]>
Commit | Line | Data |
---|---|---|
f094af7b | 1 | /* |
e60e935b | 2 | * Copyright (c) 2009, 2010, 2011, 2012, 2013, 2014, 2015 Nicira, Inc. |
f094af7b SH |
3 | * Copyright (c) 2013 Simon Horman |
4 | * | |
5 | * Licensed under the Apache License, Version 2.0 (the "License"); | |
6 | * you may not use this file except in compliance with the License. | |
7 | * You may obtain a copy of the License at: | |
8 | * | |
9 | * http://www.apache.org/licenses/LICENSE-2.0 | |
10 | * | |
11 | * Unless required by applicable law or agreed to in writing, software | |
12 | * distributed under the License is distributed on an "AS IS" BASIS, | |
13 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |
14 | * See the License for the specific language governing permissions and | |
15 | * limitations under the License. | |
16 | */ | |
17 | ||
18 | #include <config.h> | |
19 | #include "odp-execute.h" | |
b2befd5b | 20 | #include <sys/types.h> |
1368af0c | 21 | #include <netinet/in.h> |
b2befd5b | 22 | #include <arpa/inet.h> |
e60e935b | 23 | #include <netinet/icmp6.h> |
6d670e7f | 24 | #include <netinet/ip6.h> |
f094af7b SH |
25 | #include <stdlib.h> |
26 | #include <string.h> | |
27 | ||
e14deea0 | 28 | #include "dp-packet.h" |
758c456d | 29 | #include "dpif.h" |
f094af7b | 30 | #include "netlink.h" |
837eefc7 | 31 | #include "odp-netlink.h" |
6c13071b | 32 | #include "odp-util.h" |
f094af7b | 33 | #include "packets.h" |
c6bf49f3 | 34 | #include "flow.h" |
f6c8a6b1 | 35 | #include "unaligned.h" |
f094af7b | 36 | #include "util.h" |
fc052306 | 37 | #include "csum.h" |
f094af7b | 38 | |
6d670e7f | 39 | /* Masked copy of an ethernet address. 'src' is already properly masked. */ |
f094af7b | 40 | static void |
74ff3298 JR |
41 | ether_addr_copy_masked(struct eth_addr *dst, const struct eth_addr src, |
42 | const struct eth_addr mask) | |
6d670e7f JR |
43 | { |
44 | int i; | |
45 | ||
74ff3298 JR |
46 | for (i = 0; i < ARRAY_SIZE(dst->be16); i++) { |
47 | dst->be16[i] = src.be16[i] | (dst->be16[i] & ~mask.be16[i]); | |
6d670e7f JR |
48 | } |
49 | } | |
50 | ||
51 | static void | |
cf62fa4c | 52 | odp_eth_set_addrs(struct dp_packet *packet, const struct ovs_key_ethernet *key, |
6d670e7f | 53 | const struct ovs_key_ethernet *mask) |
f094af7b | 54 | { |
2482b0b0 | 55 | struct eth_header *eh = dp_packet_eth(packet); |
f094af7b | 56 | |
cf3b7538 | 57 | if (eh) { |
6d670e7f | 58 | if (!mask) { |
74ff3298 JR |
59 | eh->eth_src = key->eth_src; |
60 | eh->eth_dst = key->eth_dst; | |
6d670e7f | 61 | } else { |
74ff3298 JR |
62 | ether_addr_copy_masked(&eh->eth_src, key->eth_src, mask->eth_src); |
63 | ether_addr_copy_masked(&eh->eth_dst, key->eth_dst, mask->eth_dst); | |
6d670e7f | 64 | } |
cf3b7538 | 65 | } |
f094af7b SH |
66 | } |
67 | ||
6d670e7f | 68 | static void |
cf62fa4c | 69 | odp_set_ipv4(struct dp_packet *packet, const struct ovs_key_ipv4 *key, |
6d670e7f JR |
70 | const struct ovs_key_ipv4 *mask) |
71 | { | |
cf62fa4c | 72 | struct ip_header *nh = dp_packet_l3(packet); |
fc052306 ZB |
73 | ovs_be32 ip_src_nh; |
74 | ovs_be32 ip_dst_nh; | |
75 | ovs_be32 new_ip_src; | |
76 | ovs_be32 new_ip_dst; | |
77 | uint8_t new_tos; | |
78 | uint8_t new_ttl; | |
6d670e7f | 79 | |
fc052306 ZB |
80 | if (mask->ipv4_src) { |
81 | ip_src_nh = get_16aligned_be32(&nh->ip_src); | |
82 | new_ip_src = key->ipv4_src | (ip_src_nh & ~mask->ipv4_src); | |
83 | ||
84 | if (ip_src_nh != new_ip_src) { | |
85 | packet_set_ipv4_addr(packet, &nh->ip_src, new_ip_src); | |
86 | } | |
87 | } | |
88 | ||
89 | if (mask->ipv4_dst) { | |
90 | ip_dst_nh = get_16aligned_be32(&nh->ip_dst); | |
91 | new_ip_dst = key->ipv4_dst | (ip_dst_nh & ~mask->ipv4_dst); | |
92 | ||
93 | if (ip_dst_nh != new_ip_dst) { | |
94 | packet_set_ipv4_addr(packet, &nh->ip_dst, new_ip_dst); | |
95 | } | |
96 | } | |
97 | ||
98 | if (mask->ipv4_tos) { | |
99 | new_tos = key->ipv4_tos | (nh->ip_tos & ~mask->ipv4_tos); | |
100 | ||
101 | if (nh->ip_tos != new_tos) { | |
102 | nh->ip_csum = recalc_csum16(nh->ip_csum, | |
103 | htons((uint16_t) nh->ip_tos), | |
104 | htons((uint16_t) new_tos)); | |
105 | nh->ip_tos = new_tos; | |
106 | } | |
107 | } | |
108 | ||
109 | if (OVS_LIKELY(mask->ipv4_ttl)) { | |
110 | new_ttl = key->ipv4_ttl | (nh->ip_ttl & ~mask->ipv4_ttl); | |
111 | ||
112 | if (OVS_LIKELY(nh->ip_ttl != new_ttl)) { | |
113 | nh->ip_csum = recalc_csum16(nh->ip_csum, htons(nh->ip_ttl << 8), | |
114 | htons(new_ttl << 8)); | |
115 | nh->ip_ttl = new_ttl; | |
116 | } | |
117 | } | |
6d670e7f JR |
