2009-07-08 13:19:16 -07:00
|
|
|
/*
|
|
|
|
|
* Distributed under the terms of the GNU GPL version 2.
|
2010-01-24 19:57:54 -05:00
|
|
|
* Copyright (c) 2007, 2008, 2009, 2010 Nicira Networks.
|
2009-06-15 15:11:30 -07:00
|
|
|
*
|
|
|
|
|
* Significant portions of this file may be copied from parts of the Linux
|
|
|
|
|
* kernel, by Linus Torvalds and others.
|
2009-07-08 13:19:16 -07:00
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
/* Functions for executing flow actions. */
|
|
|
|
|
|
|
|
|
|
#include <linux/skbuff.h>
|
|
|
|
|
#include <linux/in.h>
|
|
|
|
|
#include <linux/ip.h>
|
|
|
|
|
#include <linux/tcp.h>
|
|
|
|
|
#include <linux/udp.h>
|
|
|
|
|
#include <linux/in6.h>
|
2010-08-24 16:00:27 -07:00
|
|
|
#include <linux/if_arp.h>
|
2009-07-08 13:19:16 -07:00
|
|
|
#include <linux/if_vlan.h>
|
2010-02-11 15:19:26 -08:00
|
|
|
#include <net/inet_ecn.h>
|
2009-07-08 13:19:16 -07:00
|
|
|
#include <net/ip.h>
|
|
|
|
|
#include <net/checksum.h>
|
2010-04-12 15:53:39 -04:00
|
|
|
|
2009-07-08 13:19:16 -07:00
|
|
|
#include "actions.h"
|
2010-11-22 14:17:24 -08:00
|
|
|
#include "checksum.h"
|
2010-04-12 15:53:39 -04:00
|
|
|
#include "datapath.h"
|
2009-07-08 13:19:16 -07:00
|
|
|
#include "openvswitch/datapath-protocol.h"
|
2010-04-12 15:53:39 -04:00
|
|
|
#include "vport.h"
|
2009-07-08 13:19:16 -07:00
|
|
|
|
2010-12-23 09:35:15 -08:00
|
|
|
static int do_execute_actions(struct datapath *, struct sk_buff *,
|
|
|
|
|
const struct odp_flow_key *,
|
|
|
|
|
const struct nlattr *actions, u32 actions_len);
|
|
|
|
|
|
2010-09-10 11:16:31 -07:00
|
|
|
static struct sk_buff *make_writable(struct sk_buff *skb, unsigned min_headroom)
|
2009-07-08 13:19:16 -07:00
|
|
|
{
|
2010-07-29 19:01:02 -07:00
|
|
|
if (skb_cloned(skb)) {
|
2009-11-17 19:03:27 -08:00
|
|
|
struct sk_buff *nskb;
|
|
|
|
|
unsigned headroom = max(min_headroom, skb_headroom(skb));
|
|
|
|
|
|
2010-09-10 11:16:31 -07:00
|
|
|
nskb = skb_copy_expand(skb, headroom, skb_tailroom(skb), GFP_ATOMIC);
|
2009-07-08 13:19:16 -07:00
|
|
|
if (nskb) {
|
2010-04-07 13:55:28 -04:00
|
|
|
set_skb_csum_bits(skb, nskb);
|
2009-07-08 13:19:16 -07:00
|
|
|
kfree_skb(skb);
|
|
|
|
|
return nskb;
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
unsigned int hdr_len = (skb_transport_offset(skb)
|
|
|
|
|
+ sizeof(struct tcphdr));
|
|
|
|
|
if (pskb_may_pull(skb, min(hdr_len, skb->len)))
|
|
|
|
|
return skb;
|
|
|
|
|
}
|
|
|
|
|
kfree_skb(skb);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2010-07-14 19:27:18 -07:00
|
|
|
static struct sk_buff *vlan_pull_tag(struct sk_buff *skb)
|
2009-07-08 13:19:16 -07:00
|
|
|
{
|
|
|
|
|
struct vlan_ethhdr *vh = vlan_eth_hdr(skb);
|
|
|
|
|
struct ethhdr *eh;
|
|
|
|
|
|
|
|
|
|
/* Verify we were given a vlan packet */
|
2010-08-13 10:46:12 -07:00
|
|
|
