1 /* SPDX-License-Identifier: GPL-2.0-only */
3 * Copyright (c) 2007-2017 Nicira, Inc.
9 #include <linux/cache.h>
10 #include <linux/kernel.h>
11 #include <linux/netlink.h>
12 #include <linux/openvswitch.h>
13 #include <linux/spinlock.h>
14 #include <linux/types.h>
15 #include <linux/rcupdate.h>
16 #include <linux/if_ether.h>
17 #include <linux/in6.h>
18 #include <linux/jiffies.h>
19 #include <linux/time.h>
20 #include <linux/cpumask.h>
21 #include <net/inet_ecn.h>
22 #include <net/ip_tunnels.h>
23 #include <net/dst_metadata.h>
28 enum sw_flow_mac_proto
{
32 #define SW_FLOW_KEY_INVALID 0x80
34 /* Store options at the end of the array if they are less than the
35 * maximum size. This allows us to get the benefits of variable length
36 * matching for small options.
38 #define TUN_METADATA_OFFSET(opt_len) \
39 (FIELD_SIZEOF(struct sw_flow_key, tun_opts) - opt_len)
40 #define TUN_METADATA_OPTS(flow_key, opt_len) \
41 ((void *)((flow_key)->tun_opts + TUN_METADATA_OFFSET(opt_len)))
43 struct ovs_tunnel_info
{
44 struct metadata_dst
*tun_dst
;
48 __be16 tpid
; /* Vlan type. Generally 802.1q or 802.1ad.*/
49 __be16 tci
; /* 0 if no VLAN, VLAN_CFI_MASK set otherwise. */
52 #define OVS_SW_FLOW_KEY_METADATA_SIZE \
53 (offsetof(struct sw_flow_key, recirc_id) + \
54 FIELD_SIZEOF(struct sw_flow_key, recirc_id))
57 struct ovs_nsh_key_base base
;
58 __be32 context
[NSH_MD1_CONTEXT_SIZE
];
62 u8 tun_opts
[IP_TUNNEL_OPTS_MAX
];
64 struct ip_tunnel_key tun_key
; /* Encapsulating tunnel key. */
66 u32 priority
; /* Packet QoS priority. */
67 u32 skb_mark
; /* SKB mark. */
68 u16 in_port
; /* Input switch port (or DP_MAX_PORTS). */
69 } __packed phy
; /* Safe when right after 'tun_key'. */
70 u8 mac_proto
; /* MAC layer protocol (e.g. Ethernet). */
71 u8 tun_proto
; /* Protocol of encapsulating tunnel. */
72 u32 ovs_flow_hash
; /* Datapath computed hash value. */
73 u32 recirc_id
; /* Recirculation ID. */
75 u8 src
[ETH_ALEN
]; /* Ethernet source address. */
76 u8 dst
[ETH_ALEN
]; /* Ethernet destination address. */
77 struct vlan_head vlan
;
78 struct vlan_head cvlan
;
79 __be16 type
; /* Ethernet frame type. */
81 /* Filling a hole of two bytes. */
83 u8 ct_orig_proto
; /* CT original direction tuple IP
88 __be32 top_lse
; /* top label stack entry */
91 u8 proto
; /* IP protocol or lower 8 bits of ARP opcode. */
93 u8 ttl
; /* IP TTL/hop limit. */
94 u8 frag
; /* One of OVS_FRAG_TYPE_*. */
97 u16 ct_zone
; /* Conntrack zone. */
99 __be16 src
; /* TCP/UDP/SCTP source port. */
100 __be16 dst
; /* TCP/UDP/SCTP destination port. */
101 __be16 flags
; /* TCP flags. */
106 __be32 src
; /* IP source address. */
107 __be32 dst
; /* IP destination address. */
113 } ct_orig
; /* Conntrack original direction fields. */
115 u8 sha
[ETH_ALEN
]; /* ARP source hardware address. */
116 u8 tha
[ETH_ALEN
]; /* ARP target hardware address. */
122 struct in6_addr src
; /* IPv6 source address. */
123 struct in6_addr dst
; /* IPv6 destination address. */
125 __be32 label
; /* IPv6 flow label. */
130 } ct_orig
; /* Conntrack original direction fields. */
132 struct in6_addr target
; /* ND target address. */
133 u8 sll
[ETH_ALEN
]; /* ND source link layer address. */
134 u8 tll
[ETH_ALEN
]; /* ND target link layer address. */
138 struct ovs_key_nsh nsh
; /* network service header */
141 /* Connection tracking fields not packed above. */
143 __be16 src
; /* CT orig tuple tp src port. */
144 __be16 dst
; /* CT orig tuple tp dst port. */
147 struct ovs_key_ct_labels labels
;
150 } __aligned(BITS_PER_LONG
