Loading...
1/*
2 * Copyright (c) 2007-2014 Nicira, Inc.
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of version 2 of the GNU General Public
6 * License as published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope that it will be useful, but
9 * WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
11 * General Public License for more details.
12 *
13 * You should have received a copy of the GNU General Public License
14 * along with this program; if not, write to the Free Software
15 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
16 * 02110-1301, USA
17 */
18
19#ifndef FLOW_H
20#define FLOW_H 1
21
22#include <linux/cache.h>
23#include <linux/kernel.h>
24#include <linux/netlink.h>
25#include <linux/openvswitch.h>
26#include <linux/spinlock.h>
27#include <linux/types.h>
28#include <linux/rcupdate.h>
29#include <linux/if_ether.h>
30#include <linux/in6.h>
31#include <linux/jiffies.h>
32#include <linux/time.h>
33#include <linux/flex_array.h>
34#include <net/inet_ecn.h>
35#include <net/ip_tunnels.h>
36#include <net/dst_metadata.h>
37
38struct sk_buff;
39
40enum sw_flow_mac_proto {
41 MAC_PROTO_NONE = 0,
42 MAC_PROTO_ETHERNET,
43};
44#define SW_FLOW_KEY_INVALID 0x80
45
46/* Store options at the end of the array if they are less than the
47 * maximum size. This allows us to get the benefits of variable length
48 * matching for small options.
49 */
50#define TUN_METADATA_OFFSET(opt_len) \
51 (FIELD_SIZEOF(struct sw_flow_key, tun_opts) - opt_len)
52#define TUN_METADATA_OPTS(flow_key, opt_len) \
53 ((void *)((flow_key)->tun_opts + TUN_METADATA_OFFSET(opt_len)))
54
55struct ovs_tunnel_info {
56 struct metadata_dst *tun_dst;
57};
58
59struct vlan_head {
60 __be16 tpid; /* Vlan type. Generally 802.1q or 802.1ad.*/
61 __be16 tci; /* 0 if no VLAN, VLAN_TAG_PRESENT set otherwise. */
62};
63
64#define OVS_SW_FLOW_KEY_METADATA_SIZE \
65 (offsetof(struct sw_flow_key, recirc_id) + \
66 FIELD_SIZEOF(struct sw_flow_key, recirc_id))
67
68struct sw_flow_key {
69 u8 tun_opts[IP_TUNNEL_OPTS_MAX];
70 u8 tun_opts_len;
71 struct ip_tunnel_key tun_key; /* Encapsulating tunnel key. */
72 struct {
73 u32 priority; /* Packet QoS priority. */
74 u32 skb_mark; /* SKB mark. */
75 u16 in_port; /* Input switch port (or DP_MAX_PORTS). */
76 } __packed phy; /* Safe when right after 'tun_key'. */
77 u8 mac_proto; /* MAC layer protocol (e.g. Ethernet). */
78 u8 tun_proto; /* Protocol of encapsulating tunnel. */
79 u32 ovs_flow_hash; /* Datapath computed hash value. */
80 u32 recirc_id; /* Recirculation ID. */
81 struct {
82 u8 src[ETH_ALEN]; /* Ethernet source address. */
83 u8 dst[ETH_ALEN]; /* Ethernet destination address. */
84 struct vlan_head vlan;
85 struct vlan_head cvlan;
86 __be16 type; /* Ethernet frame type. */
87 } eth;
88 union {
89 struct {
90 __be32 top_lse; /* top label stack entry */
91 } mpls;
92 struct {