if (vh->h_vlan_proto != htons(ETH_P_8021Q) || skb->len < VLAN_ETH_HLEN)
|
2009-07-08 13:19:16 -07:00
|
|
|
return skb;
|
|
|
|
|
|
2010-11-22 14:17:24 -08:00
|
|
|
if (get_ip_summed(skb) == OVS_CSUM_COMPLETE)
|
2010-03-04 16:39:57 -05:00
|
|
|
skb->csum = csum_sub(skb->csum, csum_partial(skb->data
|
|
|
|
|
+ ETH_HLEN, VLAN_HLEN, 0));
|
|
|
|
|
|
2009-07-08 13:19:16 -07:00
|
|
|
memmove(skb->data + VLAN_HLEN, skb->data, 2 * VLAN_ETH_ALEN);
|
|
|
|
|
|
|
|
|
|
eh = (struct ethhdr *)skb_pull(skb, VLAN_HLEN);
|
|
|
|
|
|
|
|
|
|
skb->protocol = eh->h_proto;
|
|
|
|
|
skb->mac_header += VLAN_HLEN;
|
|
|
|
|
|
|
|
|
|
return skb;
|
|
|
|
|
}
|
|
|
|
|
|
2010-07-14 19:27:18 -07:00
|
|
|
static struct sk_buff *modify_vlan_tci(struct datapath *dp, struct sk_buff *skb,
|
2010-07-14 20:15:53 -07:00
|
|
|
const struct odp_flow_key *key,
|
2010-12-10 10:40:58 -08:00
|
|
|
const struct nlattr *a, u32 actions_len)
|
2009-07-08 13:19:16 -07:00
|
|
|
{
|
2010-12-10 10:40:58 -08:00
|
|
|
__be16 tci = nla_get_be16(a);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
2010-09-10 11:16:31 -07:00
|
|
|
skb = make_writable(skb, VLAN_HLEN);
|
2009-07-08 13:19:16 -07:00
|
|
|
if (!skb)
|
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
|
|
|
|
|
|
if (skb->protocol == htons(ETH_P_8021Q)) {
|
|
|
|
|
/* Modify vlan id, but maintain other TCI values */
|
2010-08-13 10:46:12 -07:00
|
|
|
struct vlan_ethhdr *vh;
|
|
|
|
|
__be16 old_tci;
|
|
|
|
|
|
|
|
|
|
if (skb->len < VLAN_ETH_HLEN)
|
|
|
|
|
return skb;
|
|
|
|
|
|
|
|
|
|
vh = vlan_eth_hdr(skb);
|
|
|
|
|
old_tci = vh->h_vlan_TCI;
|
2010-03-04 16:39:57 -05:00
|
|
|
|
2010-10-18 11:18:10 -07:00
|
|
|
vh->h_vlan_TCI = tci;
|
2010-03-04 16:39:57 -05:00
|
|
|
|
2010-11-22 14:17:24 -08:00
|
|
|
if (get_ip_summed(skb) == OVS_CSUM_COMPLETE) {
|
2010-03-04 16:39:57 -05:00
|
|
|
__be16 diff[] = { ~old_tci, vh->h_vlan_TCI };
|
|
|
|
|
|
|
|
|
|
skb->csum = ~csum_partial((char *)diff, sizeof(diff),
|
|
|
|
|
~skb->csum);
|
|
|
|
|
}
|
2009-07-08 13:19:16 -07:00
|
|
|
} else {
|
2010-06-17 15:17:53 -07:00
|
|
|
int err;
|
|
|
|
|
|
2009-07-08 13:19:16 -07:00
|
|
|
/* Add vlan header */
|
|
|
|
|
|
|
|
|
|
/* Set up checksumming pointers for checksum-deferred packets
|
|
|
|
|
* on Xen. Otherwise, dev_queue_xmit() will try to do this
|
|
|
|
|
* when we send the packet out on the wire, and it will fail at
|
|
|
|
|
* that point because skb_checksum_setup() will not look inside
|
|
|
|
|
* an 802.1Q header. */
|
2010-06-17 15:17:53 -07:00
|
|
|
err = vswitch_skb_checksum_setup(skb);
|
|
|
|
|
if (unlikely(err)) {
|
|
|
|
|
kfree_skb(skb);
|
|
|
|
|
return ERR_PTR(err);
|
2010-08-30 00:24:53 -07:00
|
|
|
}
|
2009-07-08 13:19:16 -07:00
|
|
|
|
|
|
|
|
/* GSO is not implemented for packets with an 802.1Q header, so
|
|
|
|
|
* we have to do segmentation before we add that header.
