Lines Matching full:key

242 static int parse_ipv6hdr(struct sk_buff *skb, struct sw_flow_key *key)  in parse_ipv6hdr()  argument
257 key->ip.proto = NEXTHDR_NONE; in parse_ipv6hdr()
258 key->ip.tos = ipv6_get_dsfield(nh); in parse_ipv6hdr()
259 key->ip.ttl = nh->hop_limit; in parse_ipv6hdr()
260 key->ipv6.label = *(__be32 *)nh & htonl(IPV6_FLOWINFO_FLOWLABEL); in parse_ipv6hdr()
261 key->ipv6.addr.src = nh->saddr; in parse_ipv6hdr()
262 key->ipv6.addr.dst = nh->daddr; in parse_ipv6hdr()
267 key->ip.frag = OVS_FRAG_TYPE_LATER; in parse_ipv6hdr()
268 key->ip.proto = nexthdr; in parse_ipv6hdr()
271 key->ip.frag = OVS_FRAG_TYPE_FIRST; in parse_ipv6hdr()
273 key->ip.frag = OVS_FRAG_TYPE_NONE; in parse_ipv6hdr()
278 * used to set key->ip.frag above. in parse_ipv6hdr()
285 key->ip.proto = nexthdr; in parse_ipv6hdr()
337 static void clear_vlan(struct sw_flow_key *key) in clear_vlan() argument
339 key->eth.vlan.tci = 0; in clear_vlan()
340 key->eth.vlan.tpid = 0; in clear_vlan()
341 key->eth.cvlan.tci = 0; in clear_vlan()
342 key->eth.cvlan.tpid = 0; in clear_vlan()
345 static int parse_vlan(struct sk_buff *skb, struct sw_flow_key *key) in parse_vlan() argument
350 key->eth.vlan.tci = htons(skb->vlan_tci) | htons(VLAN_CFI_MASK); in parse_vlan()
351 key->eth.vlan.tpid = skb->vlan_proto; in parse_vlan()
354 res = parse_vlan_tag(skb, &key->eth.vlan, true); in parse_vlan()
360 res = parse_vlan_tag(skb, &key->eth.cvlan, false); in parse_vlan()
405 static int parse_icmpv6(struct sk_buff *skb, struct sw_flow_key *key, in parse_icmpv6() argument
413 key->tp.src = htons(icmp->icmp6_type); in parse_icmpv6()
414 key->tp.dst = htons(icmp->icmp6_code); in parse_icmpv6()
415 memset(&key->ipv6.nd, 0, sizeof(key->ipv6.nd)); in parse_icmpv6()
434 key->ipv6.nd.target = nd->target; in parse_icmpv6()
452 if (unlikely(!is_zero_ether_addr(key->ipv6.nd.sll))) in parse_icmpv6()
454 ether_addr_copy(key->ipv6.nd.sll, in parse_icmpv6()
458 if (unlikely(!is_zero_ether_addr(key->ipv6.nd.tll))) in parse_icmpv6()
460 ether_addr_copy(key->ipv6.nd.tll, in parse_icmpv6()
472 memset(&key->ipv6.nd.target, 0, sizeof(key->ipv6.nd.target)); in parse_icmpv6()
473 memset(key->ipv6.nd.sll, 0, sizeof(key->ipv6.nd.sll)); in parse_icmpv6()
474 memset(key->ipv6.nd.tll, 0, sizeof(key->ipv6.nd.tll)); in parse_icmpv6()
479 static int parse_nsh(struct sk_buff *skb, struct sw_flow_key *key) in parse_nsh() argument
502 key->nsh.base.flags = nsh_get_flags(nh); in parse_nsh()
503 key->nsh.base.ttl = nsh_get_ttl(nh); in parse_nsh()
504 key->nsh.base.mdtype = nh->mdtype; in parse_nsh()
505 key->nsh.base.np = nh->np; in parse_nsh()
506 key->nsh.base.path_hdr = nh->path_hdr; in parse_nsh()
507 switch (key->nsh.base.mdtype) { in parse_nsh()
511 memcpy(key->nsh.context, nh->md1.context, in parse_nsh()
515 memset(key->nsh.context, 0, in parse_nsh()
529 * @key: output flow key
532 static int key_extract_l3l4(struct sk_buff *skb, struct sw_flow_key *key) in key_extract_l3l4() argument
537 if (key->eth.type == htons(ETH_P_IP)) { in key_extract_l3l4()
543 memset(&key->ip, 0, sizeof(key->ip)); in key_extract_l3l4()
544 memset(&key->ipv4, 0, sizeof(key->ipv4)); in key_extract_l3l4()
553 key->ipv4.addr.src = nh->saddr; in key_extract_l3l4()
554 key->ipv4.addr.dst = nh->daddr; in key_extract_l3l4()
556 key->ip.proto = nh->protocol; in key_extract_l3l4()
557 key->ip.tos = nh->tos; in key_extract_l3l4()
558 key->ip.ttl = nh->ttl; in key_extract_l3l4()
562 key->ip.frag = OVS_FRAG_TYPE_LATER; in key_extract_l3l4()
563 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
568 key->ip.frag = OVS_FRAG_TYPE_FIRST; in key_extract_l3l4()