93 u8 proto; /* IP protocol or lower 8 bits of ARP opcode. */
94 u8 tos; /* IP ToS. */
95 u8 ttl; /* IP TTL/hop limit. */
96 u8 frag; /* One of OVS_FRAG_TYPE_*. */
97 } ip;
98 };
99 struct {
100 __be16 src; /* TCP/UDP/SCTP source port. */
101 __be16 dst; /* TCP/UDP/SCTP destination port. */
102 __be16 flags; /* TCP flags. */
103 } tp;
104 union {
105 struct {
106 struct {
107 __be32 src; /* IP source address. */
108 __be32 dst; /* IP destination address. */
109 } addr;
110 struct {
111 u8 sha[ETH_ALEN]; /* ARP source hardware address. */
112 u8 tha[ETH_ALEN]; /* ARP target hardware address. */
113 } arp;
114 } ipv4;
115 struct {
116 struct {
117 struct in6_addr src; /* IPv6 source address. */
118 struct in6_addr dst; /* IPv6 destination address. */
119 } addr;
120 __be32 label; /* IPv6 flow label. */
121 struct {
122 struct in6_addr target; /* ND target address. */
123 u8 sll[ETH_ALEN]; /* ND source link layer address. */
124 u8 tll[ETH_ALEN]; /* ND target link layer address. */
125 } nd;
126 } ipv6;
127 };
128 struct {
129 /* Connection tracking fields. */
130 u16 zone;
131 u32 mark;
132 u8 state;
133 struct ovs_key_ct_labels labels;
134 } ct;
135
136} __aligned(BITS_PER_LONG/8); /* Ensure that we can do comparisons as longs. */
137
138struct sw_flow_key_range {
139 unsigned short int start;
140 unsigned short int end;
141};
142
143struct sw_flow_mask {
144 int ref_count;
145 struct rcu_head rcu;
146 struct list_head list;
147 struct sw_flow_key_range range;
148 struct sw_flow_key key;
149};
150
151struct sw_flow_match {
152 struct sw_flow_key *key;
153 struct sw_flow_key_range range;
154 struct sw_flow_mask *mask;
155};
156
157#define MAX_UFID_LENGTH 16 /* 128 bits */
158
159struct sw_flow_id {
160 u32 ufid_len;
161 union {
162 u32 ufid[MAX_UFID_LENGTH / 4];
163 struct sw_flow_key *unmasked_key;
164 };
165};
166
167struct sw_flow_actions {
168 struct rcu_head rcu;
169 size_t orig_len; /* From flow_cmd_new netlink actions size */
170 u32 actions_len;
171 struct nlattr actions[];
172};
173
174struct flow_stats {
175 u64 packet_count; /* Number of packets matched. */
176 u64 byte_count; /* Number of bytes matched. */
177 unsigned long used; /* Last used time (in jiffies). */
178 spinlock_t lock; /* Lock for atomic stats update. */
179 __be16 tcp_flags; /* Union of seen TCP flags. */
180};
181
182struct sw_flow {
183 struct rcu_head rcu;
184 struct {
185 struct hlist_node node[2];
186 u32 hash;
187 } flow_table, ufid_table;
188 int stats_last_writer; /* CPU id of the last writer on
189 * 'stats[0]'.
190 */
191 struct sw_flow_key key;
192 struct sw_flow_id id;
193 struct sw_flow_mask *mask;
194 struct sw_flow_actions __rcu *sf_acts;
195 struct flow_stats __rcu *stats[]; /* One for each CPU. First one
196 * is allocated at flow creation time,
197 * the rest are allocated on demand
198 * while holding the 'stats[0].lock'.
