Loading...
1/*
2 * Copyright (c) 2007-2011 Nicira Networks.
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of version 2 of the GNU General Public
6 * License as published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope that it will be useful, but
9 * WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
11 * General Public License for more details.
12 *
13 * You should have received a copy of the GNU General Public License
14 * along with this program; if not, write to the Free Software
15 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
16 * 02110-1301, USA
17 */
18
19#ifndef FLOW_H
20#define FLOW_H 1
21
22#include <linux/kernel.h>
23#include <linux/netlink.h>
24#include <linux/openvswitch.h>
25#include <linux/spinlock.h>
26#include <linux/types.h>
27#include <linux/rcupdate.h>
28#include <linux/if_ether.h>
29#include <linux/in6.h>
30#include <linux/jiffies.h>
31#include <linux/time.h>
32#include <linux/flex_array.h>
33#include <net/inet_ecn.h>
34
35struct sk_buff;
36
37struct sw_flow_actions {
38 struct rcu_head rcu;
39 u32 actions_len;
40 struct nlattr actions[];
41};
42
43struct sw_flow_key {
44 struct {
45 u32 priority; /* Packet QoS priority. */
46 u16 in_port; /* Input switch port (or USHRT_MAX). */
47 } phy;
48 struct {
49 u8 src[ETH_ALEN]; /* Ethernet source address. */
50 u8 dst[ETH_ALEN]; /* Ethernet destination address. */
51 __be16 tci; /* 0 if no VLAN, VLAN_TAG_PRESENT set otherwise. */
52 __be16 type; /* Ethernet frame type. */
53 } eth;
54 struct {
55 u8 proto; /* IP protocol or lower 8 bits of ARP opcode. */
56 u8 tos; /* IP ToS. */
57 u8 ttl; /* IP TTL/hop limit. */
58 u8 frag; /* One of OVS_FRAG_TYPE_*. */
59 } ip;
60 union {
61 struct {
62 struct {
63 __be32 src; /* IP source address. */
64 __be32 dst; /* IP destination address. */
65 } addr;
66 union {
67 struct {
68 __be16 src; /* TCP/UDP source port. */
69 __be16 dst; /* TCP/UDP destination port. */
70 } tp;
71 struct {
72 u8 sha[ETH_ALEN]; /* ARP source hardware address. */
73 u8 tha[ETH_ALEN]; /* ARP target hardware address. */
74 } arp;
75 };
76 } ipv4;
77 struct {
78 struct {
79 struct in6_addr src; /* IPv6 source address. */
80 struct in6_addr dst; /* IPv6 destination address. */
81 } addr;
82 __be32 label; /* IPv6 flow label. */
83 struct {
84 __be16 src; /* TCP/UDP source port. */
85 __be16 dst; /* TCP/UDP destination port. */
86 } tp;
87 struct {
88 struct in6_addr target; /* ND target address. */
89 u8 sll[ETH_ALEN]; /* ND source link layer address. */
90 u8 tll[ETH_ALEN]; /* ND target link layer address. */
91 } nd;
92 } ipv6;
93 };
94};
95
96struct sw_flow {
97 struct rcu_head rcu;
98 struct hlist_node hash_node[2];
99 u32 hash;
100
101 struct sw_flow_key key;
102 struct sw_flow_actions __rcu *sf_acts;
103
104 spinlock_t lock; /* Lock for values below. */
105 unsigned long used; /* Last used time (in jiffies). */
106 u64 packet_count; /* Number of packets matched. */
107 u64 byte_count; /* Number of bytes matched. */
108 u8 tcp_flags; /* Union of seen TCP flags. */
109};
110
111struct arp_eth_header {
112 __be16 ar_hrd; /* format of hardware address */
113 __be16 ar_pro; /* format of protocol address */
114 unsigned char ar_hln; /* length of hardware address */
