Lines Matching full:key

242 static int parse_ipv6hdr(struct sk_buff *skb, struct sw_flow_key *key)  in parse_ipv6hdr()  argument
257 key->ip.proto = NEXTHDR_NONE; in parse_ipv6hdr()
258 key->ip.tos = ipv6_get_dsfield(nh); in parse_ipv6hdr()
259 key->ip.ttl = nh->hop_limit; in parse_ipv6hdr()
260 key->ipv6.label = *(__be32 *)nh & htonl(IPV6_FLOWINFO_FLOWLABEL); in parse_ipv6hdr()
261 key->ipv6.addr.src = nh->saddr; in parse_ipv6hdr()
262 key->ipv6.addr.dst = nh->daddr; in parse_ipv6hdr()
267 key->ip.frag = OVS_FRAG_TYPE_LATER; in parse_ipv6hdr()
268 key->ip.proto = nexthdr; in parse_ipv6hdr()
271 key->ip.frag = OVS_FRAG_TYPE_FIRST; in parse_ipv6hdr()
273 key->ip.frag = OVS_FRAG_TYPE_NONE; in parse_ipv6hdr()
278 * used to set key->ip.frag above. in parse_ipv6hdr()
285 key->ip.proto = nexthdr; in parse_ipv6hdr()
341 static void clear_vlan(struct sw_flow_key *key) in clear_vlan() argument
343 key->eth.vlan.tci = 0; in clear_vlan()
344 key->eth.vlan.tpid = 0; in clear_vlan()
345 key->eth.cvlan.tci = 0; in clear_vlan()
346 key->eth.cvlan.tpid = 0; in clear_vlan()
349 static int parse_vlan(struct sk_buff *skb, struct sw_flow_key *key) in parse_vlan() argument
354 key->eth.vlan.tci = htons(skb->vlan_tci) | htons(VLAN_CFI_MASK); in parse_vlan()
355 key->eth.vlan.tpid = skb->vlan_proto; in parse_vlan()
358 res = parse_vlan_tag(skb, &key->eth.vlan, true); in parse_vlan()
364 res = parse_vlan_tag(skb, &key->eth.cvlan, false); in parse_vlan()
409 static int parse_icmpv6(struct sk_buff *skb, struct sw_flow_key *key, in parse_icmpv6() argument
417 key->tp.src = htons(icmp->icmp6_type); in parse_icmpv6()
418 key->tp.dst = htons(icmp->icmp6_code); in parse_icmpv6()
419 memset(&key->ipv6.nd, 0, sizeof(key->ipv6.nd)); in parse_icmpv6()
438 key->ipv6.nd.target = nd->target; in parse_icmpv6()
456 if (unlikely(!is_zero_ether_addr(key->ipv6.nd.sll))) in parse_icmpv6()
458 ether_addr_copy(key->ipv6.nd.sll, in parse_icmpv6()
462 if (unlikely(!is_zero_ether_addr(key->ipv6.nd.tll))) in parse_icmpv6()
464 ether_addr_copy(key->ipv6.nd.tll, in parse_icmpv6()
476 memset(&key->ipv6.nd.target, 0, sizeof(key->ipv6.nd.target)); in parse_icmpv6()
477 memset(key->ipv6.nd.sll, 0, sizeof(key->ipv6.nd.sll)); in parse_icmpv6()
478 memset(key->ipv6.nd.tll, 0, sizeof(key->ipv6.nd.tll)); in parse_icmpv6()
483 static int parse_nsh(struct sk_buff *skb, struct sw_flow_key *key) in parse_nsh() argument
506 key->nsh.base.flags = nsh_get_flags(nh); in parse_nsh()
507 key->nsh.base.ttl = nsh_get_ttl(nh); in parse_nsh()
508 key->nsh.base.mdtype = nh->mdtype; in parse_nsh()
509 key->nsh.base.np = nh->np; in parse_nsh()
510 key->nsh.base.path_hdr = nh->path_hdr; in parse_nsh()
511 switch (key->nsh.base.mdtype) { in parse_nsh()
515 memcpy(key->nsh.context, nh->md1.context, in parse_nsh()
519 memset(key->nsh.context, 0, in parse_nsh()
533 * @key: output flow key
537 static int key_extract_l3l4(struct sk_buff *skb, struct sw_flow_key *key) in key_extract_l3l4() argument
542 if (key->eth.type == htons(ETH_P_IP)) { in key_extract_l3l4()
548 memset(&key->ip, 0, sizeof(key->ip)); in key_extract_l3l4()
549 memset(&key->ipv4, 0, sizeof(key->ipv4)); in key_extract_l3l4()
558 key->ipv4.addr.src = nh->saddr; in key_extract_l3l4()
559 key->ipv4.addr.dst = nh->daddr; in key_extract_l3l4()
561 key->ip.proto = nh->protocol; in key_extract_l3l4()
562 key->ip.tos = nh->tos; in key_extract_l3l4()
563 key->ip.ttl = nh->ttl; in key_extract_l3l4()
567 key->ip.frag = OVS_FRAG_TYPE_LATER; in key_extract_l3l4()
568 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
573 key->ip.frag = OVS_FRAG_TYPE_FIRST; in key_extract_l3l4()
