]> git.proxmox.com Git - ovs.git/blob - ovn/controller/lflow.c
actions: Bundle action parsing parameters into a structure.
[ovs.git] / ovn / controller / lflow.c
1 /* Copyright (c) 2015 Nicira, Inc.
2 *
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16 #include <config.h>
17 #include "lflow.h"
18 #include "dynamic-string.h"
19 #include "ofctrl.h"
20 #include "ofp-actions.h"
21 #include "ofpbuf.h"
22 #include "openvswitch/vlog.h"
23 #include "ovn/controller/ovn-controller.h"
24 #include "ovn/lib/actions.h"
25 #include "ovn/lib/expr.h"
26 #include "ovn/lib/ovn-sb-idl.h"
27 #include "packets.h"
28 #include "simap.h"
29
30 VLOG_DEFINE_THIS_MODULE(lflow);
31 \f
32 /* Symbol table. */
33
34 /* Contains "struct expr_symbol"s for fields supported by OVN lflows. */
35 static struct shash symtab;
36
37 static void
38 add_logical_register(struct shash *symtab, enum mf_field_id id)
39 {
40 char name[8];
41
42 snprintf(name, sizeof name, "reg%d", id - MFF_REG0);
43 expr_symtab_add_field(symtab, name, id, NULL, false);
44 }
45
46 static void
47 symtab_init(void)
48 {
49 shash_init(&symtab);
50
51 /* Reserve a pair of registers for the logical inport and outport. A full
52 * 32-bit register each is bigger than we need, but the expression code
53 * doesn't yet support string fields that occupy less than a full OXM. */
54 expr_symtab_add_string(&symtab, "inport", MFF_LOG_INPORT, NULL);
55 expr_symtab_add_string(&symtab, "outport", MFF_LOG_OUTPORT, NULL);
56
57 /* Logical registers. */
58 #define MFF_LOG_REG(ID) add_logical_register(&symtab, ID);
59 MFF_LOG_REGS;
60 #undef MFF_LOG_REG
61
62 /* Connection tracking state. */
63 expr_symtab_add_field(&symtab, "ct_state", MFF_CT_STATE, NULL, false);
64 char ct_state_str[16];
65 snprintf(ct_state_str, sizeof ct_state_str, "ct_state[%d]", CS_TRACKED_BIT);
66 expr_symtab_add_predicate(&symtab, "ct.trk", ct_state_str);
67 snprintf(ct_state_str, sizeof ct_state_str, "ct_state[%d]", CS_NEW_BIT);
68 expr_symtab_add_subfield(&symtab, "ct.new", "ct.trk", ct_state_str);
69 snprintf(ct_state_str, sizeof ct_state_str, "ct_state[%d]", CS_ESTABLISHED_BIT);
70 expr_symtab_add_subfield(&symtab, "ct.est", "ct.trk", ct_state_str);
71 snprintf(ct_state_str, sizeof ct_state_str, "ct_state[%d]", CS_RELATED_BIT);
72 expr_symtab_add_subfield(&symtab, "ct.rel", "ct.trk", ct_state_str);
73 snprintf(ct_state_str, sizeof ct_state_str, "ct_state[%d]", CS_REPLY_DIR_BIT);
74 expr_symtab_add_subfield(&symtab, "ct.rpl", "ct.trk", ct_state_str);
75 snprintf(ct_state_str, sizeof ct_state_str, "ct_state[%d]", CS_INVALID_BIT);
76 expr_symtab_add_subfield(&symtab, "ct.inv", "ct.trk", ct_state_str);
77
78 /* Data fields. */
79 expr_symtab_add_field(&symtab, "eth.src", MFF_ETH_SRC, NULL, false);
80 expr_symtab_add_field(&symtab, "eth.dst", MFF_ETH_DST, NULL, false);
81 expr_symtab_add_field(&symtab, "eth.type", MFF_ETH_TYPE, NULL, true);
82 expr_symtab_add_predicate(&symtab, "eth.bcast",
83 "eth.dst == ff:ff:ff:ff:ff:ff");
84 expr_symtab_add_subfield(&symtab, "eth.mcast", NULL, "eth.dst[40]");
85
86 expr_symtab_add_field(&symtab, "vlan.tci", MFF_VLAN_TCI, NULL, false);
87 expr_symtab_add_predicate(&symtab, "vlan.present", "vlan.tci[12]");
88 expr_symtab_add_subfield(&symtab, "vlan.pcp", "vlan.present",
89 "vlan.tci[13..15]");
90 expr_symtab_add_subfield(&symtab, "vlan.vid", "vlan.present",
91 "vlan.tci[0..11]");
92
93 expr_symtab_add_predicate(&symtab, "ip4", "eth.type == 0x800");
