Lines Matching refs:key

385 static int parse_ipv6hdr(struct sk_buff *skb, struct sw_flow_key *key)
400 get_ipv6_ext_hdrs(skb, nh, &key->ipv6.exthdrs);
402 key->ip.proto = NEXTHDR_NONE;
403 key->ip.tos = ipv6_get_dsfield(nh);
404 key->ip.ttl = nh->hop_limit;
405 key->ipv6.label = *(__be32 *)nh & htonl(IPV6_FLOWINFO_FLOWLABEL);
406 key->ipv6.addr.src = nh->saddr;
407 key->ipv6.addr.dst = nh->daddr;
412 key->ip.frag = OVS_FRAG_TYPE_LATER;
413 key->ip.proto = NEXTHDR_FRAGMENT;
416 key->ip.frag = OVS_FRAG_TYPE_FIRST;
418 key->ip.frag = OVS_FRAG_TYPE_NONE;
423 * used to set key->ip.frag above.
430 key->ip.proto = nexthdr;
486 static void clear_vlan(struct sw_flow_key *key)
488 key->eth.vlan.tci = 0;
489 key->eth.vlan.tpid = 0;
490 key->eth.cvlan.tci = 0;
491 key->eth.cvlan.tpid = 0;
494 static int parse_vlan(struct sk_buff *skb, struct sw_flow_key *key)
499 key->eth.vlan.tci = htons(skb->vlan_tci) | htons(VLAN_CFI_MASK);
500 key->eth.vlan.tpid = skb->vlan_proto;
503 res = parse_vlan_tag(skb, &key->eth.vlan, true);
509 res = parse_vlan_tag(skb, &key->eth.cvlan, false);
554 static int parse_icmpv6(struct sk_buff *skb, struct sw_flow_key *key,
562 key->tp.src = htons(icmp->icmp6_type);
563 key->tp.dst = htons(icmp->icmp6_code);
564 memset(&key->ipv6.nd, 0, sizeof(key->ipv6.nd));
583 key->ipv6.nd.target = nd->target;
601 if (unlikely(!is_zero_ether_addr(key->ipv6.nd.sll)))
603 ether_addr_copy(key->ipv6.nd.sll,
607 if (unlikely(!is_zero_ether_addr(key->ipv6.nd.tll)))
609 ether_addr_copy(key->ipv6.nd.tll,
621 memset(&key->ipv6.nd.target, 0, sizeof(key->ipv6.nd.target));
622 memset(key->ipv6.nd.sll, 0, sizeof(key->ipv6.nd.sll));
623 memset(key->ipv6.nd.tll, 0, sizeof(key->ipv6.nd.tll));
628 static int parse_nsh(struct sk_buff *skb, struct sw_flow_key *key)
651 key->nsh.base.flags = nsh_get_flags(nh);
652 key->nsh.base.ttl = nsh_get_ttl(nh);
653 key->nsh.base.mdtype = nh->mdtype;
654 key->nsh.base.np = nh->np;
655 key->nsh.base.path_hdr = nh->path_hdr;
656 switch (key->nsh.base.mdtype) {
660 memcpy(key->nsh.context, nh->md1.context,
664 memset(key->nsh.context, 0,
678 * @key: output flow key
682 static int key_extract_l3l4(struct sk_buff *skb, struct sw_flow_key *key)
687 if (key->eth.type == htons(ETH_P_IP)) {
693 memset(&key->ip, 0, sizeof(key->ip));
694 memset(&key->ipv4, 0, sizeof(key->ipv4));
703 key->ipv4.addr.src = nh->saddr;
704 key->ipv4.addr.dst = nh->daddr;
706 key->ip.proto = nh->protocol;
707 key->ip.tos = nh->tos;
708 key->ip.ttl = nh->ttl;
712 key->ip.frag = OVS_FRAG_TYPE_LATER;
713 memset(&key->tp, 0, sizeof(key->tp));
718 key->ip.frag = OVS_FRAG_TYPE_FIRST;
720 key->ip.frag = OVS_FRAG_TYPE_NONE;
723 if (key->ip.proto == IPPROTO_TCP) {
726 key->tp.src = tcp->source;
727 key->tp.dst = tcp->dest;
728 key->tp.flags = TCP_FLAGS_BE16(tcp);
730 memset(&key->tp, 0, sizeof(key->tp));
733 } else if (key->ip.proto == IPPROTO_UDP) {
736 key->tp.src = udp->source;
737 key->tp.dst = udp->dest;
739 memset(&key->tp, 0, sizeof(key->tp));
741 } else if (key->ip.proto == IPPROTO_SCTP) {
744 key->tp.src = sctp->source;
745 key->tp.dst = sctp->dest;
747 memset(&key->tp, 0, sizeof(key->tp));
749 } else if (key->ip.proto == IPPROTO_ICMP) {
755 key->tp.src = htons(icmp->type);
756 key->tp.dst = htons(icmp->code);
758 memset(&key->tp, 0, sizeof(key->tp));
762 } else if (key->eth.type == htons(ETH_P_ARP) ||
763 key->eth.type == htons(ETH_P_RARP)) {
777 key->ip.proto = ntohs(arp->ar_op);
779 key->ip.proto = 0;
781 memcpy(&key->ipv4.addr.src, arp->ar_sip, sizeof(key->ipv4.addr.src));
782 memcpy(&key->ipv4.addr.dst, arp->ar_tip, sizeof(key->ipv4.addr.dst));
783 ether_addr_copy(key->ipv4.arp.sha, arp->ar_sha);
784 ether_addr_copy(key->ipv4.arp.tha, arp->ar_tha);
786 memset(&key->ip, 0, sizeof(key->ip));
787 memset(&key->ipv4, 0, sizeof(key->ipv4));
789 } else if (eth_p_mpls(key->eth.type)) {