|
|
|
|
|
*
|
|
|
|
|
* GSO does work with hardware-accelerated VLAN tagging, but we
|
|
|
|
|
* can't use hardware-accelerated VLAN tagging since it
|
|
|
|
|
* requires the device to have a VLAN group configured (with
|
|
|
|
|
* e.g. vconfig(8)) and we don't do that.
|
|
|
|
|
*
|
|
|
|
|
* Having to do this here may be a performance loss, since we
|
|
|
|
|
* can't take advantage of TSO hardware support, although it
|
|
|
|
|
* does not make a measurable network performance difference
|
|
|
|
|
* for 1G Ethernet. Fixing that would require patching the
|
|
|
|
|
* kernel (either to add GSO support to the VLAN protocol or to
|
|
|
|
|
* support hardware-accelerated VLAN tagging without VLAN
|
|
|
|
|
* groups configured). */
|
|
|
|
|
if (skb_is_gso(skb)) {
|
2010-12-10 10:40:58 -08:00
|
|
|
const struct nlattr *actions_left;
|
|
|
|
|
u32 actions_len_left;
|
2009-07-08 13:19:16 -07:00
|
|
|
struct sk_buff *segs;
|
|
|
|
|
|
|
|
|
|
segs = skb_gso_segment(skb, 0);
|
|
|
|
|
kfree_skb(skb);
|
2010-12-10 16:41:33 -08:00
|
|
|
if (IS_ERR(segs))
|
2009-07-08 13:19:16 -07:00
|
|
|
return ERR_CAST(segs);
|
|
|
|
|
|
2010-12-10 10:40:58 -08:00
|
|
|
actions_len_left = actions_len;
|
|
|
|
|
actions_left = nla_next(a, &actions_len_left);
|
|
|
|
|
|
2009-07-08 13:19:16 -07:00
|
|
|
do {
|
|
|
|
|
struct sk_buff *nskb = segs->next;
|
|
|
|
|
|
|
|
|
|
segs->next = NULL;
|
|
|
|
|
|
2010-03-04 16:39:57 -05:00
|
|
|
/* GSO can change the checksum type so update.*/
|
|
|
|
|
compute_ip_summed(segs, true);
|
|
|
|
|
|
2010-10-08 16:26:21 -07:00
|
|
|
segs = __vlan_put_tag(segs, ntohs(tci));
|
2009-07-08 13:19:16 -07:00
|
|
|
err = -ENOMEM;
|
|
|
|
|
if (segs) {
|
2010-12-23 09:35:15 -08:00
|
|
|
err = do_execute_actions(
|
2010-12-10 10:40:58 -08:00
|
|
|
dp, segs, key, actions_left,
|
|
|
|
|
actions_len_left);
|
2009-07-08 13:19:16 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (unlikely(err)) {
|
|
|
|
|
while ((segs = nskb)) {
|
|
|
|
|
nskb = segs->next;
|
|
|
|
|
segs->next = NULL;
|
|
|
|
|
kfree_skb(segs);
|
|
|
|
|
}
|
|
|
|
|
return ERR_PTR(err);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
segs = nskb;
|
|
|
|
|
} while (segs->next);
|
|
|
|
|
|
|
|
|
|
skb = segs;
|
2010-03-04 16:39:57 -05:00
|
|
|
compute_ip_summed(skb, true);
|
2009-07-08 13:19:16 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* The hardware-accelerated version of vlan_put_tag() works
|
|
|
|
|
* only for a device that has a VLAN group configured (with
|
|
|
|
|
* e.g. vconfig(8)), so call the software-only version
|
|
|
|
|
* __vlan_put_tag() directly instead.