94 expr_symtab_add_predicate(&symtab, "ip6", "eth.type == 0x86dd");
95 expr_symtab_add_predicate(&symtab, "ip", "ip4 || ip6");
96 expr_symtab_add_field(&symtab, "ip.proto", MFF_IP_PROTO, "ip", true);
97 expr_symtab_add_field(&symtab, "ip.dscp", MFF_IP_DSCP, "ip", false);
98 expr_symtab_add_field(&symtab, "ip.ecn", MFF_IP_ECN, "ip", false);
99 expr_symtab_add_field(&symtab, "ip.ttl", MFF_IP_TTL, "ip", false);
100
101 expr_symtab_add_field(&symtab, "ip4.src", MFF_IPV4_SRC, "ip4", false);
102 expr_symtab_add_field(&symtab, "ip4.dst", MFF_IPV4_DST, "ip4", false);
103 expr_symtab_add_predicate(&symtab, "ip4.mcast", "ip4.dst[28..31] == 0xe");
104
105 expr_symtab_add_predicate(&symtab, "icmp4", "ip4 && ip.proto == 1");
106 expr_symtab_add_field(&symtab, "icmp4.type", MFF_ICMPV4_TYPE, "icmp4",
107 false);
108 expr_symtab_add_field(&symtab, "icmp4.code", MFF_ICMPV4_CODE, "icmp4",
109 false);
110
111 expr_symtab_add_field(&symtab, "ip6.src", MFF_IPV6_SRC, "ip6", false);
112 expr_symtab_add_field(&symtab, "ip6.dst", MFF_IPV6_DST, "ip6", false);
113 expr_symtab_add_field(&symtab, "ip6.label", MFF_IPV6_LABEL, "ip6", false);
114
115 expr_symtab_add_predicate(&symtab, "icmp6", "ip6 && ip.proto == 58");
116 expr_symtab_add_field(&symtab, "icmp6.type", MFF_ICMPV6_TYPE, "icmp6",
117 true);
118 expr_symtab_add_field(&symtab, "icmp6.code", MFF_ICMPV6_CODE, "icmp6",
119 true);
120
121 expr_symtab_add_predicate(&symtab, "icmp", "icmp4 || icmp6");
122
123 expr_symtab_add_field(&symtab, "ip.frag", MFF_IP_FRAG, "ip", false);
124 expr_symtab_add_predicate(&symtab, "ip.is_frag", "ip.frag[0]");
125 expr_symtab_add_predicate(&symtab, "ip.later_frag", "ip.frag[1]");
126 expr_symtab_add_predicate(&symtab, "ip.first_frag",
127 "ip.is_frag && !ip.later_frag");
128
129 expr_symtab_add_predicate(&symtab, "arp", "eth.type == 0x806");
130 expr_symtab_add_field(&symtab, "arp.op", MFF_ARP_OP, "arp", false);
131 expr_symtab_add_field(&symtab, "arp.spa", MFF_ARP_SPA, "arp", false);
132 expr_symtab_add_field(&symtab, "arp.sha", MFF_ARP_SHA, "arp", false);
133 expr_symtab_add_field(&symtab, "arp.tpa", MFF_ARP_TPA, "arp", false);
134 expr_symtab_add_field(&symtab, "arp.tha", MFF_ARP_THA, "arp", false);
135
136 expr_symtab_add_predicate(&symtab, "nd",
137 "icmp6.type == {135, 136} && icmp6.code == 0");
138 expr_symtab_add_field(&symtab, "nd.target", MFF_ND_TARGET, "nd", false);
139 expr_symtab_add_field(&symtab, "nd.sll", MFF_ND_SLL,
140 "nd && icmp6.type == 135", false);
141 expr_symtab_add_field(&symtab, "nd.tll", MFF_ND_TLL,
142 "nd && icmp6.type == 136", false);
143
144 expr_symtab_add_predicate(&symtab, "tcp", "ip.proto == 6");
145 expr_symtab_add_field(&symtab, "tcp.src", MFF_TCP_SRC, "tcp", false);
146 expr_symtab_add_field(&symtab, "tcp.dst", MFF_TCP_DST, "tcp", false);
147 expr_symtab_add_field(&symtab, "tcp.flags", MFF_TCP_FLAGS, "tcp", false);
148
149 expr_symtab_add_predicate(&symtab, "udp", "ip.proto == 17");
150 expr_symtab_add_field(&symtab, "udp.src", MFF_UDP_SRC, "udp", false);
151 expr_symtab_add_field(&symtab, "udp.dst", MFF_UDP_DST, "udp", false);
152
153 expr_symtab_add_predicate(&symtab, "sctp", "ip.proto == 132");
154 expr_symtab_add_field(&symtab, "sctp.src", MFF_SCTP_SRC, "sctp", false);
155 expr_symtab_add_field(&symtab, "sctp.dst", MFF_SCTP_DST, "sctp", false);
156 }
157 \f
158 /* Logical datapaths and logical port numbers. */
159
160 /* A logical datapath.