118 | } |
119 | ||
932c96b7 JR |
120 | static struct in6_addr * |
121 | mask_ipv6_addr(const ovs_16aligned_be32 *old, const struct in6_addr *addr, | |
122 | const struct in6_addr *mask, struct in6_addr *masked) | |
6d670e7f | 123 | { |
932c96b7 | 124 | #ifdef s6_addr32 |
6d670e7f | 125 | for (int i = 0; i < 4; i++) { |
932c96b7 JR |
126 | masked->s6_addr32[i] = addr->s6_addr32[i] |
127 | | (get_16aligned_be32(&old[i]) & ~mask->s6_addr32[i]); | |
6d670e7f | 128 | } |
932c96b7 JR |
129 | #else |
130 | const uint8_t *old8 = (const uint8_t *)old; | |
131 | for (int i = 0; i < 16; i++) { | |
132 | masked->s6_addr[i] = addr->s6_addr[i] | (old8[i] & ~mask->s6_addr[i]); | |
133 | } | |
134 | #endif | |
6d670e7f JR |
135 | return masked; |
136 | } | |
137 | ||
138 | static void | |
cf62fa4c | 139 | odp_set_ipv6(struct dp_packet *packet, const struct ovs_key_ipv6 *key, |
6d670e7f JR |
140 | const struct ovs_key_ipv6 *mask) |
141 | { | |
cf62fa4c | 142 | struct ovs_16aligned_ip6_hdr *nh = dp_packet_l3(packet); |
932c96b7 | 143 | struct in6_addr sbuf, dbuf; |
6d670e7f JR |
144 | uint8_t old_tc = ntohl(get_16aligned_be32(&nh->ip6_flow)) >> 20; |
145 | ovs_be32 old_fl = get_16aligned_be32(&nh->ip6_flow) & htonl(0xfffff); | |
146 | ||
147 | packet_set_ipv6( | |
148 | packet, | |
932c96b7 JR |
149 | mask_ipv6_addr(nh->ip6_src.be32, &key->ipv6_src, &mask->ipv6_src, |
150 | &sbuf), | |
151 | mask_ipv6_addr(nh->ip6_dst.be32, &key->ipv6_dst, &mask->ipv6_dst, | |
152 | &dbuf), | |
6d670e7f JR |
153 | key->ipv6_tclass | (old_tc & ~mask->ipv6_tclass), |
154 | key->ipv6_label | (old_fl & ~mask->ipv6_label), | |
155 | key->ipv6_hlimit | (nh->ip6_hlim & ~mask->ipv6_hlimit)); | |
156 | } | |
157 | ||
158 | static void | |
cf62fa4c | 159 | odp_set_tcp(struct dp_packet *packet, const struct ovs_key_tcp *key, |
6d670e7f JR |
160 | const struct ovs_key_tcp *mask) |
161 | { | |
cf62fa4c | 162 | struct tcp_header *th = dp_packet_l4(packet); |
6d670e7f | 163 | |
cf62fa4c | 164 | if (OVS_LIKELY(th && dp_packet_get_tcp_payload(packet))) { |
b8778a0d JR |
165 | packet_set_tcp_port(packet, |
166 | key->tcp_src | (th->tcp_src & ~mask->tcp_src), | |
167 | key->tcp_dst | (th->tcp_dst & ~mask->tcp_dst)); | |
168 | } | |
6d670e7f JR |
169 | } |
170 | ||
171 | static void | |
cf62fa4c | 172 | odp_set_udp(struct dp_packet *packet, const struct ovs_key_udp *key, |
6d670e7f JR |
173 | const struct ovs_key_udp *mask) |
174 | { | |
cf62fa4c | 175 | struct udp_header *uh = dp_packet_l4(packet); |
6d670e7f | 176 | |
cf62fa4c | 177 | if (OVS_LIKELY(uh && dp_packet_get_udp_payload(packet))) { |
b8778a0d JR |
178 | packet_set_udp_port(packet, |
179 | key->udp_src | (uh->udp_src & ~mask->udp_src), | |
180 | key->udp_dst | (uh->udp_dst & ~mask->udp_dst)); | |
181 | } | |
6d670e7f JR |
182 | } |
183 | ||
184 | static void | |
cf62fa4c | 185 | odp_set_sctp(struct dp_packet *packet, const struct ovs_key_sctp *key, |
6d670e7f JR |
186 | const struct ovs_key_sctp *mask) |
187 | { | |
cf62fa4c | 188 | struct sctp_header *sh = dp_packet_l4(packet); |
6d670e7f | 189 | |
cf62fa4c | 190 | if (OVS_LIKELY(sh && dp_packet_get_sctp_payload(packet))) { |
b8778a0d JR |
191 | packet_set_sctp_port(packet, |
192 | key->sctp_src | (sh->sctp_src & ~mask->sctp_src), | |
193 | key->sctp_dst | (sh->sctp_dst & ~mask->sctp_dst)); | |
194 | } | |
6d670e7f JR |
195 | } |
196 | ||
f094af7b | 197 | static void |
6c13071b SH |
198 | odp_set_tunnel_action(const struct nlattr *a, struct flow_tnl *tun_key) |
199 | { | |
200 | enum odp_key_fitness fitness; | |
201 | ||
8d8ab6c2 | 202 | fitness = odp_tun_key_from_attr(a, tun_key); |
6c13071b SH |
203 | ovs_assert(fitness != ODP_FIT_ERROR); |
204 | } | |
205 | ||
f6c8a6b1 | 206 | static void |
cf62fa4c | 207 | set_arp(struct dp_packet *packet, const struct ovs_key_arp *key, |
6d670e7f | 208 | const struct ovs_key_arp *mask) |
f6c8a6b1 | 209 | { |
cf62fa4c | 210 | struct arp_eth_header *arp = dp_packet_l3(packet); |
f6c8a6b1 | 211 | |
6d670e7f JR |
212 | if (!mask) { |
213 | arp->ar_op = key->arp_op; | |
74ff3298 | 214 | arp->ar_sha = key->arp_sha; |
6d670e7f | 215 | put_16aligned_be32(&arp->ar_spa, key->arp_sip); |
74ff3298 | 216 | arp->ar_tha = key->arp_tha; |
6d670e7f JR |
217 | put_16aligned_be32(&arp->ar_tpa, key->arp_tip); |
218 | } else { | |
219 | ovs_be32 ar_spa = get_16aligned_be32(&arp->ar_spa); | |
220 | ovs_be32 ar_tpa = get_16aligned_be32(&arp->ar_tpa); | |
221 | ||
222 | arp->ar_op = key->arp_op | (arp->ar_op & ~mask->arp_op); | |
