a->nla_len)); |
f094af7b | 531 | |
db8bb9a5 | 532 | if (requires_datapath_assistance(a)) { |
09f9da0b JR |
533 | if (dp_execute_action) { |
534 | /* Allow 'dp_execute_action' to steal the packet data if we do | |
535 | * not need it any more. */ | |
1164afb6 DDP |
536 | bool may_steal = steal && last_action; |
537 | ||
1895cc8d | 538 | dp_execute_action(dp, batch, a, may_steal); |
1164afb6 DDP |
539 | |
540 | if (last_action) { | |
541 | /* We do not need to free the packets. dp_execute_actions() | |
542 | * has stolen them */ | |
543 | return; | |
544 | } | |
c51876c3 | 545 | } |
db8bb9a5 JS |
546 | continue; |
547 | } | |
f094af7b | 548 | |
db8bb9a5 | 549 | switch ((enum ovs_action_attr) type) { |
c6bf49f3 AZ |
550 | case OVS_ACTION_ATTR_HASH: { |
551 | const struct ovs_action_hash *hash_act = nl_attr_get(a); | |
552 | ||
553 | /* Calculate a hash value directly. This might not match the | |
554 | * value computed by the datapath, but it is much less expensive, | |
555 | * and the current use case (bonding) does not require a strict | |
556 | * match to work properly. */ | |
557 | if (hash_act->hash_alg == OVS_HASH_ALG_L4) { | |
558 | struct flow flow; | |
559 | uint32_t hash; | |
560 | ||
8cbf4f47 | 561 | for (i = 0; i < cnt; i++) { |
cf62fa4c | 562 | flow_extract(packets[i], &flow); |
8cbf4f47 DDP |
563 | hash = flow_hash_5tuple(&flow, hash_act->hash_basis); |
564 | ||
2bc1bbd2 | 565 | packets[i]->md.dp_hash = hash; |
8cbf4f47 | 566 | } |
c6bf49f3 AZ |
567 | } else { |
568 | /* Assert on unknown hash algorithm. */ | |
569 | OVS_NOT_REACHED(); | |
570 | } | |
571 | break; | |
572 | } | |
573 | ||
f094af7b SH |
574 | case OVS_ACTION_ATTR_PUSH_VLAN: { |
575 | const struct ovs_action_push_vlan *vlan = nl_attr_get(a); | |
8cbf4f47 DDP |
576 | |
577 | for (i = 0; i < cnt; i++) { | |
d6943394 | 578 | eth_push_vlan(packets[i], vlan->vlan_tpid, vlan->vlan_tci); |
8cbf4f47 | 579 | } |
f094af7b SH |
580 | break; |
581 | } | |
582 | ||
583 | case OVS_ACTION_ATTR_POP_VLAN: | |
8cbf4f47 | 584 | for (i = 0; i < cnt; i++) { |
cf62fa4c | 585 | eth_pop_vlan(packets[i]); |
8cbf4f47 | 586 | } |
f094af7b SH |
587 | break; |
588 | ||
589 | case OVS_ACTION_ATTR_PUSH_MPLS: { | |
590 | const struct ovs_action_push_mpls *mpls = nl_attr_get(a); | |
8cbf4f47 DDP |
591 | |
592 | for (i = 0; i < cnt; i++) { | |
cf62fa4c | 593 | push_mpls(packets[i], mpls->mpls_ethertype, mpls->mpls_lse); |
8cbf4f47 | 594 | } |
f094af7b SH |
595 | break; |
596 | } | |
597 | ||
598 | case OVS_ACTION_ATTR_POP_MPLS: | |
8cbf4f47 | 599 | for (i = 0; i < cnt; i++) { |
cf62fa4c | 600 | pop_mpls(packets[i], nl_attr_get_be16(a)); |
8cbf4f47 | 601 | } |
f094af7b SH |
602 | break; |
603 | ||
604 | case OVS_ACTION_ATTR_SET: | |
8cbf4f47 | 605 | for (i = 0; i < cnt; i++) { |
41ccaa24 | 606 | odp_execute_set_action(packets[i], nl_attr_get(a)); |
6d670e7f JR |
607 | } |
608 | break; | |
609 | ||
610 | case OVS_ACTION_ATTR_SET_MASKED: | |
611 | for (i = 0; i < cnt; i++) { | |
41ccaa24 | 612 | odp_execute_masked_set_action(packets[i], nl_attr_get(a)); |
8cbf4f47 | 613 | } |
f094af7b SH |
614 | break; |
615 | ||
616 | case OVS_ACTION_ATTR_SAMPLE: | |
8cbf4f47 | 617 | for (i = 0; i < cnt; i++) { |
41ccaa24 | 618 | odp_execute_sample(dp, packets[i], steal && last_action, a, |
1164afb6 DDP |
619 | dp_execute_action); |
620 | } | |
621 | ||
622 | if (last_action) { | |
623 | /* We do not need to free the packets. odp_execute_sample() has | |
624 | * stolen them*/ | |
625 | return; | |
8cbf4f47 | 626 | } |
f094af7b SH |
627 | break; |
628 | ||
aaca4fe0 WT |
629 | case OVS_ACTION_ATTR_TRUNC: { |
630 | const struct ovs_action_trunc *trunc = | |
631 | nl_attr_get_unspec(a, sizeof *trunc); | |
632 | ||
633 | batch->trunc = true; | |
634 | for (i = 0; i < cnt; i++) { | |
635 | dp_packet_set_cutlen(packets[i], trunc->max_len); | |
636 | } | |
637 | break; | |
638 | } | |
639 | ||
db8bb9a5 JS |
640 | case OVS_ACTION_ATTR_OUTPUT: |
641 | case OVS_ACTION_ATTR_TUNNEL_PUSH: | |
642 | case OVS_ACTION_ATTR_TUNNEL_POP: | |
643 | case OVS_ACTION_ATTR_USERSPACE: | |
644 | case OVS_ACTION_ATTR_RECIRC: | |
07659514 | 645 | case OVS_ACTION_ATTR_CT: |
f094af7b SH |
646 | case OVS_ACTION_ATTR_UNSPEC: |
647 | case __OVS_ACTION_ATTR_MAX: | |
428b2edd | 648 | OVS_NOT_REACHED(); |
f094af7b SH |
649 | } |
650 | } | |
8cbf4f47 | 651 | |
1164afb6 | 652 | if (steal) { |
8cbf4f47 | 653 | for (i = 0; i < cnt; i++) { |
e14deea0 | 654 | dp_packet_delete(packets[i]); |
8cbf4f47 | 655 | } |
df1e5a3b | 656 | } |
da546e07 | 657 | } |