115 unsigned char ar_pln; /* length of protocol address */
116 __be16 ar_op; /* ARP opcode (command) */
117
118 /* Ethernet+IPv4 specific members. */
119 unsigned char ar_sha[ETH_ALEN]; /* sender hardware address */
120 unsigned char ar_sip[4]; /* sender IP address */
121 unsigned char ar_tha[ETH_ALEN]; /* target hardware address */
122 unsigned char ar_tip[4]; /* target IP address */
123} __packed;
124
125int ovs_flow_init(void);
126void ovs_flow_exit(void);
127
128struct sw_flow *ovs_flow_alloc(void);
129void ovs_flow_deferred_free(struct sw_flow *);
130void ovs_flow_free(struct sw_flow *flow);
131
132struct sw_flow_actions *ovs_flow_actions_alloc(const struct nlattr *);
133void ovs_flow_deferred_free_acts(struct sw_flow_actions *);
134
135int ovs_flow_extract(struct sk_buff *, u16 in_port, struct sw_flow_key *,
136 int *key_lenp);
137void ovs_flow_used(struct sw_flow *, struct sk_buff *);
138u64 ovs_flow_used_time(unsigned long flow_jiffies);
139
140/* Upper bound on the length of a nlattr-formatted flow key. The longest
141 * nlattr-formatted flow key would be:
142 *
143 * struct pad nl hdr total
144 * ------ --- ------ -----
145 * OVS_KEY_ATTR_PRIORITY 4 -- 4 8
146 * OVS_KEY_ATTR_IN_PORT 4 -- 4 8
147 * OVS_KEY_ATTR_ETHERNET 12 -- 4 16
148 * OVS_KEY_ATTR_8021Q 4 -- 4 8
149 * OVS_KEY_ATTR_ETHERTYPE 2 2 4 8
150 * OVS_KEY_ATTR_IPV6 40 -- 4 44
151 * OVS_KEY_ATTR_ICMPV6 2 2 4 8
152 * OVS_KEY_ATTR_ND 28 -- 4 32
153 * -------------------------------------------------
154 * total 132
155 */
156#define FLOW_BUFSIZE 132
157
158int ovs_flow_to_nlattrs(const struct sw_flow_key *, struct sk_buff *);
159int ovs_flow_from_nlattrs(struct sw_flow_key *swkey, int *key_lenp,
160 const struct nlattr *);
161int ovs_flow_metadata_from_nlattrs(u32 *priority, u16 *in_port,
162 const struct nlattr *);
163
164#define TBL_MIN_BUCKETS 1024
165
166struct flow_table {
167 struct flex_array *buckets;
168 unsigned int count, n_buckets;
169 struct rcu_head rcu;
170 int node_ver;
171 u32 hash_seed;
172 bool keep_flows;
173};
174
175static inline int ovs_flow_tbl_count(struct flow_table *table)
176{
177 return table->count;
178}
179
180static inline int ovs_flow_tbl_need_to_expand(struct flow_table *table)
181{
182 return (table->count > table->n_buckets);
183}
184
185struct sw_flow *ovs_flow_tbl_lookup(struct flow_table *table,
186 struct sw_flow_key *key, int len);
187void ovs_flow_tbl_destroy(struct flow_table *table);
188void ovs_flow_tbl_deferred_destroy(struct flow_table *table);
189struct flow_table *ovs_flow_tbl_alloc(int new_size);
190struct flow_table *ovs_flow_tbl_expand(struct flow_table *table);
191struct flow_table *ovs_flow_tbl_rehash(struct flow_table *table);
192void ovs_flow_tbl_insert(struct flow_table *table, struct sw_flow *flow);
193void ovs_flow_tbl_remove(struct flow_table *table, struct sw_flow *flow);
194u32 ovs_flow_hash(const struct sw_flow_key *key, int key_len);
195
196struct sw_flow *ovs_flow_tbl_next(struct flow_table *table, u32 *bucket, u32 *idx);
197extern const int ovs_key_lens[OVS_KEY_ATTR_MAX + 1];
198
199#endif /* flow.h */
1/* SPDX-License-Identifier: GPL-2.0-only */
2/*
3 * Copyright (c) 2007-2017 Nicira, Inc.