74ff3298 | 223 | ether_addr_copy_masked(&arp->ar_sha, key->arp_sha, mask->arp_sha); |
6d670e7f JR |
224 | put_16aligned_be32(&arp->ar_spa, |
225 | key->arp_sip | (ar_spa & ~mask->arp_sip)); | |
74ff3298 | 226 | ether_addr_copy_masked(&arp->ar_tha, key->arp_tha, mask->arp_tha); |
6d670e7f JR |
227 | put_16aligned_be32(&arp->ar_tpa, |
228 | key->arp_tip | (ar_tpa & ~mask->arp_tip)); | |
229 | } | |
f6c8a6b1 BP |
230 | } |
231 | ||
e60e935b | 232 | static void |
cf62fa4c | 233 | odp_set_nd(struct dp_packet *packet, const struct ovs_key_nd *key, |
e60e935b SRCSA |
234 | const struct ovs_key_nd *mask) |
235 | { | |
cf62fa4c | 236 | const struct ovs_nd_msg *ns = dp_packet_l4(packet); |
86d46f3c | 237 | const struct ovs_nd_lla_opt *lla_opt = dp_packet_get_nd_payload(packet); |
e60e935b | 238 | |
86d46f3c | 239 | if (OVS_LIKELY(ns && lla_opt)) { |
cf62fa4c | 240 | int bytes_remain = dp_packet_l4_size(packet) - sizeof(*ns); |
932c96b7 | 241 | struct in6_addr tgt_buf; |
74ff3298 JR |
242 | struct eth_addr sll_buf = eth_addr_zero; |
243 | struct eth_addr tll_buf = eth_addr_zero; | |
e60e935b | 244 | |
86d46f3c ZKL |
245 | while (bytes_remain >= ND_LLA_OPT_LEN && lla_opt->len != 0) { |
246 | if (lla_opt->type == ND_OPT_SOURCE_LINKADDR | |
247 | && lla_opt->len == 1) { | |
248 | sll_buf = lla_opt->mac; | |
74ff3298 | 249 | ether_addr_copy_masked(&sll_buf, key->nd_sll, mask->nd_sll); |
e60e935b SRCSA |
250 | |
251 | /* A packet can only contain one SLL or TLL option */ | |
252 | break; | |
86d46f3c ZKL |
253 | } else if (lla_opt->type == ND_OPT_TARGET_LINKADDR |
254 | && lla_opt->len == 1) { | |
255 | tll_buf = lla_opt->mac; | |
74ff3298 | 256 | ether_addr_copy_masked(&tll_buf, key->nd_tll, mask->nd_tll); |
e60e935b SRCSA |
257 | |
258 | /* A packet can only contain one SLL or TLL option */ | |
259 | break; | |
260 | } | |
261 | ||
86d46f3c ZKL |
262 | lla_opt += lla_opt->len; |
263 | bytes_remain -= lla_opt->len * ND_LLA_OPT_LEN; | |
e60e935b SRCSA |
264 | } |
265 | ||
266 | packet_set_nd(packet, | |
932c96b7 JR |
267 | mask_ipv6_addr(ns->target.be32, &key->nd_target, |
268 | &mask->nd_target, &tgt_buf), | |
e60e935b SRCSA |
269 | sll_buf, |
270 | tll_buf); | |
271 | } | |
272 | } | |
273 | ||
3d2fbd70 JS |
274 | /* Set the NSH header. Assumes the NSH header is present and matches the |
275 | * MD format of the key. The slow path must take case of that. */ | |
276 | static void | |
f59cb331 YY |
277 | odp_set_nsh(struct dp_packet *packet, const struct flow_nsh *key, |
278 | const struct flow_nsh *mask) | |
3d2fbd70 JS |
279 | { |
280 | struct nsh_hdr *nsh = dp_packet_l3(packet); | |
9a180f2c | 281 | uint8_t mdtype = nsh_md_type(nsh); |
f59cb331 | 282 | ovs_be32 path_hdr; |
3d2fbd70 JS |
283 | |
284 | if (!mask) { | |
9a180f2c JS |
285 | nsh->ver_flags_ttl_len = htons(key->flags << NSH_FLAGS_SHIFT) | |
286 | (nsh->ver_flags_ttl_len & ~htons(NSH_FLAGS_MASK)); | |
f59cb331 YY |
287 | path_hdr = htonl((ntohl(key->spi) << NSH_SPI_SHIFT) | |
288 | key->si); | |
289 | put_16aligned_be32(&nsh->path_hdr, path_hdr); | |
9a180f2c | 290 | switch (mdtype) { |
3d2fbd70 JS |
291 | case NSH_M_TYPE1: |
292 | for (int i = 0; i < 4; i++) { | |
f59cb331 | 293 | put_16aligned_be32(&nsh->md1.context[i], key->context[i]); |
3d2fbd70 JS |
294 | } |
295 | break; | |
296 | case NSH_M_TYPE2: | |
3d2fbd70 | 297 | default: |
1fc11c59 JS |
298 | /* No support for setting any other metadata format yet. */ |
299 | break; | |
3d2fbd70 JS |
300 | } |
301 | } else { | |
9a180f2c | 302 | uint8_t flags = (ntohs(nsh->ver_flags_ttl_len) & NSH_FLAGS_MASK) >> |
3d2fbd70 JS |
303 | NSH_FLAGS_SHIFT; |
304 | flags = key->flags | (flags & ~mask->flags); | |
9a180f2c JS |
305 | nsh->ver_flags_ttl_len = htons(flags << NSH_FLAGS_SHIFT) | |
306 | (nsh->ver_flags_ttl_len & ~htons(NSH_FLAGS_MASK)); | |
3d2fbd70 | 307 | |
f59cb331 YY |
308 | path_hdr = get_16aligned_be32(&nsh->path_hdr); |
309 | uint32_t spi = (ntohl(path_hdr) & NSH_SPI_MASK) >> NSH_SPI_SHIFT; | |
310 | uint8_t si = (ntohl(path_hdr) & NSH_SI_MASK) >> NSH_SI_SHIFT; | |
311 | uint32_t spi_mask = ntohl(mask->spi); | |
312 | if (spi_mask == 0x00ffffff) { | |
313 | spi_mask = UINT32_MAX; | |
314 | } | |
315 | spi = ntohl(key->spi) | (spi & ~spi_mask); | |
316 | si = key->si | (si & ~mask->si); | |
317 | path_hdr = htonl((spi << NSH_SPI_SHIFT) | si); | |
3d2fbd70 | 318 | put_16aligned_be32(&nsh->path_hdr, path_hdr); |
9a180f2c | 319 | switch (mdtype) { |
3d2fbd70 JS |
320 | case NSH_M_TYPE1: |
321 | for (int i = 0; i < 4; i++) { | |