161 *
162 * 'ports' maps 'logical_port' names to 'tunnel_key' values in the OVN_SB
163 * Port_Binding table within the logical datapath. */
164 struct logical_datapath {
165 struct hmap_node hmap_node; /* Indexed on 'uuid'. */
166 struct uuid uuid; /* UUID from Datapath_Binding row. */
167 uint32_t tunnel_key; /* 'tunnel_key' from Datapath_Binding row. */
168 struct simap ports; /* Logical port name to port number. */
169 };
170
171 /* Contains "struct logical_datapath"s. */
172 static struct hmap logical_datapaths = HMAP_INITIALIZER(&logical_datapaths);
173
174 /* Finds and returns the logical_datapath for 'binding', or NULL if no such
175 * logical_datapath exists. */
176 static struct logical_datapath *
177 ldp_lookup(const struct sbrec_datapath_binding *binding)
178 {
179 struct logical_datapath *ldp;
180 HMAP_FOR_EACH_IN_BUCKET (ldp, hmap_node, uuid_hash(&binding->header_.uuid),
181 &logical_datapaths) {
182 if (uuid_equals(&ldp->uuid, &binding->header_.uuid)) {
183 return ldp;
184 }
185 }
186 return NULL;
187 }
188
189 /* Creates a new logical_datapath for the given 'binding'. */
190 static struct logical_datapath *
191 ldp_create(const struct sbrec_datapath_binding *binding)
192 {
193 struct logical_datapath *ldp;
194
195 ldp = xmalloc(sizeof *ldp);
196 hmap_insert(&logical_datapaths, &ldp->hmap_node,
197 uuid_hash(&binding->header_.uuid));
198 ldp->uuid = binding->header_.uuid;
199 ldp->tunnel_key = binding->tunnel_key;
200 simap_init(&ldp->ports);
201 return ldp;
202 }
203
204 static struct logical_datapath *
205 ldp_lookup_or_create(const struct sbrec_datapath_binding *binding)
206 {
207 struct logical_datapath *ldp = ldp_lookup(binding);
208 return ldp ? ldp : ldp_create(binding);
209 }
210
211 static void
212 ldp_free(struct logical_datapath *ldp)
213 {
214 simap_destroy(&ldp->ports);
215 hmap_remove(&logical_datapaths, &ldp->hmap_node);
216 free(ldp);
217 }
218
219 /* Iterates through all of the records in the Port_Binding table, updating the
220 * table of logical_datapaths to match the values found in active
221 * Port_Bindings. */
222 static void
223 ldp_run(struct controller_ctx *ctx)
224 {
225 struct logical_datapath *ldp;
226 HMAP_FOR_EACH (ldp, hmap_node, &logical_datapaths) {
227 simap_clear(&ldp->ports);
228 }
229
230 const struct sbrec_port_binding *binding;
231 SBREC_PORT_BINDING_FOR_EACH (binding, ctx->ovnsb_idl) {
232 struct logical_datapath *ldp = ldp_lookup_or_create(binding->datapath);
233
234 simap_put(&ldp->ports, binding->logical_port, binding->tunnel_key);
235 }
236
237 const struct sbrec_multicast_group *mc;
238 SBREC_MULTICAST_GROUP_FOR_EACH (mc, ctx->ovnsb_idl) {
239 struct logical_datapath *ldp = ldp_lookup_or_create(mc->datapath);
240 simap_put(&ldp->ports, mc->name, mc->tunnel_key);
241 }
242
243 struct logical_datapath *next_ldp;
244 HMAP_FOR_EACH_SAFE (ldp, next_ldp, hmap_node, &logical_datapaths) {
245 if (simap_is_empty(&ldp->ports)) {
246 ldp_free(ldp);
247 }
248 }
249 }
250
251 static void
252 ldp_destroy(void)
253 {
254 struct logical_datapath *ldp, *next_ldp;
255 HMAP_FOR_EACH_SAFE (ldp, next_ldp, hmap_node, &logical_datapaths) {
256 ldp_free(ldp);
257 }
258 }
259 \f
260 void
261 lflow_init(void)
262 {
263 symtab_init();
264 }
265
266 /* Translates logical flows in the Logical_Flow table in the OVN_SB database
267 * into OpenFlow flows. See ovn-architecture(7) for more information. */
268 void
269 lflow_run(struct controller_ctx *ctx, struct hmap *flow_table,
270 const struct simap *ct_zones)
271 {
272 struct hmap flows = HMAP_INITIALIZER(&flows);
273 uint32_t conj_id_ofs = 1;
274
275 ldp_run(ctx);
276
277 const struct sbrec_logical_flow *lflow;
278 SBREC_LOGICAL_FLOW_FOR_EACH (lflow, ctx->ovnsb_idl) {
279 /* Find the "struct logical_datapath" asssociated with this
280 * Logical_Flow row. If there's no such struct, that must be because
281 * no logical ports are bound to that logical datapath, so there's no
282 * point in maintaining any flows for it anyway, so skip it. */
283 const struct logical_datapath *ldp;
284 ldp = ldp_lookup(lflow->logical_datapath);
285 if (!ldp) {
286 continue;
287 }
288
289 /* Determine translation of logical table IDs to physical table IDs. */
290 bool ingress = !strcmp(lflow->pipeline, "ingress");
291 uint8_t first_ptable = (ingress
292 ? OFTABLE_LOG_INGRESS_PIPELINE
293 : OFTABLE_LOG_EGRESS_PIPELINE);
294 uint8_t ptable = first_ptable + lflow->table_id;
295 uint8_t output_ptable = (ingress
296 ? OFTABLE_REMOTE_OUTPUT
297 : OFTABLE_LOG_TO_PHY);
298
299 /* Translate OVN actions into OpenFlow actions.