|
|
|
|
|
*/
|
2010-10-08 16:26:21 -07:00
|
|
|
skb = __vlan_put_tag(skb, ntohs(tci));
|
2009-07-08 13:19:16 -07:00
|
|
|
if (!skb)
|
|
|
|
|
return ERR_PTR(-ENOMEM);
|
2010-03-04 16:39:57 -05:00
|
|
|
|
|
|
|
|
/* GSO doesn't fix up the hardware computed checksum so this
|
|
|
|
|
* will only be hit in the non-GSO case. */
|
2010-11-22 14:17:24 -08:00
|
|
|
if (get_ip_summed(skb) == OVS_CSUM_COMPLETE)
|
2010-03-04 16:39:57 -05:00
|
|
|
skb->csum = csum_add(skb->csum, csum_partial(skb->data
|
|
|
|
|
+ ETH_HLEN, VLAN_HLEN, 0));
|
2009-07-08 13:19:16 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return skb;
|
|
|
|
|
}
|
|
|
|
|
|
2010-09-10 11:16:31 -07:00
|
|
|
static struct sk_buff *strip_vlan(struct sk_buff *skb)
|
2009-07-08 13:19:16 -07:00
|
|
|
{
|
2010-09-10 11:16:31 -07:00
|
|
|
skb = make_writable(skb, 0);
|
2010-07-14 20:15:53 -07:00
|
|
|
if (skb)
|
2009-07-08 13:19:16 -07:00
|
|
|
vlan_pull_tag(skb);
|
|
|
|
|
return skb;
|
|
|
|
|
}
|
|
|
|
|
|
2010-08-13 10:46:12 -07:00
|
|
|
static bool is_ip(struct sk_buff *skb, const struct odp_flow_key *key)
|
|
|
|
|
{
|
|
|
|
|
return (key->dl_type == htons(ETH_P_IP) &&
|
|
|
|
|
skb->transport_header > skb->network_header);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static __sum16 *get_l4_checksum(struct sk_buff *skb, const struct odp_flow_key *key)
|
|
|
|
|
{
|
|
|
|
|
int transport_len = skb->len - skb_transport_offset(skb);
|
|
|
|
|
if (key->nw_proto == IPPROTO_TCP) {
|
|
|
|
|
if (likely(transport_len >= sizeof(struct tcphdr)))
|
|
|
|
|
return &tcp_hdr(skb)->check;
|
|
|
|
|
} else if (key->nw_proto == IPPROTO_UDP) {
|
|
|
|
|
if (likely(transport_len >= sizeof(struct udphdr)))
|
|
|
|
|
return &udp_hdr(skb)->check;
|
|
|
|
|
}
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2009-07-08 13:19:16 -07:00
|
|
|
static struct sk_buff *set_nw_addr(struct sk_buff *skb,
|
2010-07-14 20:15:53 -07:00
|
|
|
const struct odp_flow_key *key,
|
2010-12-10 10:40:58 -08:00
|
|
|
const struct nlattr *a)
|
2009-07-08 13:19:16 -07:00
|
|
|
{
|
2010-12-10 10:40:58 -08:00
|
|
|
__be32 new_nwaddr = nla_get_be32(a);
|
2010-08-13 10:46:12 -07:00
|
|
|
struct iphdr *nh;
|
|
|
|
|
__sum16 *check;
|
|
|
|
|
__be32 *nwaddr;
|
|
|
|
|
|
|
|
|
|
if (unlikely(!is_ip(skb, key)))
|
2009-07-08 13:19:16 -07:00
|
|
|
return skb;
|
|
|
|
|
|
2010-09-10 11:16:31 -07:00
|
|
|
skb = make_writable(skb, 0);
|
2010-08-13 10:46:12 -07:00
|
|
|
if (unlikely(!skb))
|
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
nh = ip_hdr(skb);
|
2010-12-10 10:40:58 -08:00
|
|
|
nwaddr = nla_type(a) == ODPAT_SET_NW_SRC ? &nh->saddr : &nh->daddr;
|
2010-08-13 10:46:12 -07:00
|
|
|
|
|
|
|
|
check = get_l4_checksum(skb, key);
|
|
|
|
|
if (likely(check))
|
2010-12-10 10:40:58 -08:00
|
|
|
inet_proto_csum_replace4(check, skb, *nwaddr, new_nwaddr, 1);
|
|
|