570 key->ip.frag = OVS_FRAG_TYPE_NONE; in key_extract_l3l4()
573 if (key->ip.proto == IPPROTO_TCP) { in key_extract_l3l4()
576 key->tp.src = tcp->source; in key_extract_l3l4()
577 key->tp.dst = tcp->dest; in key_extract_l3l4()
578 key->tp.flags = TCP_FLAGS_BE16(tcp); in key_extract_l3l4()
580 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
583 } else if (key->ip.proto == IPPROTO_UDP) { in key_extract_l3l4()
586 key->tp.src = udp->source; in key_extract_l3l4()
587 key->tp.dst = udp->dest; in key_extract_l3l4()
589 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
591 } else if (key->ip.proto == IPPROTO_SCTP) { in key_extract_l3l4()
594 key->tp.src = sctp->source; in key_extract_l3l4()
595 key->tp.dst = sctp->dest; in key_extract_l3l4()
597 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
599 } else if (key->ip.proto == IPPROTO_ICMP) { in key_extract_l3l4()
605 key->tp.src = htons(icmp->type); in key_extract_l3l4()
606 key->tp.dst = htons(icmp->code); in key_extract_l3l4()
608 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
612 } else if (key->eth.type == htons(ETH_P_ARP) || in key_extract_l3l4()
613 key->eth.type == htons(ETH_P_RARP)) { in key_extract_l3l4()
627 key->ip.proto = ntohs(arp->ar_op); in key_extract_l3l4()
629 key->ip.proto = 0; in key_extract_l3l4()
631 memcpy(&key->ipv4.addr.src, arp->ar_sip, sizeof(key->ipv4.addr.src)); in key_extract_l3l4()
632 memcpy(&key->ipv4.addr.dst, arp->ar_tip, sizeof(key->ipv4.addr.dst)); in key_extract_l3l4()
633 ether_addr_copy(key->ipv4.arp.sha, arp->ar_sha); in key_extract_l3l4()
634 ether_addr_copy(key->ipv4.arp.tha, arp->ar_tha); in key_extract_l3l4()
636 memset(&key->ip, 0, sizeof(key->ip)); in key_extract_l3l4()
637 memset(&key->ipv4, 0, sizeof(key->ipv4)); in key_extract_l3l4()
639 } else if (eth_p_mpls(key->eth.type)) { in key_extract_l3l4()
642 memset(&key->mpls, 0, sizeof(key->mpls)); in key_extract_l3l4()
655 memcpy(&key->mpls.lse[label_count - 1], &lse, in key_extract_l3l4()
668 key->mpls.num_labels_mask = GENMASK(label_count - 1, 0); in key_extract_l3l4()
669 } else if (key->eth.type == htons(ETH_P_IPV6)) { in key_extract_l3l4()
672 nh_len = parse_ipv6hdr(skb, key); in key_extract_l3l4()
676 memset(&key->ip, 0, sizeof(key->ip)); in key_extract_l3l4()
677 memset(&key->ipv6.addr, 0, sizeof(key->ipv6.addr)); in key_extract_l3l4()
689 if (key->ip.frag == OVS_FRAG_TYPE_LATER) { in key_extract_l3l4()
690 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
694 key->ip.frag = OVS_FRAG_TYPE_FIRST; in key_extract_l3l4()
697 if (key->ip.proto == NEXTHDR_TCP) { in key_extract_l3l4()
700 key->tp.src = tcp->source; in key_extract_l3l4()
701 key->tp.dst = tcp->dest; in key_extract_l3l4()
702 key->tp.flags = TCP_FLAGS_BE16(tcp); in key_extract_l3l4()
704 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
706 } else if (key->ip.proto == NEXTHDR_UDP) { in key_extract_l3l4()
709 key->tp.src = udp->source; in key_extract_l3l4()
710 key->tp.dst = udp->dest; in key_extract_l3l4()
712 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
714 } else if (key->ip.proto == NEXTHDR_SCTP) { in key_extract_l3l4()
717 key->tp.src = sctp->source; in key_extract_l3l4()
718 key->tp.dst = sctp->dest; in key_extract_l3l4()
720 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
722 } else if (key->ip.proto == NEXTHDR_ICMP) { in key_extract_l3l4()
724 error = parse_icmpv6(skb, key, nh_len); in key_extract_l3l4()
728 memset(&key->tp, 0, sizeof(key->tp)); in key_extract_l3l4()
731 } else if (key->eth.type == htons(ETH_P_NSH)) { in key_extract_l3l4()
732 error = parse_nsh(skb, key); in key_extract_l3l4()
740 * key_extract - extracts a flow key from an Ethernet frame.
