flow.h 8.1 KB
Newer Older
1
/*
2
 * Copyright (c) 2007-2017 Nicira, Inc.
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of version 2 of the GNU General Public
 * License as published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
 * 02110-1301, USA
 */

#ifndef FLOW_H
#define FLOW_H 1

22
#include <linux/cache.h>
23 24 25 26 27 28 29 30 31 32 33 34
#include <linux/kernel.h>
#include <linux/netlink.h>
#include <linux/openvswitch.h>
#include <linux/spinlock.h>
#include <linux/types.h>
#include <linux/rcupdate.h>
#include <linux/if_ether.h>
#include <linux/in6.h>
#include <linux/jiffies.h>
#include <linux/time.h>
#include <linux/flex_array.h>
#include <net/inet_ecn.h>
35
#include <net/ip_tunnels.h>
36
#include <net/dst_metadata.h>
37 38 39

struct sk_buff;

40 41 42 43 44 45
enum sw_flow_mac_proto {
	MAC_PROTO_NONE = 0,
	MAC_PROTO_ETHERNET,
};
#define SW_FLOW_KEY_INVALID	0x80

46 47 48 49
/* Store options at the end of the array if they are less than the
 * maximum size. This allows us to get the benefits of variable length
 * matching for small options.
 */
50 51 52 53
#define TUN_METADATA_OFFSET(opt_len) \
	(FIELD_SIZEOF(struct sw_flow_key, tun_opts) - opt_len)
#define TUN_METADATA_OPTS(flow_key, opt_len) \
	((void *)((flow_key)->tun_opts + TUN_METADATA_OFFSET(opt_len)))
54

55 56 57 58
struct ovs_tunnel_info {
	struct metadata_dst	*tun_dst;
};

59 60 61 62 63
struct vlan_head {
	__be16 tpid; /* Vlan type. Generally 802.1q or 802.1ad.*/
	__be16 tci;  /* 0 if no VLAN, VLAN_TAG_PRESENT set otherwise. */
};

64 65 66 67
#define OVS_SW_FLOW_KEY_METADATA_SIZE			\
	(offsetof(struct sw_flow_key, recirc_id) +	\
	FIELD_SIZEOF(struct sw_flow_key, recirc_id))

68
struct sw_flow_key {
69
	u8 tun_opts[IP_TUNNEL_OPTS_MAX];
70
	u8 tun_opts_len;
71
	struct ip_tunnel_key tun_key;	/* Encapsulating tunnel key. */
72 73
	struct {
		u32	priority;	/* Packet QoS priority. */
74
		u32	skb_mark;	/* SKB mark. */
75
		u16	in_port;	/* Input switch port (or DP_MAX_PORTS). */
76
	} __packed phy; /* Safe when right after 'tun_key'. */
77
	u8 mac_proto;			/* MAC layer protocol (e.g. Ethernet). */
78
	u8 tun_proto;			/* Protocol of encapsulating tunnel. */
79 80
	u32 ovs_flow_hash;		/* Datapath computed hash value.  */
	u32 recirc_id;			/* Recirculation ID.  */
81 82 83
	struct {
		u8     src[ETH_ALEN];	/* Ethernet source address. */
		u8     dst[ETH_ALEN];	/* Ethernet destination address. */
84 85
		struct vlan_head vlan;
		struct vlan_head cvlan;
86 87
		__be16 type;		/* Ethernet frame type. */
	} eth;
88 89 90 91 92
	/* Filling a hole of two bytes. */
	u8 ct_state;
	u8 ct_orig_proto;		/* CT original direction tuple IP
					 * protocol.
					 */
93 94 95 96 97 98 99 100 101 102 103
	union {
		struct {
			__be32 top_lse;	/* top label stack entry */
		} mpls;
		struct {
			u8     proto;	/* IP protocol or lower 8 bits of ARP opcode. */
			u8     tos;	    /* IP ToS. */
			u8     ttl;	    /* IP TTL/hop limit. */
			u8     frag;	/* One of OVS_FRAG_TYPE_*. */
		} ip;
	};
104
	u16 ct_zone;			/* Conntrack zone. */
105 106 107 108 109
	struct {
		__be16 src;		/* TCP/UDP/SCTP source port. */
		__be16 dst;		/* TCP/UDP/SCTP destination port. */
		__be16 flags;		/* TCP flags. */
	} tp;
110 111 112 113 114 115
	union {
		struct {
			struct {
				__be32 src;	/* IP source address. */
				__be32 dst;	/* IP destination address. */
			} addr;
116 117 118 119 120 121 122 123 124 125
			union {
				struct {
					__be32 src;
					__be32 dst;
				} ct_orig;	/* Conntrack original direction fields. */
				struct {
					u8 sha[ETH_ALEN];	/* ARP source hardware address. */
					u8 tha[ETH_ALEN];	/* ARP target hardware address. */
				} arp;
			};
126 127 128 129 130 131 132
		} ipv4;
		struct {
			struct {
				struct in6_addr src;	/* IPv6 source address. */
				struct in6_addr dst;	/* IPv6 destination address. */
			} addr;
			__be32 label;			/* IPv6 flow label. */
133 134 135 136 137 138 139 140 141 142 143
			union {
				struct {
					struct in6_addr src;
					struct in6_addr dst;
				} ct_orig;	/* Conntrack original direction fields. */
				struct {
					struct in6_addr target;	/* ND target address. */
					u8 sll[ETH_ALEN];	/* ND source link layer address. */
					u8 tll[ETH_ALEN];	/* ND target link layer address. */
				} nd;
			};
144 145
		} ipv6;
	};
J
Joe Stringer 已提交
146
	struct {
147
		/* Connection tracking fields not packed above. */
148 149 150 151
		struct {
			__be16 src;	/* CT orig tuple tp src port. */
			__be16 dst;	/* CT orig tuple tp dst port. */
		} orig_tp;
152
		u32 mark;
J
Joe Stringer 已提交
153
		struct ovs_key_ct_labels labels;
J
Joe Stringer 已提交
154 155
	} ct;