f59cb331 YY |
322 | ovs_be32 p = get_16aligned_be32(&nsh->md1.context[i]); |
323 | ovs_be32 k = key->context[i]; | |
324 | ovs_be32 m = mask->context[i]; | |
325 | put_16aligned_be32(&nsh->md1.context[i], k | (p & ~m)); | |
3d2fbd70 JS |
326 | } |
327 | break; | |
328 | case NSH_M_TYPE2: | |
3d2fbd70 | 329 | default: |
1fc11c59 JS |
330 | /* No support for setting any other metadata format yet. */ |
331 | break; | |
3d2fbd70 JS |
332 | } |
333 | } | |
334 | } | |
335 | ||
6c13071b | 336 | static void |
e14deea0 | 337 | odp_execute_set_action(struct dp_packet *packet, const struct nlattr *a) |
f094af7b SH |
338 | { |
339 | enum ovs_key_attr type = nl_attr_type(a); | |
340 | const struct ovs_key_ipv4 *ipv4_key; | |
341 | const struct ovs_key_ipv6 *ipv6_key; | |
41ccaa24 | 342 | struct pkt_metadata *md = &packet->md; |
f094af7b SH |
343 | |
344 | switch (type) { | |
345 | case OVS_KEY_ATTR_PRIORITY: | |
09f9da0b | 346 | md->skb_priority = nl_attr_get_u32(a); |
6c13071b SH |
347 | break; |
348 | ||
f094af7b | 349 | case OVS_KEY_ATTR_TUNNEL: |
09f9da0b | 350 | odp_set_tunnel_action(a, &md->tunnel); |
6c13071b SH |
351 | break; |
352 | ||
f094af7b | 353 | case OVS_KEY_ATTR_SKB_MARK: |
09f9da0b | 354 | md->pkt_mark = nl_attr_get_u32(a); |
f094af7b SH |
355 | break; |
356 | ||
357 | case OVS_KEY_ATTR_ETHERNET: | |
cf62fa4c | 358 | odp_eth_set_addrs(packet, nl_attr_get(a), NULL); |
f094af7b SH |
359 | break; |
360 | ||
f59cb331 YY |
361 | case OVS_KEY_ATTR_NSH: { |
362 | struct flow_nsh nsh; | |
363 | odp_nsh_key_from_attr(a, &nsh); | |
364 | odp_set_nsh(packet, &nsh, NULL); | |
3d2fbd70 | 365 | break; |
f59cb331 | 366 | } |
3d2fbd70 | 367 | |
f094af7b SH |
368 | case OVS_KEY_ATTR_IPV4: |
369 | ipv4_key = nl_attr_get_unspec(a, sizeof(struct ovs_key_ipv4)); | |
cf62fa4c | 370 | packet_set_ipv4(packet, ipv4_key->ipv4_src, |
91088554 DDP |
371 | ipv4_key->ipv4_dst, ipv4_key->ipv4_tos, |
372 | ipv4_key->ipv4_ttl); | |
f094af7b SH |
373 | break; |
374 | ||
375 | case OVS_KEY_ATTR_IPV6: | |
376 | ipv6_key = nl_attr_get_unspec(a, sizeof(struct ovs_key_ipv6)); | |
932c96b7 | 377 | packet_set_ipv6(packet, &ipv6_key->ipv6_src, &ipv6_key->ipv6_dst, |
91088554 DDP |
378 | ipv6_key->ipv6_tclass, ipv6_key->ipv6_label, |
379 | ipv6_key->ipv6_hlimit); | |
f094af7b SH |
380 | break; |
381 | ||
382 | case OVS_KEY_ATTR_TCP: | |
cf62fa4c | 383 | if (OVS_LIKELY(dp_packet_get_tcp_payload(packet))) { |
b8778a0d JR |
384 | const struct ovs_key_tcp *tcp_key |
385 | = nl_attr_get_unspec(a, sizeof(struct ovs_key_tcp)); | |
386 | ||
cf62fa4c | 387 | packet_set_tcp_port(packet, tcp_key->tcp_src, |
b8778a0d JR |
388 | tcp_key->tcp_dst); |
389 | } | |
f094af7b SH |
390 | break; |
391 | ||
2b06df54 | 392 | case OVS_KEY_ATTR_UDP: |
cf62fa4c | 393 | if (OVS_LIKELY(dp_packet_get_udp_payload(packet))) { |
b8778a0d JR |
394 | const struct ovs_key_udp *udp_key |
395 | = nl_attr_get_unspec(a, sizeof(struct ovs_key_udp)); | |
396 | ||
cf62fa4c | 397 | packet_set_udp_port(packet, udp_key->udp_src, |
b8778a0d JR |
398 | udp_key->udp_dst); |
399 | } | |
f094af7b SH |
400 | break; |
401 | ||
c6bcb685 | 402 | case OVS_KEY_ATTR_SCTP: |
cf62fa4c | 403 | if (OVS_LIKELY(dp_packet_get_sctp_payload(packet))) { |
b8778a0d JR |
404 | const struct ovs_key_sctp *sctp_key |
405 | = nl_attr_get_unspec(a, sizeof(struct ovs_key_sctp)); | |
406 | ||
cf62fa4c | 407 | packet_set_sctp_port(packet, sctp_key->sctp_src, |
b8778a0d JR |
408 | sctp_key->sctp_dst); |
409 | } | |
c6bcb685 JS |
410 | break; |
411 | ||
2b06df54 | 412 | case OVS_KEY_ATTR_MPLS: |
cf62fa4c | 413 | set_mpls_lse(packet, nl_attr_get_be32(a)); |
6d670e7f | 414 | break; |
f094af7b | 415 | |
f6c8a6b1 | 416 | case OVS_KEY_ATTR_ARP: |
cf62fa4c | 417 | set_arp(packet, nl_attr_get(a), NULL); |
f6c8a6b1 BP |
418 | break; |
419 | ||
f6ecf944 JP |
420 | case OVS_KEY_ATTR_ICMP: |
421 | case OVS_KEY_ATTR_ICMPV6: | |
422 | if (OVS_LIKELY(dp_packet_get_icmp_payload(packet))) { | |
423 | const struct ovs_key_icmp *icmp_key | |
424 | = nl_attr_get_unspec(a, sizeof(struct ovs_key_icmp)); | |
425 | ||
426 | packet_set_icmp(packet, icmp_key->icmp_type, icmp_key->icmp_code); | |
427 | } | |
428 | break; | |
429 | ||
e60e935b | 430 | case OVS_KEY_ATTR_ND: |
cf62fa4c | 431 | if (OVS_LIKELY(dp_packet_get_nd_payload(packet))) { |
e60e935b SRCSA |
432 | const struct ovs_key_nd *nd_key |
433 | = nl_attr_get_unspec(a, sizeof(struct ovs_key_nd)); | |
932c96b7 | 434 | packet_set_nd(packet, &nd_key->nd_target, nd_key->nd_sll, |