4 */
5
6#ifndef FLOW_H
7#define FLOW_H 1
8
9#include <linux/cache.h>
10#include <linux/kernel.h>
11#include <linux/netlink.h>
12#include <linux/openvswitch.h>
13#include <linux/spinlock.h>
14#include <linux/types.h>
15#include <linux/rcupdate.h>
16#include <linux/if_ether.h>
17#include <linux/in6.h>
18#include <linux/jiffies.h>
19#include <linux/time.h>
20#include <linux/cpumask.h>
21#include <net/inet_ecn.h>
22#include <net/ip_tunnels.h>
23#include <net/dst_metadata.h>
24#include <net/nsh.h>
25
26struct sk_buff;
27
28enum sw_flow_mac_proto {
29 MAC_PROTO_NONE = 0,
30 MAC_PROTO_ETHERNET,
31};
32#define SW_FLOW_KEY_INVALID 0x80
33#define MPLS_LABEL_DEPTH 3
34
35/* Bit definitions for IPv6 Extension Header pseudo-field. */
36enum ofp12_ipv6exthdr_flags {
37 OFPIEH12_NONEXT = 1 << 0, /* "No next header" encountered. */
38 OFPIEH12_ESP = 1 << 1, /* Encrypted Sec Payload header present. */
39 OFPIEH12_AUTH = 1 << 2, /* Authentication header present. */
40 OFPIEH12_DEST = 1 << 3, /* 1 or 2 dest headers present. */
41 OFPIEH12_FRAG = 1 << 4, /* Fragment header present. */
42 OFPIEH12_ROUTER = 1 << 5, /* Router header present. */
43 OFPIEH12_HOP = 1 << 6, /* Hop-by-hop header present. */
44 OFPIEH12_UNREP = 1 << 7, /* Unexpected repeats encountered. */
45 OFPIEH12_UNSEQ = 1 << 8 /* Unexpected sequencing encountered. */
46};
47
48/* Store options at the end of the array if they are less than the
49 * maximum size. This allows us to get the benefits of variable length
50 * matching for small options.
51 */
52#define TUN_METADATA_OFFSET(opt_len) \
53 (sizeof_field(struct sw_flow_key, tun_opts) - opt_len)
54#define TUN_METADATA_OPTS(flow_key, opt_len) \
55 ((void *)((flow_key)->tun_opts + TUN_METADATA_OFFSET(opt_len)))
56
57struct ovs_tunnel_info {
58 struct metadata_dst *tun_dst;
59};
60
61struct vlan_head {
62 __be16 tpid; /* Vlan type. Generally 802.1q or 802.1ad.*/
63 __be16 tci; /* 0 if no VLAN, VLAN_CFI_MASK set otherwise. */
64};
65
66#define OVS_SW_FLOW_KEY_METADATA_SIZE \
67 (offsetof(struct sw_flow_key, recirc_id) + \
68 sizeof_field(struct sw_flow_key, recirc_id))
69
70struct ovs_key_nsh {
71 struct ovs_nsh_key_base base;
72 __be32 context[NSH_MD1_CONTEXT_SIZE];
73};
74
75struct sw_flow_key {
76 u8 tun_opts[IP_TUNNEL_OPTS_MAX];
77 u8 tun_opts_len;
78 struct ip_tunnel_key tun_key; /* Encapsulating tunnel key. */
79 struct {
80 u32 priority; /* Packet QoS priority. */
81 u32 skb_mark; /* SKB mark. */
82 u16 in_port; /* Input switch port (or DP_MAX_PORTS). */
83 } __packed phy; /* Safe when right after 'tun_key'. */
84 u8 mac_proto; /* MAC layer protocol (e.g. Ethernet). */
85 u8 tun_proto; /* Protocol of encapsulating tunnel. */
86 u32 ovs_flow_hash; /* Datapath computed hash value. */
87 u32 recirc_id; /* Recirculation ID. */
88 struct {
89 u8 src[ETH_ALEN]; /* Ethernet source address. */
90 u8 dst[ETH_ALEN]; /* Ethernet destination address. */
91 struct vlan_head vlan;
92 struct vlan_head cvlan;
93 __be16 type; /* Ethernet frame type. */
94 } eth;
95 /* Filling a hole of two bytes. */
96 u8 ct_state;
97 u8 ct_orig_proto; /* CT original direction tuple IP
98 * protocol.