199 */
200};
201
202struct arp_eth_header {
203 __be16 ar_hrd; /* format of hardware address */
204 __be16 ar_pro; /* format of protocol address */
205 unsigned char ar_hln; /* length of hardware address */
206 unsigned char ar_pln; /* length of protocol address */
207 __be16 ar_op; /* ARP opcode (command) */
208
209 /* Ethernet+IPv4 specific members. */
210 unsigned char ar_sha[ETH_ALEN]; /* sender hardware address */
211 unsigned char ar_sip[4]; /* sender IP address */
212 unsigned char ar_tha[ETH_ALEN]; /* target hardware address */
213 unsigned char ar_tip[4]; /* target IP address */
214} __packed;
215
216static inline u8 ovs_key_mac_proto(const struct sw_flow_key *key)
217{
218 return key->mac_proto & ~SW_FLOW_KEY_INVALID;
219}
220
221static inline u16 __ovs_mac_header_len(u8 mac_proto)
222{
223 return mac_proto == MAC_PROTO_ETHERNET ? ETH_HLEN : 0;
224}
225
226static inline u16 ovs_mac_header_len(const struct sw_flow_key *key)
227{
228 return __ovs_mac_header_len(ovs_key_mac_proto(key));
229}
230
231static inline bool ovs_identifier_is_ufid(const struct sw_flow_id *sfid)
232{
233 return sfid->ufid_len;
234}
235
236static inline bool ovs_identifier_is_key(const struct sw_flow_id *sfid)
237{
238 return !ovs_identifier_is_ufid(sfid);
239}
240
241void ovs_flow_stats_update(struct sw_flow *, __be16 tcp_flags,
242 const struct sk_buff *);
243void ovs_flow_stats_get(const struct sw_flow *, struct ovs_flow_stats *,
244 unsigned long *used, __be16 *tcp_flags);
245void ovs_flow_stats_clear(struct sw_flow *);
246u64 ovs_flow_used_time(unsigned long flow_jiffies);
247
248int ovs_flow_key_update(struct sk_buff *skb, struct sw_flow_key *key);
249int ovs_flow_key_extract(const struct ip_tunnel_info *tun_info,
250 struct sk_buff *skb,
251 struct sw_flow_key *key);
252/* Extract key from packet coming from userspace. */
253int ovs_flow_key_extract_userspace(struct net *net, const struct nlattr *attr,
254 struct sk_buff *skb,
255 struct sw_flow_key *key, bool log);
256
257#endif /* flow.h */
1/*
2 * Copyright (c) 2007-2017 Nicira, Inc.
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of version 2 of the GNU General Public
6 * License as published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope that it will be useful, but
9 * WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
11 * General Public License for more details.
12 *
13 * You should have received a copy of the GNU General Public License
14 * along with this program; if not, write to the Free Software
15 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
16 * 02110-1301, USA
17 */
18
19#ifndef FLOW_H
20#define FLOW_H 1
21
22#include <linux/cache.h>
23#include <linux/kernel.h>
24#include <linux/netlink.h>
25#include <linux/openvswitch.h>
26#include <linux/spinlock.h>
27#include <linux/types.h>
28#include <linux/rcupdate.h>
29#include <linux/if_ether.h>
30#include <linux/in6.h>
31#include <linux/jiffies.h>
32#include <linux/time.h>
33#include <linux/flex_array.h>
34#include <linux/cpumask.h>
35#include <net/inet_ecn.h>
36#include <net/ip_tunnels.h>
37#include <net/dst_metadata.h>
38#include <net/nsh.h>
39
40struct sk_buff;
41
42enum sw_flow_mac_proto {
43 MAC_PROTO_NONE = 0,
44 MAC_PROTO_ETHERNET,
45};
46#define SW_FLOW_KEY_INVALID 0x80
47
48/* Store options at the end of the array if they are less than the
49 * maximum size. This allows us to get the benefits of variable length
50 * matching for small options.
51 */
52#define TUN_METADATA_OFFSET(opt_len) \
53 (FIELD_SIZEOF(struct sw_flow_key, tun_opts) - opt_len)
54#define TUN_METADATA_OPTS(flow_key, opt_len) \
55 ((void *)((flow_key)->tun_opts + TUN_METADATA_OFFSET(opt_len)))
56
57struct ovs_tunnel_info {
58 struct metadata_dst *tun_dst;
59};
60
61struct vlan_head {
62 __be16 tpid; /* Vlan type. Generally 802.1q or 802.1ad.*/
63 __be16 tci; /* 0 if no VLAN, VLAN_TAG_PRESENT set otherwise. */
64};
65
66#define OVS_SW_FLOW_KEY_METADATA_SIZE \
67 (offsetof(struct sw_flow_key, recirc_id) + \
68 FIELD_SIZEOF(struct sw_flow_key, recirc_id))
69
70struct ovs_key_nsh {
71 struct ovs_nsh_key_base base;
72 __be32 context[NSH_MD1_CONTEXT_SIZE];
73};
74
75struct sw_flow_key {
76 u8 tun_opts[IP_TUNNEL_OPTS_MAX];
77 u8 tun_opts_len;
78 struct ip_tunnel_key tun_key; /* Encapsulating tunnel key. */
79 struct {
80 u32 priority; /* Packet QoS priority. */
81 u32 skb_mark; /* SKB mark. */
82 u16 in_port; /* Input switch port (or DP_MAX_PORTS). */
83 } __packed phy; /* Safe when right after 'tun_key'. */
84 u8 mac_proto; /* MAC layer protocol (e.g. Ethernet). */
85 u8 tun_proto; /* Protocol of encapsulating tunnel. */
86 u32 ovs_flow_hash; /* Datapath computed hash value. */
87 u32 recirc_id; /* Recirculation ID. */
88 struct {
89 u8 src[ETH_ALEN]; /* Ethernet source address. */
90 u8 dst[ETH_ALEN]; /* Ethernet destination address. */
91 struct vlan_head vlan;
92 struct vlan_head cvlan;
93 __be16 type; /* Ethernet frame type. */
94 } eth;
95 /* Filling a hole of two bytes. */
96 u8 ct_state;
97 u8 ct_orig_proto; /* CT original direction tuple IP
98 * protocol.