74ff3298 | 435 | nd_key->nd_tll); |
e60e935b SRCSA |
436 | } |
437 | break; | |
438 | ||
572f732a | 439 | case OVS_KEY_ATTR_DP_HASH: |
61a2647e | 440 | md->dp_hash = nl_attr_get_u32(a); |
572f732a AZ |
441 | break; |
442 | ||
443 | case OVS_KEY_ATTR_RECIRC_ID: | |
444 | md->recirc_id = nl_attr_get_u32(a); | |
445 | break; | |
446 | ||
2b06df54 | 447 | case OVS_KEY_ATTR_UNSPEC: |
beb75a40 | 448 | case OVS_KEY_ATTR_PACKET_TYPE: |
2b06df54 JS |
449 | case OVS_KEY_ATTR_ENCAP: |
450 | case OVS_KEY_ATTR_ETHERTYPE: | |
451 | case OVS_KEY_ATTR_IN_PORT: | |
452 | case OVS_KEY_ATTR_VLAN: | |
dc235f7f | 453 | case OVS_KEY_ATTR_TCP_FLAGS: |
07659514 | 454 | case OVS_KEY_ATTR_CT_STATE: |
c30b4cea JR |
455 | case OVS_KEY_ATTR_CT_ORIG_TUPLE_IPV4: |
456 | case OVS_KEY_ATTR_CT_ORIG_TUPLE_IPV6: | |
07659514 | 457 | case OVS_KEY_ATTR_CT_ZONE: |
8e53fe8c | 458 | case OVS_KEY_ATTR_CT_MARK: |
9daf2348 | 459 | case OVS_KEY_ATTR_CT_LABELS: |
2b06df54 JS |
460 | case __OVS_KEY_ATTR_MAX: |
461 | default: | |
428b2edd | 462 | OVS_NOT_REACHED(); |
f094af7b SH |
463 | } |
464 | } | |
465 | ||
6d670e7f JR |
466 | #define get_mask(a, type) ((const type *)(const void *)(a + 1) + 1) |
467 | ||
468 | static void | |
e14deea0 | 469 | odp_execute_masked_set_action(struct dp_packet *packet, |
41ccaa24 | 470 | const struct nlattr *a) |
6d670e7f | 471 | { |
41ccaa24 | 472 | struct pkt_metadata *md = &packet->md; |
6d670e7f JR |
473 | enum ovs_key_attr type = nl_attr_type(a); |
474 | struct mpls_hdr *mh; | |
475 | ||
476 | switch (type) { | |
477 | case OVS_KEY_ATTR_PRIORITY: | |
478 | md->skb_priority = nl_attr_get_u32(a) | |
479 | | (md->skb_priority & ~*get_mask(a, uint32_t)); | |
480 | break; | |
481 | ||
482 | case OVS_KEY_ATTR_SKB_MARK: | |
483 | md->pkt_mark = nl_attr_get_u32(a) | |
484 | | (md->pkt_mark & ~*get_mask(a, uint32_t)); | |
485 | break; | |
486 | ||
487 | case OVS_KEY_ATTR_ETHERNET: | |
cf62fa4c | 488 | odp_eth_set_addrs(packet, nl_attr_get(a), |
6d670e7f JR |
489 | get_mask(a, struct ovs_key_ethernet)); |
490 | break; | |
491 | ||
f59cb331 YY |
492 | case OVS_KEY_ATTR_NSH: { |
493 | struct flow_nsh nsh, nsh_mask; | |
494 | struct { | |
495 | struct nlattr nla; | |
496 | uint8_t data[sizeof(struct ovs_nsh_key_base) + NSH_CTX_HDRS_MAX_LEN | |
497 | + 2 * NLA_HDRLEN]; | |
498 | } attr, mask; | |
499 | size_t size = nl_attr_get_size(a) / 2; | |
500 | ||
501 | mask.nla.nla_type = attr.nla.nla_type = nl_attr_type(a); | |
502 | mask.nla.nla_len = attr.nla.nla_len = NLA_HDRLEN + size; | |
503 | memcpy(attr.data, (char *)(a + 1), size); | |
504 | memcpy(mask.data, (char *)(a + 1) + size, size); | |
505 | ||
506 | odp_nsh_key_from_attr(&attr.nla, &nsh); | |
507 | odp_nsh_key_from_attr(&mask.nla, &nsh_mask); | |
508 | odp_set_nsh(packet, &nsh, &nsh_mask); | |
509 | ||
3d2fbd70 | 510 | break; |
f59cb331 | 511 | } |
3d2fbd70 | 512 | |
6d670e7f | 513 | case OVS_KEY_ATTR_IPV4: |
cf62fa4c | 514 | odp_set_ipv4(packet, nl_attr_get(a), |
6d670e7f JR |
515 | get_mask(a, struct ovs_key_ipv4)); |
516 | break; | |
517 | ||
518 | case OVS_KEY_ATTR_IPV6: | |
cf62fa4c | 519 | odp_set_ipv6(packet, nl_attr_get(a), |
6d670e7f JR |
520 | get_mask(a, struct ovs_key_ipv6)); |
521 | break; | |
522 | ||
523 | case OVS_KEY_ATTR_TCP: | |
cf62fa4c | 524 | odp_set_tcp(packet, nl_attr_get(a), |
6d670e7f JR |
525 | get_mask(a, struct ovs_key_tcp)); |
526 | break; | |
527 | ||
528 | case OVS_KEY_ATTR_UDP: | |
cf62fa4c | 529 | odp_set_udp(packet, nl_attr_get(a), |
6d670e7f JR |
530 | get_mask(a, struct ovs_key_udp)); |
531 | break; | |
532 | ||
533 | case OVS_KEY_ATTR_SCTP: | |
cf62fa4c | 534 | odp_set_sctp(packet, nl_attr_get(a), |
6d670e7f JR |
535 | get_mask(a, struct ovs_key_sctp)); |
536 | break; | |
537 | ||
538 | case OVS_KEY_ATTR_MPLS: | |
cf62fa4c | 539 | mh = dp_packet_l2_5(packet); |
6d670e7f JR |
540 | if (mh) { |
541 | put_16aligned_be32(&mh->mpls_lse, nl_attr_get_be32(a) | |
542 | | (get_16aligned_be32(&mh->mpls_lse) | |
543 | & ~*get_mask(a, ovs_be32))); | |
544 | } | |
545 | break; | |
546 | ||
547 | case OVS_KEY_ATTR_ARP: | |
cf62fa4c | 548 | set_arp(packet, nl_attr_get(a), |
6d670e7f JR |
549 | get_mask(a, struct ovs_key_arp)); |
550 | break; | |
551 | ||
e60e935b | 552 | case OVS_KEY_ATTR_ND: |
cf62fa4c | 553 | odp_set_nd(packet, nl_attr_get(a), |
e60e935b SRCSA |
554 | get_mask(a, struct ovs_key_nd)); |
555 | break; | |
556 | ||
6d670e7f | 557 | case OVS_KEY_ATTR_DP_HASH: |
f7c2f97d | 558 | md->dp_hash = nl_attr_get_u32(a) |