99 */
100 union {
101 struct {
102 u8 proto; /* IP protocol or lower 8 bits of ARP opcode. */
103 u8 tos; /* IP ToS. */
104 u8 ttl; /* IP TTL/hop limit. */
105 u8 frag; /* One of OVS_FRAG_TYPE_*. */
106 } ip;
107 };
108 u16 ct_zone; /* Conntrack zone. */
109 struct {
110 __be16 src; /* TCP/UDP/SCTP source port. */
111 __be16 dst; /* TCP/UDP/SCTP destination port. */
112 __be16 flags; /* TCP flags. */
113 } tp;
114 union {
115 struct {
116 struct {
117 __be32 src; /* IP source address. */
118 __be32 dst; /* IP destination address. */
119 } addr;
120 union {
121 struct {
122 __be32 src;
123 __be32 dst;
124 } ct_orig; /* Conntrack original direction fields. */
125 struct {
126 u8 sha[ETH_ALEN]; /* ARP source hardware address. */
127 u8 tha[ETH_ALEN]; /* ARP target hardware address. */
128 } arp;
129 };
130 } ipv4;
131 struct {
132 struct {
133 struct in6_addr src; /* IPv6 source address. */
134 struct in6_addr dst; /* IPv6 destination address. */
135 } addr;
136 __be32 label; /* IPv6 flow label. */
137 u16 exthdrs; /* IPv6 extension header flags */
138 union {
139 struct {
140 struct in6_addr src;
141 struct in6_addr dst;
142 } ct_orig; /* Conntrack original direction fields. */
143 struct {
144 struct in6_addr target; /* ND target address. */
145 u8 sll[ETH_ALEN]; /* ND source link layer address. */
146 u8 tll[ETH_ALEN]; /* ND target link layer address. */
147 } nd;
148 };
149 } ipv6;
150 struct {
151 u32 num_labels_mask; /* labels present bitmap of effective length MPLS_LABEL_DEPTH */
152 __be32 lse[MPLS_LABEL_DEPTH]; /* label stack entry */
153 } mpls;
154
155 struct ovs_key_nsh nsh; /* network service header */
156 };
157 struct {
158 /* Connection tracking fields not packed above. */
159 struct {
160 __be16 src; /* CT orig tuple tp src port. */
161 __be16 dst; /* CT orig tuple tp dst port. */
162 } orig_tp;
163 u32 mark;
164 struct ovs_key_ct_labels labels;
165 } ct;
166
167} __aligned(BITS_PER_LONG/8); /* Ensure that we can do comparisons as longs. */
168
169static inline bool sw_flow_key_is_nd(const struct sw_flow_key *key)
170{
171 return key->eth.type == htons(ETH_P_IPV6) &&
172 key->ip.proto == NEXTHDR_ICMP &&
173 key->tp.dst == 0 &&
174 (key->tp.src == htons(NDISC_NEIGHBOUR_SOLICITATION) ||
175 key->tp.src == htons(NDISC_NEIGHBOUR_ADVERTISEMENT));
176}
177
178struct sw_flow_key_range {
179 unsigned short int start;
180 unsigned short int end;
181};
182
183struct sw_flow_mask {
184 int ref_count;
185 struct rcu_head rcu;
186 struct sw_flow_key_range range;
187 struct sw_flow_key key;
188};
189
190struct sw_flow_match {
191 struct sw_flow_key *key;
192 struct sw_flow_key_range range;
193 struct sw_flow_mask *mask;
194};
195
196#define MAX_UFID_LENGTH 16 /* 128 bits */
197
198struct sw_flow_id {
199 u32 ufid_len;
200 union {
201 u32 ufid[MAX_UFID_LENGTH / 4];
202 struct sw_flow_key *unmasked_key;
203 };
204};
205
206struct sw_flow_actions {
207 struct rcu_head rcu;
208 size_t orig_len; /* From flow_cmd_new netlink actions size */
209 u32 actions_len;
210 struct nlattr actions[];
211};
212
213struct sw_flow_stats {
214 u64 packet_count; /* Number of packets matched. */
215 u64 byte_count; /* Number of bytes matched. */
216 unsigned long used; /* Last used time (in jiffies). */
217 spinlock_t lock; /* Lock for atomic stats update. */
218 __be16 tcp_flags; /* Union of seen TCP flags. */
219};
220
221struct sw_flow {
222 struct rcu_head rcu;
223 struct {
224 struct hlist_node node[2];
225 u32 hash;
226 } flow_table, ufid_table;
227 int stats_last_writer; /* CPU id of the last writer on
228 * 'stats[0]'.