300 *
301 * XXX Deny changes to 'outport' in egress pipeline. */
302 uint64_t ofpacts_stub[64 / 8];
303 struct ofpbuf ofpacts;
304 struct expr *prereqs;
305 char *error;
306
307 ofpbuf_use_stub(&ofpacts, ofpacts_stub, sizeof ofpacts_stub);
308 struct action_params ap = {
309 .symtab = &symtab,
310 .ports = &ldp->ports,
311 .ct_zones = ct_zones,
312
313 .n_tables = LOG_PIPELINE_LEN,
314 .first_ptable = first_ptable,
315 .cur_ltable = lflow->table_id,
316 .output_ptable = output_ptable,
317 };
318 error = actions_parse_string(lflow->actions, &ap, &ofpacts, &prereqs);
319 if (error) {
320 static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 1);
321 VLOG_WARN_RL(&rl, "error parsing actions \"%s\": %s",
322 lflow->actions, error);
323 free(error);
324 continue;
325 }
326
327 /* Translate OVN match into table of OpenFlow matches. */
328 struct hmap matches;
329 struct expr *expr;
330
331 expr = expr_parse_string(lflow->match, &symtab, &error);
332 if (!error) {
333 if (prereqs) {
334 expr = expr_combine(EXPR_T_AND, expr, prereqs);
335 prereqs = NULL;
336 }
337 expr = expr_annotate(expr, &symtab, &error);
338 }
339 if (error) {
340 static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 1);
341 VLOG_WARN_RL(&rl, "error parsing match \"%s\": %s",
342 lflow->match, error);
343 expr_destroy(prereqs);
344 ofpbuf_uninit(&ofpacts);
345 free(error);
346 continue;
347 }
348
349 expr = expr_simplify(expr);
350 expr = expr_normalize(expr);
351 uint32_t n_conjs = expr_to_matches(expr, &ldp->ports, &matches);
352 expr_destroy(expr);
353
354 /* Prepare the OpenFlow matches for adding to the flow table. */
355 struct expr_match *m;
356 HMAP_FOR_EACH (m, hmap_node, &matches) {
357 match_set_metadata(&m->match, htonll(ldp->tunnel_key));
358 if (m->match.wc.masks.conj_id) {
359 m->match.flow.conj_id += conj_id_ofs;
360 }
361 if (!m->n) {
362 ofctrl_add_flow(flow_table, ptable, lflow->priority,
363 &m->match, &ofpacts);
364 } else {
365 uint64_t conj_stubs[64 / 8];
366 struct ofpbuf conj;
367
368 ofpbuf_use_stub(&conj, conj_stubs, sizeof conj_stubs);
369 for (int i = 0; i < m->n; i++) {
370 const struct cls_conjunction *src = &m->conjunctions[i];
371 struct ofpact_conjunction *dst;
372
373 dst = ofpact_put_CONJUNCTION(&conj);
374 dst->id = src->id + conj_id_ofs;
375 dst->clause = src->clause;
376 dst->n_clauses = src->n_clauses;
377 }
378 ofctrl_add_flow(flow_table, ptable, lflow->priority,
379 &m->match, &conj);
380 ofpbuf_uninit(&conj);
381 }
382 }
383
384 /* Clean up. */
385 expr_matches_destroy(&matches);
386 ofpbuf_uninit(&ofpacts);
387 conj_id_ofs += n_conjs;
388 }
389 }
390
391 void
392 lflow_destroy(void)
393 {
394 expr_symtab_destroy(&symtab);
395 ldp_destroy();
396 }