792 memset(&key->mpls, 0, sizeof(key->mpls));
805 memcpy(&key->mpls.lse[label_count - 1], &lse,
818 key->mpls.num_labels_mask = GENMASK(label_count - 1, 0);
819 } else if (key->eth.type == htons(ETH_P_IPV6)) {
822 nh_len = parse_ipv6hdr(skb, key);
826 memset(&key->ip, 0, sizeof(key->ip));
827 memset(&key->ipv6.addr, 0, sizeof(key->ipv6.addr));
839 if (key->ip.frag == OVS_FRAG_TYPE_LATER) {
840 memset(&key->tp, 0, sizeof(key->tp));
844 key->ip.frag = OVS_FRAG_TYPE_FIRST;
847 if (key->ip.proto == NEXTHDR_TCP) {
850 key->tp.src = tcp->source;
851 key->tp.dst = tcp->dest;
852 key->tp.flags = TCP_FLAGS_BE16(tcp);
854 memset(&key->tp, 0, sizeof(key->tp));
856 } else if (key->ip.proto == NEXTHDR_UDP) {
859 key->tp.src = udp->source;
860 key->tp.dst = udp->dest;
862 memset(&key->tp, 0, sizeof(key->tp));
864 } else if (key->ip.proto == NEXTHDR_SCTP) {
867 key->tp.src = sctp->source;
868 key->tp.dst = sctp->dest;
870 memset(&key->tp, 0, sizeof(key->tp));
872 } else if (key->ip.proto == NEXTHDR_ICMP) {
874 error = parse_icmpv6(skb, key, nh_len);
878 memset(&key->tp, 0, sizeof(key->tp));
881 } else if (key->eth.type == htons(ETH_P_NSH)) {
882 error = parse_nsh(skb, key);
890 * key_extract - extracts a flow key from an Ethernet frame.
893 * @key: output flow key
904 * - skb->transport_header: If key->eth.type is ETH_P_IP or ETH_P_IPV6
907 * For other key->eth.type values it is left untouched.
910 * Equals to key->eth.type.
914 static int key_extract(struct sk_buff *skb, struct sw_flow_key *key)
919 key->tp.flags = 0;
924 clear_vlan(key);
925 if (ovs_key_mac_proto(key) == MAC_PROTO_NONE) {
930 key->eth.type = skb->protocol;
933 ether_addr_copy(key->eth.src, eth->h_source);
934 ether_addr_copy(key->eth.dst, eth->h_dest);
941 if (unlikely(parse_vlan(skb, key)))
944 key->eth.type = parse_ethertype(skb);
945 if (unlikely(key->eth.type == htons(0)))
952 if (key->eth.cvlan.tci & htons(VLAN_CFI_MASK))
953 skb->protocol = key->eth.cvlan.tpid;
955 skb->protocol = key->eth.type;
963 /* Fill out L3/L4 key info, if any */
964 return key_extract_l3l4(skb, key);
970 int ovs_flow_key_update_l3l4(struct sk_buff *skb, struct sw_flow_key *key)
972 return key_extract_l3l4(skb, key);
975 int ovs_flow_key_update(struct sk_buff *skb, struct sw_flow_key *key)
979 res = key_extract(skb, key);
981 key->mac_proto &= ~SW_FLOW_KEY_INVALID;
1001 struct sk_buff *skb, struct sw_flow_key *key)
1012 key->tun_proto = ip_tunnel_info_af(tun_info);
1013 memcpy(&key->tun_key, &tun_info->key, sizeof(key->tun_key));
1018 > sizeof(key->tun_opts));
1020 ip_tunnel_info_opts_get(TUN_METADATA_OPTS(key, tun_info->options_len),
1022 key->tun_opts_len = tun_info->options_len;
1024 key->tun_opts_len = 0;
1027 key->tun_proto = 0;
1028 key->tun_opts_len = 0;
1029 memset(&key->tun_key, 0, sizeof(key->tun_key));
1032 key->phy.priority = skb->priority;
1033 key->phy.in_port = OVS_CB(skb)->input_vport->port_no;
1034 key->phy.skb_mark = skb->mark;
1035 key->ovs_flow_hash = 0;
1039 key->mac_proto = res;
1044 key->recirc_id = tc_ext && !tc_ext->act_miss ?
1052 key->recirc_id = 0;
1055 key->recirc_id = 0;
1058 err = key_extract(skb, key);
1060 ovs_ct_fill_key(skb, key, post_ct); /* Must be after key_extract(). */
1063 key->ct_zone = zone;
1066 key->ct_state &= ~OVS_CS_F_DST_NAT;
1068 key->ct_state &= ~OVS_CS_F_SRC_NAT;
1077 struct sw_flow_key *key, bool log)
1088 err = ovs_nla_get_flow_metadata(net, a, attrs, key, log);
1097 * For L2 packet key eth type would be zero. skb protocol
1098 * would be set to correct value later during key-extact.
1101 skb->protocol = key->eth.type;
1102 err = key_extract(skb, key);
1107 * for packets for which it makes sense. Otherwise the key may be
1108 * corrupted due to overlapping key fields.
1111 key->eth.type != htons(ETH_P_IP))
1114 (key->eth.type != htons(ETH_P_IPV6) ||
1115 sw_flow_key_is_nd(key)))