2bc1bbd2 | 559 | | (md->dp_hash & ~*get_mask(a, uint32_t)); |
6d670e7f JR |
560 | break; |
561 | ||
562 | case OVS_KEY_ATTR_RECIRC_ID: | |
563 | md->recirc_id = nl_attr_get_u32(a) | |
564 | | (md->recirc_id & ~*get_mask(a, uint32_t)); | |
565 | break; | |
566 | ||
567 | case OVS_KEY_ATTR_TUNNEL: /* Masked data not supported for tunnel. */ | |
beb75a40 | 568 | case OVS_KEY_ATTR_PACKET_TYPE: |
6d670e7f | 569 | case OVS_KEY_ATTR_UNSPEC: |
07659514 JS |
570 | case OVS_KEY_ATTR_CT_STATE: |
571 | case OVS_KEY_ATTR_CT_ZONE: | |
8e53fe8c | 572 | case OVS_KEY_ATTR_CT_MARK: |
9daf2348 | 573 | case OVS_KEY_ATTR_CT_LABELS: |
c30b4cea JR |
574 | case OVS_KEY_ATTR_CT_ORIG_TUPLE_IPV4: |
575 | case OVS_KEY_ATTR_CT_ORIG_TUPLE_IPV6: | |
6d670e7f JR |
576 | case OVS_KEY_ATTR_ENCAP: |
577 | case OVS_KEY_ATTR_ETHERTYPE: | |
578 | case OVS_KEY_ATTR_IN_PORT: | |
579 | case OVS_KEY_ATTR_VLAN: | |
580 | case OVS_KEY_ATTR_ICMP: | |
581 | case OVS_KEY_ATTR_ICMPV6: | |
6d670e7f JR |
582 | case OVS_KEY_ATTR_TCP_FLAGS: |
583 | case __OVS_KEY_ATTR_MAX: | |
584 | default: | |
585 | OVS_NOT_REACHED(); | |
586 | } | |
587 | } | |
588 | ||
f094af7b | 589 | static void |
e14deea0 | 590 | odp_execute_sample(void *dp, struct dp_packet *packet, bool steal, |
41ccaa24 | 591 | const struct nlattr *action, |
1164afb6 | 592 | odp_execute_cb dp_execute_action) |
f094af7b SH |
593 | { |
594 | const struct nlattr *subactions = NULL; | |
595 | const struct nlattr *a; | |
1895cc8d | 596 | struct dp_packet_batch pb; |
f094af7b SH |
597 | size_t left; |
598 | ||
599 | NL_NESTED_FOR_EACH_UNSAFE (a, left, action) { | |
600 | int type = nl_attr_type(a); | |
601 | ||
602 | switch ((enum ovs_sample_attr) type) { | |
603 | case OVS_SAMPLE_ATTR_PROBABILITY: | |
604 | if (random_uint32() >= nl_attr_get_u32(a)) { | |
1164afb6 | 605 | if (steal) { |
e14deea0 | 606 | dp_packet_delete(packet); |
1164afb6 | 607 | } |
f094af7b SH |
608 | return; |
609 | } | |
610 | break; | |
611 | ||
612 | case OVS_SAMPLE_ATTR_ACTIONS: | |
613 | subactions = a; | |
614 | break; | |
615 | ||
616 | case OVS_SAMPLE_ATTR_UNSPEC: | |
617 | case __OVS_SAMPLE_ATTR_MAX: | |
618 | default: | |
428b2edd | 619 | OVS_NOT_REACHED(); |
f094af7b SH |
620 | } |
621 | } | |
622 | ||
70a0573d AZ |
623 | if (!steal) { |
624 | /* The 'subactions' may modify the packet, but the modification | |
625 | * should not propagate beyond this sample action. Make a copy | |
626 | * the packet in case we don't own the packet, so that the | |
627 | * 'subactions' are only applid to the clone. 'odp_execute_actions' | |
628 | * will free the clone. */ | |
629 | packet = dp_packet_clone(packet); | |
630 | } | |
72c84bc2 | 631 | dp_packet_batch_init_packet(&pb, packet); |
70a0573d | 632 | odp_execute_actions(dp, &pb, true, nl_attr_get(subactions), |
1164afb6 | 633 | nl_attr_get_size(subactions), dp_execute_action); |
f094af7b SH |
634 | } |
635 | ||
535e3acf | 636 | static void |
911b7e9b | 637 | odp_execute_clone(void *dp, struct dp_packet_batch *batch, bool steal, |
535e3acf AZ |
638 | const struct nlattr *actions, |
639 | odp_execute_cb dp_execute_action) | |
640 | { | |
535e3acf AZ |
641 | if (!steal) { |
642 | /* The 'actions' may modify the packet, but the modification | |
643 | * should not propagate beyond this clone action. Make a copy | |
644 | * the packet in case we don't own the packet, so that the | |
645 | * 'actions' are only applied to the clone. 'odp_execute_actions' | |
646 | * will free the clone. */ | |
911b7e9b SC |
647 | struct dp_packet_batch clone_pkt_batch; |
648 | dp_packet_batch_clone(&clone_pkt_batch, batch); | |
649 | dp_packet_batch_reset_cutlen(batch); | |
650 | odp_execute_actions(dp, &clone_pkt_batch, true, nl_attr_get(actions), | |
535e3acf | 651 | nl_attr_get_size(actions), dp_execute_action); |
911b7e9b SC |
652 | } |
653 | else { | |
654 | odp_execute_actions(dp, batch, true, nl_attr_get(actions), | |
655 | nl_attr_get_size(actions), dp_execute_action); | |
656 | } | |
535e3acf AZ |
657 | } |
658 | ||
db8bb9a5 JS |
659 | static bool |
660 | requires_datapath_assistance(const struct nlattr *a) | |
661 | { | |
662 | enum ovs_action_attr type = nl_attr_type(a); | |
663 | ||
664 | switch (type) { | |
665 | /* These only make sense in the context of a datapath. */ | |
666 | case OVS_ACTION_ATTR_OUTPUT: | |
667 | case OVS_ACTION_ATTR_TUNNEL_PUSH: | |
668 | case OVS_ACTION_ATTR_TUNNEL_POP: | |
669 | case OVS_ACTION_ATTR_USERSPACE: | |
670 | case OVS_ACTION_ATTR_RECIRC: | |
07659514 | 671 | case OVS_ACTION_ATTR_CT: |