99 */
100 union {
101 struct {
102 __be32 top_lse; /* top label stack entry */
103 } mpls;
104 struct {
105 u8 proto; /* IP protocol or lower 8 bits of ARP opcode. */
106 u8 tos; /* IP ToS. */
107 u8 ttl; /* IP TTL/hop limit. */
108 u8 frag; /* One of OVS_FRAG_TYPE_*. */
109 } ip;
110 };
111 u16 ct_zone; /* Conntrack zone. */
112 struct {
113 __be16 src; /* TCP/UDP/SCTP source port. */
114 __be16 dst; /* TCP/UDP/SCTP destination port. */
115 __be16 flags; /* TCP flags. */
116 } tp;
117 union {
118 struct {
119 struct {
120 __be32 src; /* IP source address. */
121 __be32 dst; /* IP destination address. */
122 } addr;
123 union {
124 struct {
125 __be32 src;
126 __be32 dst;
127 } ct_orig; /* Conntrack original direction fields. */
128 struct {
129 u8 sha[ETH_ALEN]; /* ARP source hardware address. */
130 u8 tha[ETH_ALEN]; /* ARP target hardware address. */
131 } arp;
132 };
133 } ipv4;
134 struct {
135 struct {
136 struct in6_addr src; /* IPv6 source address. */
137 struct in6_addr dst; /* IPv6 destination address. */
138 } addr;
139 __be32 label; /* IPv6 flow label. */
140 union {
141 struct {
142 struct in6_addr src;
143 struct in6_addr dst;
144 } ct_orig; /* Conntrack original direction fields. */
145 struct {
146 struct in6_addr target; /* ND target address. */
147 u8 sll[ETH_ALEN]; /* ND source link layer address. */
148 u8 tll[ETH_ALEN]; /* ND target link layer address. */
149 } nd;
150 };
151 } ipv6;
152 struct ovs_key_nsh nsh; /* network service header */
153 };
154 struct {
155 /* Connection tracking fields not packed above. */
156 struct {
157 __be16 src; /* CT orig tuple tp src port. */
158 __be16 dst; /* CT orig tuple tp dst port. */
159 } orig_tp;
160 u32 mark;
161 struct ovs_key_ct_labels labels;
162 } ct;
163
164} __aligned(BITS_PER_LONG/8); /* Ensure that we can do comparisons as longs. */
165
166static inline bool sw_flow_key_is_nd(const struct sw_flow_key *key)
167{
168 return key->eth.type == htons(ETH_P_IPV6) &&
169 key->ip.proto == NEXTHDR_ICMP &&
170 key->tp.dst == 0 &&
171 (key->tp.src == htons(NDISC_NEIGHBOUR_SOLICITATION) ||
172 key->tp.src == htons(NDISC_NEIGHBOUR_ADVERTISEMENT));
173}
174
175struct sw_flow_key_range {
176 unsigned short int start;
177 unsigned short int end;
178};
179
180struct sw_flow_mask {
181 int ref_count;
182 struct rcu_head rcu;
183 struct list_head list;
184 struct sw_flow_key_range range;
185 struct sw_flow_key key;
186};
187
188struct sw_flow_match {
189 struct sw_flow_key *key;
190 struct sw_flow_key_range range;
191 struct sw_flow_mask *mask;
192};
193
194#define MAX_UFID_LENGTH 16 /* 128 bits */
195
196struct sw_flow_id {
197 u32 ufid_len;
198 union {
199 u32 ufid[MAX_UFID_LENGTH / 4];
200 struct sw_flow_key *unmasked_key;
201 };
202};
203
204struct sw_flow_actions {
205 struct rcu_head rcu;
206 size_t orig_len; /* From flow_cmd_new netlink actions size */
207 u32 actions_len;
208 struct nlattr actions[];
209};
210
211struct flow_stats {
212 u64 packet_count; /* Number of packets matched. */
213 u64 byte_count; /* Number of bytes matched. */
214 unsigned long used; /* Last used time (in jiffies). */
215 spinlock_t lock; /* Lock for atomic stats update. */
216 __be16 tcp_flags; /* Union of seen TCP flags. */
217};
218
219struct sw_flow {
220 struct rcu_head rcu;
221 struct {
222 struct hlist_node node[2];
223 u32 hash;
224 } flow_table, ufid_table;
225 int stats_last_writer; /* CPU id of the last writer on
226 * 'stats[0]'.
