Lines Matching refs:key
242 static int parse_ipv6hdr(struct sk_buff *skb, struct sw_flow_key *key)
257 key->ip.proto = NEXTHDR_NONE;
258 key->ip.tos = ipv6_get_dsfield(nh);
259 key->ip.ttl = nh->hop_limit;
260 key->ipv6.label = *(__be32 *)nh & htonl(IPV6_FLOWINFO_FLOWLABEL);
261 key->ipv6.addr.src = nh->saddr;
262 key->ipv6.addr.dst = nh->daddr;
267 key->ip.frag = OVS_FRAG_TYPE_LATER;
268 key->ip.proto = NEXTHDR_FRAGMENT;
271 key->ip.frag = OVS_FRAG_TYPE_FIRST;
273 key->ip.frag = OVS_FRAG_TYPE_NONE;
278 * used to set key->ip.frag above.
285 key->ip.proto = nexthdr;
337 static void clear_vlan(struct sw_flow_key *key)
339 key->eth.vlan.tci = 0;
340 key->eth.vlan.tpid = 0;
341 key->eth.cvlan.tci = 0;
342 key->eth.cvlan.tpid = 0;
345 static int parse_vlan(struct sk_buff *skb, struct sw_flow_key *key)
350 key->eth.vlan.tci = htons(skb->vlan_tci) | htons(VLAN_CFI_MASK);
351 key->eth.vlan.tpid = skb->vlan_proto;
354 res = parse_vlan_tag(skb, &key->eth.vlan, true);
360 res = parse_vlan_tag(skb, &key->eth.cvlan, false);
405 static int parse_icmpv6(struct sk_buff *skb, struct sw_flow_key *key,
413 key->tp.src = htons(icmp->icmp6_type);
414 key->tp.dst = htons(icmp->icmp6_code);
415 memset(&key->ipv6.nd, 0, sizeof(key->ipv6.nd));
434 key->ipv6.nd.target = nd->target;
452 if (unlikely(!is_zero_ether_addr(key->ipv6.nd.sll)))
454 ether_addr_copy(key->ipv6.nd.sll,
458 if (unlikely(!is_zero_ether_addr(key->ipv6.nd.tll)))
460 ether_addr_copy(key->ipv6.nd.tll,
472 memset(&key->ipv6.nd.target, 0, sizeof(key->ipv6.nd.target));
473 memset(key->ipv6.nd.sll, 0, sizeof(key->ipv6.nd.sll));
474 memset(key->ipv6.nd.tll, 0, sizeof(key->ipv6.nd.tll));
479 static int parse_nsh(struct sk_buff *skb, struct sw_flow_key *key)
502 key->nsh.base.flags = nsh_get_flags(nh);
503 key->nsh.base.ttl = nsh_get_ttl(nh);
504 key->nsh.base.mdtype = nh->mdtype;
505 key->nsh.base.np = nh->np;
506 key->nsh.base.path_hdr = nh->path_hdr;
507 switch (key->nsh.base.mdtype) {
511 memcpy(key->nsh.context, nh->md1.context,
515 memset(key->nsh.context, 0,
529 * @key: output flow key
532 static int key_extract_l3l4(struct sk_buff *skb, struct sw_flow_key *key)
537 if (key->eth.type == htons(ETH_P_IP)) {
543 memset(&key->ip, 0, sizeof(key->ip));
544 memset(&key->ipv4, 0, sizeof(key->ipv4));
553 key->ipv4.addr.src = nh->saddr;
554 key->ipv4.addr.dst = nh->daddr;
556 key->ip.proto = nh->protocol;
557 key->ip.tos = nh->tos;
558 key->ip.ttl = nh->ttl;
562 key->ip.frag = OVS_FRAG_TYPE_LATER;
563 memset(&key->tp, 0, sizeof(key->tp));
568 key->ip.frag = OVS_FRAG_TYPE_FIRST;
570 key->ip.frag = OVS_FRAG_TYPE_NONE;
573 if (key->ip.proto == IPPROTO_TCP) {
576 key->tp.src = tcp->source;
577 key->tp.dst = tcp->dest;
578 key->tp.flags = TCP_FLAGS_BE16(tcp);
580 memset(&key->tp, 0, sizeof(key->tp));
583 } else if (key->ip.proto == IPPROTO_UDP) {
586 key->tp.src = udp->source;
587 key->tp.dst = udp->dest;
589 memset(&key->tp, 0, sizeof(key->tp));
591 } else if (key->ip.proto == IPPROTO_SCTP) {
594 key->tp.src = sctp->source;
595 key->tp.dst = sctp->dest;
597 memset(&key->tp, 0, sizeof(key->tp));
599 } else if (key->ip.proto == IPPROTO_ICMP) {
605 key->tp.src = htons(icmp->type);
606 key->tp.dst = htons(icmp->code);
608 memset(&key->tp, 0, sizeof(key->tp));
612 } else if (key->eth.type == htons(ETH_P_ARP) ||
613 key->eth.type == htons(ETH_P_RARP)) {
627 key->ip.proto = ntohs(arp->ar_op);
629 key->ip.proto = 0;
631 memcpy(&key->ipv4.addr.src, arp->ar_sip, sizeof(key->ipv4.addr.src));
632 memcpy(&key->ipv4.addr.dst, arp->ar_tip, sizeof(key->ipv4.addr.dst));
633 ether_addr_copy(key->ipv4.arp.sha, arp->ar_sha);
634 ether_addr_copy(key->ipv4.arp.tha, arp->ar_tha);
636 memset(&key->ip, 0, sizeof(key->ip));
637 memset(&key->ipv4, 0, sizeof(key->ipv4));