5dddf960 | 672 | case OVS_ACTION_ATTR_METER: |
db8bb9a5 JS |
673 | return true; |
674 | ||
675 | case OVS_ACTION_ATTR_SET: | |
676 | case OVS_ACTION_ATTR_SET_MASKED: | |
677 | case OVS_ACTION_ATTR_PUSH_VLAN: | |
678 | case OVS_ACTION_ATTR_POP_VLAN: | |
679 | case OVS_ACTION_ATTR_SAMPLE: | |
680 | case OVS_ACTION_ATTR_HASH: | |
681 | case OVS_ACTION_ATTR_PUSH_MPLS: | |
682 | case OVS_ACTION_ATTR_POP_MPLS: | |
aaca4fe0 | 683 | case OVS_ACTION_ATTR_TRUNC: |
6fcecb85 YY |
684 | case OVS_ACTION_ATTR_PUSH_ETH: |
685 | case OVS_ACTION_ATTR_POP_ETH: | |
535e3acf | 686 | case OVS_ACTION_ATTR_CLONE: |
f59cb331 YY |
687 | case OVS_ACTION_ATTR_PUSH_NSH: |
688 | case OVS_ACTION_ATTR_POP_NSH: | |
db8bb9a5 JS |
689 | return false; |
690 | ||
691 | case OVS_ACTION_ATTR_UNSPEC: | |
692 | case __OVS_ACTION_ATTR_MAX: | |
693 | OVS_NOT_REACHED(); | |
694 | } | |
695 | ||
696 | return false; | |
697 | } | |
698 | ||
78b76327 BP |
699 | /* Executes all of the 'actions_len' bytes of datapath actions in 'actions' on |
700 | * the packets in 'batch'. If 'steal' is true, possibly modifies and | |
701 | * definitely free the packets in 'batch', otherwise leaves 'batch' unchanged. | |
702 | * | |
703 | * Some actions (e.g. output actions) can only be executed by a datapath. This | |
704 | * function implements those actions by passing the action and the packets to | |
705 | * 'dp_execute_action' (along with 'dp'). If 'dp_execute_action' is passed a | |
706 | * true 'may_steal' parameter then it may possibly modify and must definitely | |
707 | * free the packets passed into it, otherwise it must leave them unchanged. */ | |
1164afb6 | 708 | void |
1895cc8d | 709 | odp_execute_actions(void *dp, struct dp_packet_batch *batch, bool steal, |
1164afb6 DDP |
710 | const struct nlattr *actions, size_t actions_len, |
711 | odp_execute_cb dp_execute_action) | |
f094af7b | 712 | { |
72c84bc2 | 713 | struct dp_packet *packet; |
f094af7b SH |
714 | const struct nlattr *a; |
715 | unsigned int left; | |
8cbf4f47 | 716 | |
f094af7b SH |
717 | NL_ATTR_FOR_EACH_UNSAFE (a, left, actions, actions_len) { |
718 | int type = nl_attr_type(a); | |
1164afb6 | 719 | bool last_action = (left <= NLA_ALIGN(a->nla_len)); |
f094af7b | 720 | |
db8bb9a5 | 721 | if (requires_datapath_assistance(a)) { |
09f9da0b JR |
722 | if (dp_execute_action) { |
723 | /* Allow 'dp_execute_action' to steal the packet data if we do | |
724 | * not need it any more. */ | |
1164afb6 DDP |
725 | bool may_steal = steal && last_action; |
726 | ||
1895cc8d | 727 | dp_execute_action(dp, batch, a, may_steal); |
1164afb6 | 728 | |
e5fd79c5 VDA |
729 | if (last_action || batch->count == 0) { |
730 | /* We do not need to free the packets. | |
731 | * Either dp_execute_actions() has stolen them | |
732 | * or the batch is freed due to errors. In either | |
733 | * case we do not need to execute further actions. | |
734 | */ | |
1164afb6 DDP |
735 | return; |
736 | } | |
c51876c3 | 737 | } |
db8bb9a5 JS |
738 | continue; |
739 | } | |
f094af7b | 740 | |
db8bb9a5 | 741 | switch ((enum ovs_action_attr) type) { |
c6bf49f3 AZ |
742 | case OVS_ACTION_ATTR_HASH: { |
743 | const struct ovs_action_hash *hash_act = nl_attr_get(a); | |
744 | ||
745 | /* Calculate a hash value directly. This might not match the | |
746 | * value computed by the datapath, but it is much less expensive, | |
747 | * and the current use case (bonding) does not require a strict | |
748 | * match to work properly. */ | |
749 | if (hash_act->hash_alg == OVS_HASH_ALG_L4) { | |
750 | struct flow flow; | |
751 | uint32_t hash; | |
752 | ||
72c84bc2 | 753 | DP_PACKET_BATCH_FOR_EACH (packet, batch) { |
95a6cb34 IM |
754 | /* RSS hash can be used here instead of 5tuple for |
755 | * performance reasons. */ | |
756 | if (dp_packet_rss_valid(packet)) { | |
757 | hash = dp_packet_get_rss_hash(packet); | |
758 | hash = hash_int(hash, hash_act->hash_basis); | |
759 | } else { | |
760 | flow_extract(packet, &flow); | |
761 | hash = flow_hash_5tuple(&flow, hash_act->hash_basis); | |
762 | } | |
72c84bc2 | 763 | packet->md.dp_hash = hash; |
8cbf4f47 | 764 | } |
c6bf49f3 AZ |
765 | } else { |
766 | /* Assert on unknown hash algorithm. */ | |
767 | OVS_NOT_REACHED(); | |
768 | } | |
769 | break; | |
770 | } | |
771 | ||
f094af7b SH |
772 | case OVS_ACTION_ATTR_PUSH_VLAN: { |
773 | const struct ovs_action_push_vlan *vlan = nl_attr_get(a); | |
8cbf4f47 | 774 | |
72c84bc2 AZ |
775 | DP_PACKET_BATCH_FOR_EACH (packet, batch) { |