227 */
228 struct sw_flow_key key;
229 struct sw_flow_id id;
230 struct cpumask cpu_used_mask;
231 struct sw_flow_mask *mask;
232 struct sw_flow_actions __rcu *sf_acts;
233 struct flow_stats __rcu *stats[]; /* One for each CPU. First one
234 * is allocated at flow creation time,
235 * the rest are allocated on demand
236 * while holding the 'stats[0].lock'.
237 */
238};
239
240struct arp_eth_header {
241 __be16 ar_hrd; /* format of hardware address */
242 __be16 ar_pro; /* format of protocol address */
243 unsigned char ar_hln; /* length of hardware address */
244 unsigned char ar_pln; /* length of protocol address */
245 __be16 ar_op; /* ARP opcode (command) */
246
247 /* Ethernet+IPv4 specific members. */
248 unsigned char ar_sha[ETH_ALEN]; /* sender hardware address */
249 unsigned char ar_sip[4]; /* sender IP address */
250 unsigned char ar_tha[ETH_ALEN]; /* target hardware address */
251 unsigned char ar_tip[4]; /* target IP address */
252} __packed;
253
254static inline u8 ovs_key_mac_proto(const struct sw_flow_key *key)
255{
256 return key->mac_proto & ~SW_FLOW_KEY_INVALID;
257}
258
259static inline u16 __ovs_mac_header_len(u8 mac_proto)
260{
261 return mac_proto == MAC_PROTO_ETHERNET ? ETH_HLEN : 0;
262}
263
264static inline u16 ovs_mac_header_len(const struct sw_flow_key *key)
265{
266 return __ovs_mac_header_len(ovs_key_mac_proto(key));
267}
268
269static inline bool ovs_identifier_is_ufid(const struct sw_flow_id *sfid)
270{
271 return sfid->ufid_len;
272}
273
274static inline bool ovs_identifier_is_key(const struct sw_flow_id *sfid)
275{
276 return !ovs_identifier_is_ufid(sfid);
277}
278
279void ovs_flow_stats_update(struct sw_flow *, __be16 tcp_flags,
280 const struct sk_buff *);
281void ovs_flow_stats_get(const struct sw_flow *, struct ovs_flow_stats *,
282 unsigned long *used, __be16 *tcp_flags);
283void ovs_flow_stats_clear(struct sw_flow *);
284u64 ovs_flow_used_time(unsigned long flow_jiffies);
285
286int ovs_flow_key_update(struct sk_buff *skb, struct sw_flow_key *key);
287int ovs_flow_key_extract(const struct ip_tunnel_info *tun_info,
288 struct sk_buff *skb,
289 struct sw_flow_key *key);
290/* Extract key from packet coming from userspace. */
291int ovs_flow_key_extract_userspace(struct net *net, const struct nlattr *attr,
292 struct sk_buff *skb,
293 struct sw_flow_key *key, bool log);
294
295#endif /* flow.h */