156
} __aligned(BITS_PER_LONG/8); /* Ensure that we can do comparisons as longs. */
157

158 159 160 161 162 163 164 165 166
static inline bool sw_flow_key_is_nd(const struct sw_flow_key *key)
{
	return key->eth.type == htons(ETH_P_IPV6) &&
		key->ip.proto == NEXTHDR_ICMP &&
		key->tp.dst == 0 &&
		(key->tp.src == htons(NDISC_NEIGHBOUR_SOLICITATION) ||
		 key->tp.src == htons(NDISC_NEIGHBOUR_ADVERTISEMENT));
}

167
struct sw_flow_key_range {
168 169
	unsigned short int start;
	unsigned short int end;
170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185
};

struct sw_flow_mask {
	int ref_count;
	struct rcu_head rcu;
	struct list_head list;
	struct sw_flow_key_range range;
	struct sw_flow_key key;
};

struct sw_flow_match {
	struct sw_flow_key *key;
	struct sw_flow_key_range range;
	struct sw_flow_mask *mask;
};

186 187 188 189 190 191 192 193 194 195
#define MAX_UFID_LENGTH 16 /* 128 bits */

struct sw_flow_id {
	u32 ufid_len;
	union {
		u32 ufid[MAX_UFID_LENGTH / 4];
		struct sw_flow_key *unmasked_key;
	};
};

196 197
struct sw_flow_actions {
	struct rcu_head rcu;
198
	size_t orig_len;	/* From flow_cmd_new netlink actions size */
199 200 201 202
	u32 actions_len;
	struct nlattr actions[];
};

203 204 205 206 207 208 209 210
struct flow_stats {
	u64 packet_count;		/* Number of packets matched. */
	u64 byte_count;			/* Number of bytes matched. */
	unsigned long used;		/* Last used time (in jiffies). */
	spinlock_t lock;		/* Lock for atomic stats update. */
	__be16 tcp_flags;		/* Union of seen TCP flags. */
};

211 212
struct sw_flow {
	struct rcu_head rcu;
213 214 215 216
	struct {
		struct hlist_node node[2];
		u32 hash;
	} flow_table, ufid_table;
217
	int stats_last_writer;		/* CPU id of the last writer on
218 219
					 * 'stats[0]'.
					 */
220
	struct sw_flow_key key;
221
	struct sw_flow_id id;
222
	struct sw_flow_mask *mask;
223
	struct sw_flow_actions __rcu *sf_acts;
224
	struct flow_stats __rcu *stats[]; /* One for each CPU.  First one
225 226 227 228
					   * is allocated at flow creation time,
					   * the rest are allocated on demand
					   * while holding the 'stats[0].lock'.
					   */
229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244
};

struct arp_eth_header {
	__be16      ar_hrd;	/* format of hardware address   */
	__be16      ar_pro;	/* format of protocol address   */
	unsigned char   ar_hln;	/* length of hardware address   */
	unsigned char   ar_pln;	/* length of protocol address   */
	__be16      ar_op;	/* ARP opcode (command)     */

	/* Ethernet+IPv4 specific members. */
	unsigned char       ar_sha[ETH_ALEN];	/* sender hardware address  */
	unsigned char       ar_sip[4];		/* sender IP address        */
	unsigned char       ar_tha[ETH_ALEN];	/* target hardware address  */
	unsigned char       ar_tip[4];		/* target IP address        */
} __packed;

245 246 247 248 249 250 251 252 253 254 255 256 257 258 259
static inline u8 ovs_key_mac_proto(const struct sw_flow_key *key)
{
	return key->mac_proto & ~SW_FLOW_KEY_INVALID;
}

static inline u16 __ovs_mac_header_len(u8 mac_proto)
{
	return mac_proto == MAC_PROTO_ETHERNET ? ETH_HLEN : 0;
}

static inline u16 ovs_mac_header_len(const struct sw_flow_key *key)
{
	return __ovs_mac_header_len(ovs_key_mac_proto(key));
}

260 261 262 263 264 265 266 267 268 269
static inline bool ovs_identifier_is_ufid(const struct sw_flow_id *sfid)
{
	return sfid->ufid_len;
}

static inline bool ovs_identifier_is_key(const struct sw_flow_id *sfid)
{
	return !ovs_identifier_is_ufid(sfid);
}

270
void ovs_flow_stats_update(struct sw_flow *, __be16 tcp_flags,
271
			   const struct sk_buff *);
272
void ovs_flow_stats_get(const struct sw_flow *, struct ovs_flow_stats *,
273
			unsigned long *used, __be16 *tcp_flags);
274
void ovs_flow_stats_clear(struct sw_flow *);
275 276
u64 ovs_flow_used_time(unsigned long flow_jiffies);

277
int ovs_flow_key_update(struct sk_buff *skb, struct sw_flow_key *key);
278
int ovs_flow_key_extract(const struct ip_tunnel_info *tun_info,
279
			 struct sk_buff *skb,
280
			 struct sw_flow_key *key);
281
/* Extract key from packet coming from userspace. */
282
int ovs_flow_key_extract_userspace(struct net *net, const struct nlattr *attr,
283
				   struct sk_buff *skb,
284
				   struct sw_flow_key *key, bool log);
285

286
#endif /* flow.h */