/8); /* Ensure that we can do comparisons as longs. */
152 static inline bool sw_flow_key_is_nd(const struct sw_flow_key
*key
)
154 return key
->eth
.type
== htons(ETH_P_IPV6
) &&
155 key
->ip
.proto
== NEXTHDR_ICMP
&&
157 (key
->tp
.src
== htons(NDISC_NEIGHBOUR_SOLICITATION
) ||
158 key
->tp
.src
== htons(NDISC_NEIGHBOUR_ADVERTISEMENT
));
161 struct sw_flow_key_range
{
162 unsigned short int start
;
163 unsigned short int end
;
166 struct sw_flow_mask
{
169 struct list_head list
;
170 struct sw_flow_key_range range
;
171 struct sw_flow_key key
;
174 struct sw_flow_match
{
175 struct sw_flow_key
*key
;
176 struct sw_flow_key_range range
;
177 struct sw_flow_mask
*mask
;
180 #define MAX_UFID_LENGTH 16 /* 128 bits */
185 u32 ufid
[MAX_UFID_LENGTH
/ 4];
186 struct sw_flow_key
*unmasked_key
;
190 struct sw_flow_actions
{
192 size_t orig_len
; /* From flow_cmd_new netlink actions size */
194 struct nlattr actions
[];
198 u64 packet_count
; /* Number of packets matched. */
199 u64 byte_count
; /* Number of bytes matched. */
200 unsigned long used
; /* Last used time (in jiffies). */
201 spinlock_t lock
; /* Lock for atomic stats update. */
202 __be16 tcp_flags
; /* Union of seen TCP flags. */
208 struct hlist_node node
[2];
210 } flow_table
, ufid_table
;
211 int stats_last_writer
; /* CPU id of the last writer on
214 struct sw_flow_key key
;
215 struct sw_flow_id id
;
216 struct cpumask cpu_used_mask
;
217 struct sw_flow_mask
*mask
;
218 struct sw_flow_actions __rcu
*sf_acts
;
219 struct flow_stats __rcu
*stats
[]; /* One for each CPU. First one
220 * is allocated at flow creation time,
221 * the rest are allocated on demand
222 * while holding the 'stats[0].lock'.
226 struct arp_eth_header
{
227 __be16 ar_hrd
; /* format of hardware address */
228 __be16 ar_pro
; /* format of protocol address */
229 unsigned char ar_hln
; /* length of hardware address */
230 unsigned char ar_pln
; /* length of protocol address */
231 __be16 ar_op
; /* ARP opcode (command) */
233 /* Ethernet+IPv4 specific members. */
234 unsigned char ar_sha
[ETH_ALEN
]; /* sender hardware address */
235 unsigned char ar_sip
[4]; /* sender IP address */
236 unsigned char ar_tha
[ETH_ALEN
]; /* target hardware address */
237 unsigned char ar_tip
[4]; /* target IP address */
240 static inline u8
ovs_key_mac_proto(const struct sw_flow_key
*key
)
242 return key
->mac_proto
& ~SW_FLOW_KEY_INVALID
;
245 static inline u16
__ovs_mac_header_len(u8 mac_proto
)
247 return mac_proto
== MAC_PROTO_ETHERNET
? ETH_HLEN
: 0;
250 static inline u16
ovs_mac_header_len(const struct sw_flow_key
*key
)
252 return __ovs_mac_header_len(ovs_key_mac_proto(key
));
255 static inline bool ovs_identifier_is_ufid(const struct sw_flow_id
*sfid
)
257 return sfid
->ufid_len
;
260 static inline bool ovs_identifier_is_key(const struct sw_flow_id
*sfid
)
262 return !ovs_identifier_is_ufid(sfid
);
265 void ovs_flow_stats_update(struct sw_flow
*, __be16 tcp_flags
,
266 const struct sk_buff
*);
267 void ovs_flow_stats_get(const struct sw_flow
*, struct ovs_flow_stats
*,
268 unsigned long *used
, __be16
*tcp_flags
);
269 void ovs_flow_stats_clear(struct sw_flow
*);
270 u64
ovs_flow_used_time(unsigned long flow_jiffies
);
272 int ovs_flow_key_update(struct sk_buff
*skb
, struct sw_flow_key
*key
);
273 int ovs_flow_key_extract(const struct ip_tunnel_info
*tun_info
,
275 struct sw_flow_key
*key
);
276 /* Extract key from packet coming from userspace. */
277 int ovs_flow_key_extract_userspace(struct net
*net
, const struct nlattr
*attr
,
279 struct sw_flow_key
*key
, bool log
);