229 */
230 struct sw_flow_key key;
231 struct sw_flow_id id;
232 struct cpumask *cpu_used_mask;
233 struct sw_flow_mask *mask;
234 struct sw_flow_actions __rcu *sf_acts;
235 struct sw_flow_stats __rcu *stats[]; /* One for each CPU. First one
236 * is allocated at flow creation time,
237 * the rest are allocated on demand
238 * while holding the 'stats[0].lock'.
239 */
240};
241
242struct arp_eth_header {
243 __be16 ar_hrd; /* format of hardware address */
244 __be16 ar_pro; /* format of protocol address */
245 unsigned char ar_hln; /* length of hardware address */
246 unsigned char ar_pln; /* length of protocol address */
247 __be16 ar_op; /* ARP opcode (command) */
248
249 /* Ethernet+IPv4 specific members. */
250 unsigned char ar_sha[ETH_ALEN]; /* sender hardware address */
251 unsigned char ar_sip[4]; /* sender IP address */
252 unsigned char ar_tha[ETH_ALEN]; /* target hardware address */
253 unsigned char ar_tip[4]; /* target IP address */
254} __packed;
255
256static inline u8 ovs_key_mac_proto(const struct sw_flow_key *key)
257{
258 return key->mac_proto & ~SW_FLOW_KEY_INVALID;
259}
260
261static inline u16 __ovs_mac_header_len(u8 mac_proto)
262{
263 return mac_proto == MAC_PROTO_ETHERNET ? ETH_HLEN : 0;
264}
265
266static inline u16 ovs_mac_header_len(const struct sw_flow_key *key)
267{
268 return __ovs_mac_header_len(ovs_key_mac_proto(key));
269}
270
271static inline bool ovs_identifier_is_ufid(const struct sw_flow_id *sfid)
272{
273 return sfid->ufid_len;
274}
275
276static inline bool ovs_identifier_is_key(const struct sw_flow_id *sfid)
277{
278 return !ovs_identifier_is_ufid(sfid);
279}
280
281void ovs_flow_stats_update(struct sw_flow *, __be16 tcp_flags,
282 const struct sk_buff *);
283void ovs_flow_stats_get(const struct sw_flow *, struct ovs_flow_stats *,
284 unsigned long *used, __be16 *tcp_flags);
285void ovs_flow_stats_clear(struct sw_flow *);
286u64 ovs_flow_used_time(unsigned long flow_jiffies);
287
288int ovs_flow_key_update(struct sk_buff *skb, struct sw_flow_key *key);
289int ovs_flow_key_update_l3l4(struct sk_buff *skb, struct sw_flow_key *key);
290int ovs_flow_key_extract(const struct ip_tunnel_info *tun_info,
291 struct sk_buff *skb,
292 struct sw_flow_key *key);
293/* Extract key from packet coming from userspace. */
294int ovs_flow_key_extract_userspace(struct net *net, const struct nlattr *attr,
295 struct sk_buff *skb,
296 struct sw_flow_key *key, bool log);
297
298#endif /* flow.h */