639 } else if (eth_p_mpls(key->eth.type)) {
642 memset(&key->mpls, 0, sizeof(key->mpls));
655 memcpy(&key->mpls.lse[label_count - 1], &lse,
668 key->mpls.num_labels_mask = GENMASK(label_count - 1, 0);
669 } else if (key->eth.type == htons(ETH_P_IPV6)) {
672 nh_len = parse_ipv6hdr(skb, key);
676 memset(&key->ip, 0, sizeof(key->ip));
677 memset(&key->ipv6.addr, 0, sizeof(key->ipv6.addr));
689 if (key->ip.frag == OVS_FRAG_TYPE_LATER) {
690 memset(&key->tp, 0, sizeof(key->tp));
694 key->ip.frag = OVS_FRAG_TYPE_FIRST;
697 if (key->ip.proto == NEXTHDR_TCP) {
700 key->tp.src = tcp->source;
701 key->tp.dst = tcp->dest;
702 key->tp.flags = TCP_FLAGS_BE16(tcp);
704 memset(&key->tp, 0, sizeof(key->tp));
706 } else if (key->ip.proto == NEXTHDR_UDP) {
709 key->tp.src = udp->source;
710 key->tp.dst = udp->dest;
712 memset(&key->tp, 0, sizeof(key->tp));
714 } else if (key->ip.proto == NEXTHDR_SCTP) {
717 key->tp.src = sctp->source;
718 key->tp.dst = sctp->dest;
720 memset(&key->tp, 0, sizeof(key->tp));
722 } else if (key->ip.proto == NEXTHDR_ICMP) {
724 error = parse_icmpv6(skb, key, nh_len);
728 memset(&key->tp, 0, sizeof(key->tp));
731 } else if (key->eth.type == htons(ETH_P_NSH)) {
732 error = parse_nsh(skb, key);
740 * key_extract - extracts a flow key from an Ethernet frame.
743 * @key: output flow key
756 * - skb->transport_header: If key->eth.type is ETH_P_IP or ETH_P_IPV6
759 * For other key->eth.type values it is left untouched.
762 * Equals to key->eth.type.
764 static int key_extract(struct sk_buff *skb, struct sw_flow_key *key)
769 key->tp.flags = 0;
774 clear_vlan(key);
775 if (ovs_key_mac_proto(key) == MAC_PROTO_NONE) {
780 key->eth.type = skb->protocol;
783 ether_addr_copy(key->eth.src, eth->h_source);
784 ether_addr_copy(key->eth.dst, eth->h_dest);
791 if (unlikely(parse_vlan(skb, key)))
794 key->eth.type = parse_ethertype(skb);
795 if (unlikely(key->eth.type == htons(0)))
802 if (key->eth.cvlan.tci & htons(VLAN_CFI_MASK))
803 skb->protocol = key->eth.cvlan.tpid;
805 skb->protocol = key->eth.type;
813 /* Fill out L3/L4 key info, if any */
814 return key_extract_l3l4(skb, key);
820 int ovs_flow_key_update_l3l4(struct sk_buff *skb, struct sw_flow_key *key)
822 return key_extract_l3l4(skb, key);
825 int ovs_flow_key_update(struct sk_buff *skb, struct sw_flow_key *key)
829 res = key_extract(skb, key);
831 key->mac_proto &= ~SW_FLOW_KEY_INVALID;
851 struct sk_buff *skb, struct sw_flow_key *key)
860 key->tun_proto = ip_tunnel_info_af(tun_info);
861 memcpy(&key->tun_key, &tun_info->key, sizeof(key->tun_key));
866 > sizeof(key->tun_opts));
868 ip_tunnel_info_opts_get(TUN_METADATA_OPTS(key, tun_info->options_len),
870 key->tun_opts_len = tun_info->options_len;
872 key->tun_opts_len = 0;
875 key->tun_proto = 0;
876 key->tun_opts_len = 0;
877 memset(&key->tun_key, 0, sizeof(key->tun_key));
880 key->phy.priority = skb->priority;
881 key->phy.in_port = OVS_CB(skb)->input_vport->port_no;
882 key->phy.skb_mark = skb->mark;
883 key->ovs_flow_hash = 0;
887 key->mac_proto = res;
892 key->recirc_id = tc_ext ? tc_ext->chain : 0;
895 key->recirc_id = 0;
898 key->recirc_id = 0;
901 err = key_extract(skb, key);
903 ovs_ct_fill_key(skb, key); /* Must be after key_extract(). */
909 struct sw_flow_key *key, bool log)
920 err = ovs_nla_get_flow_metadata(net, a, attrs, key, log);
929 * For L2 packet key eth type would be zero. skb protocol
930 * would be set to correct value later during key-extact.
933 skb->protocol = key->eth.type;
934 err = key_extract(skb, key);
939 * for packets for which it makes sense. Otherwise the key may be
940 * corrupted due to overlapping key fields.
943 key->eth.type != htons(ETH_P_IP))
946 (key->eth.type != htons(ETH_P_IPV6) ||
947 sw_flow_key_is_nd(key)))