575 key->ip.frag = OVS_FRAG_TYPE_NONE; in key_extract_l3l4()
578 if (key->ip.proto == IPPROTO_TCP) { in key_extract_l3l4()
581 key->tp.src = tcp->source; in key_extract_l3l4()
582 key->tp.dst = tcp->dest; in key_extract_l3l4()
583 key->tp.flags = TCP_FLAGS_BE16(tcp); in key_extract_l3l4()
585 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
588 } else if (key->ip.proto == IPPROTO_UDP) { in key_extract_l3l4()
591 key->tp.src = udp->source; in key_extract_l3l4()
592 key->tp.dst = udp->dest; in key_extract_l3l4()
594 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
596 } else if (key->ip.proto == IPPROTO_SCTP) { in key_extract_l3l4()
599 key->tp.src = sctp->source; in key_extract_l3l4()
600 key->tp.dst = sctp->dest; in key_extract_l3l4()
602 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
604 } else if (key->ip.proto == IPPROTO_ICMP) { in key_extract_l3l4()
610 key->tp.src = htons(icmp->type); in key_extract_l3l4()
611 key->tp.dst = htons(icmp->code); in key_extract_l3l4()
613 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
617 } else if (key->eth.type == htons(ETH_P_ARP) || in key_extract_l3l4()
618 key->eth.type == htons(ETH_P_RARP)) { in key_extract_l3l4()
632 key->ip.proto = ntohs(arp->ar_op); in key_extract_l3l4()
634 key->ip.proto = 0; in key_extract_l3l4()
636 memcpy(&key->ipv4.addr.src, arp->ar_sip, sizeof(key->ipv4.addr.src)); in key_extract_l3l4()
637 memcpy(&key->ipv4.addr.dst, arp->ar_tip, sizeof(key->ipv4.addr.dst)); in key_extract_l3l4()
638 ether_addr_copy(key->ipv4.arp.sha, arp->ar_sha); in key_extract_l3l4()
639 ether_addr_copy(key->ipv4.arp.tha, arp->ar_tha); in key_extract_l3l4()
641 memset(&key->ip, 0, sizeof(key->ip)); in key_extract_l3l4()
642 memset(&key->ipv4, 0, sizeof(key->ipv4)); in key_extract_l3l4()
644 } else if (eth_p_mpls(key->eth.type)) { in key_extract_l3l4()
647 memset(&key->mpls, 0, sizeof(key->mpls)); in key_extract_l3l4()
660 memcpy(&key->mpls.lse[label_count - 1], &lse, in key_extract_l3l4()
673 key->mpls.num_labels_mask = GENMASK(label_count - 1, 0); in key_extract_l3l4()
674 } else if (key->eth.type == htons(ETH_P_IPV6)) { in key_extract_l3l4()
677 nh_len = parse_ipv6hdr(skb, key); in key_extract_l3l4()
681 memset(&key->ip, 0, sizeof(key->ip)); in key_extract_l3l4()
682 memset(&key->ipv6.addr, 0, sizeof(key->ipv6.addr)); in key_extract_l3l4()
694 if (key->ip.frag == OVS_FRAG_TYPE_LATER) { in key_extract_l3l4()
695 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
699 key->ip.frag = OVS_FRAG_TYPE_FIRST; in key_extract_l3l4()
702 if (key->ip.proto == NEXTHDR_TCP) { in key_extract_l3l4()
705 key->tp.src = tcp->source; in key_extract_l3l4()
706 key->tp.dst = tcp->dest; in key_extract_l3l4()
707 key->tp.flags = TCP_FLAGS_BE16(tcp); in key_extract_l3l4()
709 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
711 } else if (key->ip.proto == NEXTHDR_UDP) { in key_extract_l3l4()
714 key->tp.src = udp->source; in key_extract_l3l4()
715 key->tp.dst = udp->dest; in key_extract_l3l4()
717 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
719 } else if (key->ip.proto == NEXTHDR_SCTP) { in key_extract_l3l4()
722 key->tp.src = sctp->source; in key_extract_l3l4()
723 key->tp.dst = sctp->dest; in key_extract_l3l4()
725 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
727 } else if (key->ip.proto == NEXTHDR_ICMP) { in key_extract_l3l4()
729 error = parse_icmpv6(skb, key, nh_len); in key_extract_l3l4()
733 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
736 } else if (key->eth.type == htons(ETH_P_NSH)) { in key_extract_l3l4()
737 error = parse_nsh(skb, key); in key_extract_l3l4()
745 * key_extract - extracts a flow key from an Ethernet frame.