776 | eth_push_vlan(packet, vlan->vlan_tpid, vlan->vlan_tci); | |
8cbf4f47 | 777 | } |
f094af7b SH |
778 | break; |
779 | } | |
780 | ||
781 | case OVS_ACTION_ATTR_POP_VLAN: | |
72c84bc2 AZ |
782 | DP_PACKET_BATCH_FOR_EACH (packet, batch) { |
783 | eth_pop_vlan(packet); | |
8cbf4f47 | 784 | } |
f094af7b SH |
785 | break; |
786 | ||
787 | case OVS_ACTION_ATTR_PUSH_MPLS: { | |
788 | const struct ovs_action_push_mpls *mpls = nl_attr_get(a); | |
8cbf4f47 | 789 | |
72c84bc2 AZ |
790 | DP_PACKET_BATCH_FOR_EACH (packet, batch) { |
791 | push_mpls(packet, mpls->mpls_ethertype, mpls->mpls_lse); | |
8cbf4f47 | 792 | } |
f094af7b SH |
793 | break; |
794 | } | |
795 | ||
796 | case OVS_ACTION_ATTR_POP_MPLS: | |
72c84bc2 AZ |
797 | DP_PACKET_BATCH_FOR_EACH (packet, batch) { |
798 | pop_mpls(packet, nl_attr_get_be16(a)); | |
8cbf4f47 | 799 | } |
f094af7b SH |
800 | break; |
801 | ||
802 | case OVS_ACTION_ATTR_SET: | |
72c84bc2 AZ |
803 | DP_PACKET_BATCH_FOR_EACH (packet, batch) { |
804 | odp_execute_set_action(packet, nl_attr_get(a)); | |
6d670e7f JR |
805 | } |
806 | break; | |
807 | ||
808 | case OVS_ACTION_ATTR_SET_MASKED: | |
72c84bc2 AZ |
809 | DP_PACKET_BATCH_FOR_EACH(packet, batch) { |
810 | odp_execute_masked_set_action(packet, nl_attr_get(a)); | |
8cbf4f47 | 811 | } |
f094af7b SH |
812 | break; |
813 | ||
814 | case OVS_ACTION_ATTR_SAMPLE: | |
72c84bc2 AZ |
815 | DP_PACKET_BATCH_FOR_EACH (packet, batch) { |
816 | odp_execute_sample(dp, packet, steal && last_action, a, | |
1164afb6 DDP |
817 | dp_execute_action); |
818 | } | |
819 | ||
820 | if (last_action) { | |
821 | /* We do not need to free the packets. odp_execute_sample() has | |
822 | * stolen them*/ | |
823 | return; | |
8cbf4f47 | 824 | } |
f094af7b SH |
825 | break; |
826 | ||
aaca4fe0 WT |
827 | case OVS_ACTION_ATTR_TRUNC: { |
828 | const struct ovs_action_trunc *trunc = | |
829 | nl_attr_get_unspec(a, sizeof *trunc); | |
830 | ||
831 | batch->trunc = true; | |
72c84bc2 AZ |
832 | DP_PACKET_BATCH_FOR_EACH (packet, batch) { |
833 | dp_packet_set_cutlen(packet, trunc->max_len); | |
aaca4fe0 WT |
834 | } |
835 | break; | |
836 | } | |
837 | ||
535e3acf | 838 | case OVS_ACTION_ATTR_CLONE: |
911b7e9b SC |
839 | odp_execute_clone(dp, batch, steal && last_action, a, |
840 | dp_execute_action); | |
535e3acf AZ |
841 | if (last_action) { |
842 | /* We do not need to free the packets. odp_execute_clone() has | |
843 | * stolen them. */ | |
844 | return; | |
845 | } | |
760ba862 | 846 | break; |
5dddf960 JR |
847 | case OVS_ACTION_ATTR_METER: |
848 | /* Not implemented yet. */ | |
535e3acf | 849 | break; |
88fc5281 JS |
850 | case OVS_ACTION_ATTR_PUSH_ETH: { |
851 | const struct ovs_action_push_eth *eth = nl_attr_get(a); | |
852 | ||
853 | DP_PACKET_BATCH_FOR_EACH (packet, batch) { | |
854 | push_eth(packet, ð->addresses.eth_dst, | |
855 | ð->addresses.eth_src); | |
856 | } | |
857 | break; | |
858 | } | |
859 | ||
860 | case OVS_ACTION_ATTR_POP_ETH: | |
861 | DP_PACKET_BATCH_FOR_EACH (packet, batch) { | |
862 | pop_eth(packet); | |
863 | } | |
864 | break; | |
535e3acf | 865 | |
f59cb331 YY |
866 | case OVS_ACTION_ATTR_PUSH_NSH: { |
867 | uint32_t buffer[NSH_HDR_MAX_LEN / 4]; | |
868 | struct nsh_hdr *nsh_hdr = ALIGNED_CAST(struct nsh_hdr *, buffer); | |
869 | nsh_reset_ver_flags_ttl_len(nsh_hdr); | |
870 | odp_nsh_hdr_from_attr(nl_attr_get(a), nsh_hdr, NSH_HDR_MAX_LEN); | |
1fc11c59 | 871 | DP_PACKET_BATCH_FOR_EACH (packet, batch) { |
f59cb331 | 872 | push_nsh(packet, nsh_hdr); |
1fc11c59 JS |
873 | } |
874 | break; | |
875 | } | |
f59cb331 | 876 | case OVS_ACTION_ATTR_POP_NSH: { |
95e620b4 BB |
877 | size_t i; |
878 | const size_t num = dp_packet_batch_size(batch); | |
1fc11c59 JS |
879 | |
880 | DP_PACKET_BATCH_REFILL_FOR_EACH (i, num, packet, batch) { | |
f59cb331 | 881 | if (pop_nsh(packet)) { |
1fc11c59 JS |
882 | dp_packet_batch_refill(batch, packet, i); |
883 | } else { | |
884 | dp_packet_delete(packet); | |
885 | } | |
886 | } | |
887 | break; | |
888 | } | |
889 | ||
db8bb9a5 JS |
890 | case OVS_ACTION_ATTR_OUTPUT: |
891 | case OVS_ACTION_ATTR_TUNNEL_PUSH: | |
892 | case OVS_ACTION_ATTR_TUNNEL_POP: | |
893 | case OVS_ACTION_ATTR_USERSPACE: | |
894 | case OVS_ACTION_ATTR_RECIRC: | |
07659514 | 895 | case OVS_ACTION_ATTR_CT: |
f094af7b SH |
896 | case OVS_ACTION_ATTR_UNSPEC: |
897 | case __OVS_ACTION_ATTR_MAX: | |
428b2edd | 898 | OVS_NOT_REACHED(); |
f094af7b SH |
899 | } |
900 | } | |
8cbf4f47 | 901 | |
72c84bc2 | 902 | dp_packet_delete_batch(batch, steal); |
da546e07 | 903 | } |