743 * @key: output flow key
756 * - skb->transport_header: If key->eth.type is ETH_P_IP or ETH_P_IPV6
759 * For other key->eth.type values it is left untouched.
762 * Equals to key->eth.type.
764 static int key_extract(struct sk_buff *skb, struct sw_flow_key *key) in key_extract() argument
769 key->tp.flags = 0; in key_extract()
774 clear_vlan(key); in key_extract()
775 if (ovs_key_mac_proto(key) == MAC_PROTO_NONE) { in key_extract()
780 key->eth.type = skb->protocol; in key_extract()
783 ether_addr_copy(key->eth.src, eth->h_source); in key_extract()
784 ether_addr_copy(key->eth.dst, eth->h_dest); in key_extract()
791 if (unlikely(parse_vlan(skb, key))) in key_extract()
794 key->eth.type = parse_ethertype(skb); in key_extract()
795 if (unlikely(key->eth.type == htons(0))) in key_extract()
802 if (key->eth.cvlan.tci & htons(VLAN_CFI_MASK)) in key_extract()
803 skb->protocol = key->eth.cvlan.tpid; in key_extract()
805 skb->protocol = key->eth.type; in key_extract()
813 /* Fill out L3/L4 key info, if any */ in key_extract()
814 return key_extract_l3l4(skb, key); in key_extract()
820 int ovs_flow_key_update_l3l4(struct sk_buff *skb, struct sw_flow_key *key) in ovs_flow_key_update_l3l4() argument
822 return key_extract_l3l4(skb, key); in ovs_flow_key_update_l3l4()
825 int ovs_flow_key_update(struct sk_buff *skb, struct sw_flow_key *key) in ovs_flow_key_update() argument
829 res = key_extract(skb, key); in ovs_flow_key_update()
831 key->mac_proto &= ~SW_FLOW_KEY_INVALID; in ovs_flow_key_update()
851 struct sk_buff *skb, struct sw_flow_key *key) in ovs_flow_key_extract() argument
860 key->tun_proto = ip_tunnel_info_af(tun_info); in ovs_flow_key_extract()
861 memcpy(&key->tun_key, &tun_info->key, sizeof(key->tun_key)); in ovs_flow_key_extract()
866 > sizeof(key->tun_opts)); in ovs_flow_key_extract()
868 ip_tunnel_info_opts_get(TUN_METADATA_OPTS(key, tun_info->options_len), in ovs_flow_key_extract()
870 key->tun_opts_len = tun_info->options_len; in ovs_flow_key_extract()
872 key->tun_opts_len = 0; in ovs_flow_key_extract()
875 key->tun_proto = 0; in ovs_flow_key_extract()
876 key->tun_opts_len = 0; in ovs_flow_key_extract()
877 memset(&key->tun_key, 0, sizeof(key->tun_key)); in ovs_flow_key_extract()
880 key->phy.priority = skb->priority; in ovs_flow_key_extract()
881 key->phy.in_port = OVS_CB(skb)->input_vport->port_no; in ovs_flow_key_extract()
882 key->phy.skb_mark = skb->mark; in ovs_flow_key_extract()
883 key->ovs_flow_hash = 0; in ovs_flow_key_extract()
887 key->mac_proto = res; in ovs_flow_key_extract()
892 key->recirc_id = tc_ext ? tc_ext->chain : 0; in ovs_flow_key_extract()
895 key->recirc_id = 0; in ovs_flow_key_extract()
898 key->recirc_id = 0; in ovs_flow_key_extract()
901 err = key_extract(skb, key); in ovs_flow_key_extract()
903 ovs_ct_fill_key(skb, key); /* Must be after key_extract(). */ in ovs_flow_key_extract()
909 struct sw_flow_key *key, bool log) in ovs_flow_key_extract_userspace() argument
920 err = ovs_nla_get_flow_metadata(net, a, attrs, key, log); in ovs_flow_key_extract_userspace()
929 * For L2 packet key eth type would be zero. skb protocol in ovs_flow_key_extract_userspace()
930 * would be set to correct value later during key-extact. in ovs_flow_key_extract_userspace()
933 skb->protocol = key->eth.type; in ovs_flow_key_extract_userspace()
934 err = key_extract(skb, key); in ovs_flow_key_extract_userspace()
939 * for packets for which it makes sense. Otherwise the key may be in ovs_flow_key_extract_userspace()
940 * corrupted due to overlapping key fields. in ovs_flow_key_extract_userspace()
943 key->eth.type != htons(ETH_P_IP)) in ovs_flow_key_extract_userspace()
946 (key->eth.type != htons(ETH_P_IPV6) || in ovs_flow_key_extract_userspace()
947 sw_flow_key_is_nd(key))) in ovs_flow_key_extract_userspace()