748 * @key: output flow key
759 * - skb->transport_header: If key->eth.type is ETH_P_IP or ETH_P_IPV6
762 * For other key->eth.type values it is left untouched.
765 * Equals to key->eth.type.
769 static int key_extract(struct sk_buff *skb, struct sw_flow_key *key) in key_extract() argument
774 key->tp.flags = 0; in key_extract()
779 clear_vlan(key); in key_extract()
780 if (ovs_key_mac_proto(key) == MAC_PROTO_NONE) { in key_extract()
785 key->eth.type = skb->protocol; in key_extract()
788 ether_addr_copy(key->eth.src, eth->h_source); in key_extract()
789 ether_addr_copy(key->eth.dst, eth->h_dest); in key_extract()
796 if (unlikely(parse_vlan(skb, key))) in key_extract()
799 key->eth.type = parse_ethertype(skb); in key_extract()
800 if (unlikely(key->eth.type == htons(0))) in key_extract()
807 if (key->eth.cvlan.tci & htons(VLAN_CFI_MASK)) in key_extract()
808 skb->protocol = key->eth.cvlan.tpid; in key_extract()
810 skb->protocol = key->eth.type; in key_extract()
818 /* Fill out L3/L4 key info, if any */ in key_extract()
819 return key_extract_l3l4(skb, key); in key_extract()
825 int ovs_flow_key_update_l3l4(struct sk_buff *skb, struct sw_flow_key *key) in ovs_flow_key_update_l3l4() argument
827 return key_extract_l3l4(skb, key); in ovs_flow_key_update_l3l4()
830 int ovs_flow_key_update(struct sk_buff *skb, struct sw_flow_key *key) in ovs_flow_key_update() argument
834 res = key_extract(skb, key); in ovs_flow_key_update()
836 key->mac_proto &= ~SW_FLOW_KEY_INVALID; in ovs_flow_key_update()
856 struct sk_buff *skb, struct sw_flow_key *key) in ovs_flow_key_extract() argument
866 key->tun_proto = ip_tunnel_info_af(tun_info); in ovs_flow_key_extract()
867 memcpy(&key->tun_key, &tun_info->key, sizeof(key->tun_key)); in ovs_flow_key_extract()
872 > sizeof(key->tun_opts)); in ovs_flow_key_extract()
874 ip_tunnel_info_opts_get(TUN_METADATA_OPTS(key, tun_info->options_len), in ovs_flow_key_extract()
876 key->tun_opts_len = tun_info->options_len; in ovs_flow_key_extract()
878 key->tun_opts_len = 0; in ovs_flow_key_extract()
881 key->tun_proto = 0; in ovs_flow_key_extract()
882 key->tun_opts_len = 0; in ovs_flow_key_extract()
883 memset(&key->tun_key, 0, sizeof(key->tun_key)); in ovs_flow_key_extract()
886 key->phy.priority = skb->priority; in ovs_flow_key_extract()
887 key->phy.in_port = OVS_CB(skb)->input_vport->port_no; in ovs_flow_key_extract()
888 key->phy.skb_mark = skb->mark; in ovs_flow_key_extract()
889 key->ovs_flow_hash = 0; in ovs_flow_key_extract()
893 key->mac_proto = res; in ovs_flow_key_extract()
898 key->recirc_id = tc_ext ? tc_ext->chain : 0; in ovs_flow_key_extract()
902 key->recirc_id = 0; in ovs_flow_key_extract()
905 key->recirc_id = 0; in ovs_flow_key_extract()
908 err = key_extract(skb, key); in ovs_flow_key_extract()
910 ovs_ct_fill_key(skb, key, post_ct); /* Must be after key_extract(). */ in ovs_flow_key_extract()
916 struct sw_flow_key *key, bool log) in ovs_flow_key_extract_userspace() argument
927 err = ovs_nla_get_flow_metadata(net, a, attrs, key, log); in ovs_flow_key_extract_userspace()
936 * For L2 packet key eth type would be zero. skb protocol in ovs_flow_key_extract_userspace()
937 * would be set to correct value later during key-extact. in ovs_flow_key_extract_userspace()
940 skb->protocol = key->eth.type; in ovs_flow_key_extract_userspace()
941 err = key_extract(skb, key); in ovs_flow_key_extract_userspace()
946 * for packets for which it makes sense. Otherwise the key may be in ovs_flow_key_extract_userspace()
947 * corrupted due to overlapping key fields. in ovs_flow_key_extract_userspace()
950 key->eth.type != htons(ETH_P_IP)) in ovs_flow_key_extract_userspace()
953 (key->eth.type != htons(ETH_P_IPV6) || in ovs_flow_key_extract_userspace()
954 sw_flow_key_is_nd(key))) in ovs_flow_key_extract_userspace()