|
|
csum_replace4(&nh->check, *nwaddr, new_nwaddr);
|
2010-08-13 10:46:12 -07:00
|
|
|
|
2010-12-10 10:40:58 -08:00
|
|
|
*nwaddr = new_nwaddr;
|
2010-08-13 10:46:12 -07:00
|
|
|
|
2009-07-08 13:19:16 -07:00
|
|
|
return skb;
|
|
|
|
|
}
|
|
|
|
|
|
2009-11-11 14:59:49 -08:00
|
|
|
static struct sk_buff *set_nw_tos(struct sk_buff *skb,
|
2010-12-10 10:40:58 -08:00
|
|
|
const struct odp_flow_key *key,
|
|
|
|
|
u8 nw_tos)
|
2009-11-11 14:59:49 -08:00
|
|
|
{
|
2010-08-13 10:46:12 -07:00
|
|
|
if (unlikely(!is_ip(skb, key)))
|
2009-11-11 14:59:49 -08:00
|
|
|
return skb;
|
|
|
|
|
|
2010-09-10 11:16:31 -07:00
|
|
|
skb = make_writable(skb, 0);
|
2009-11-11 14:59:49 -08:00
|
|
|
if (skb) {
|
|
|
|
|
struct iphdr *nh = ip_hdr(skb);
|
|
|
|
|
u8 *f = &nh->tos;
|
|
|
|
|
u8 old = *f;
|
2010-02-11 15:19:26 -08:00
|
|
|
u8 new;
|
2009-11-11 14:59:49 -08:00
|
|
|
|
2010-02-11 15:19:26 -08:00
|
|
|
/* Set the DSCP bits and preserve the ECN bits. */
|
2010-12-10 10:40:58 -08:00
|
|
|
new = nw_tos | (nh->tos & INET_ECN_MASK);
|
2010-12-06 17:51:33 -08:00
|
|
|
csum_replace4(&nh->check, (__force __be32)old,
|
|
|
|
|
(__force __be32)new);
|
2009-11-11 14:59:49 -08:00
|
|
|
*f = new;
|
|
|
|
|
}
|
|
|
|
|
return skb;
|
|
|
|
|
}
|
|
|
|
|
|
2010-07-14 20:15:53 -07:00
|
|
|
static struct sk_buff *set_tp_port(struct sk_buff *skb,
|
|
|
|
|
const struct odp_flow_key *key,
|
2010-12-10 10:40:58 -08:00
|
|
|
const struct nlattr *a)
|
2009-07-08 13:19:16 -07:00
|
|
|
{
|
2010-08-13 10:46:12 -07:00
|
|
|
struct udphdr *th;
|
|
|
|
|
__sum16 *check;
|
|
|
|
|
__be16 *port;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
2010-08-13 10:46:12 -07:00
|
|
|
if (unlikely(!is_ip(skb, key)))
|
2009-07-08 13:19:16 -07:00
|
|
|
return skb;
|
|
|
|
|
|
2010-09-10 11:16:31 -07:00
|
|
|
skb = make_writable(skb, 0);
|
2010-08-13 10:46:12 -07:00
|
|
|
if (unlikely(!skb))
|
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
/* Must follow make_writable() since that can move the skb data. */
|
|
|
|
|
check = get_l4_checksum(skb, key);
|
|
|
|
|
if (unlikely(!check))
|
2009-07-08 13:19:16 -07:00
|
|
|
return skb;
|
|
|
|
|
|
2010-08-13 10:46:12 -07:00
|
|
|
/*
|
|
|
|
|
* Update port and checksum.
|
|
|
|
|
*
|
|
|
|
|
* This is OK because source and destination port numbers are at the
|
|
|
|
|
* same offsets in both UDP and TCP headers, and get_l4_checksum() only
|
|
|
|
|
* supports those protocols.
|
|
|
|
|
*/
|
|
|
|
|
th = udp_hdr(skb);
|
2010-12-10 10:40:58 -08:00
|
|
|
port = nla_type(a) == ODPAT_SET_TP_SRC ? &th->source : &th->dest;
|
|
|
|
|
inet_proto_csum_replace2(check, skb, *port, nla_get_be16(a), 0);
|
|
|
|
|
*port = nla_get_be16(a);
|
2010-08-13 10:46:12 -07:00
|
|
|
|
2009-07-08 13:19:16 -07:00
|
|
|
return skb;
|
|
|
|
|
}
|
|
|
|
|
|
2010-08-24 16:00:27 -07:00
|
|
|
/**
|
|
|
|
|
* is_spoofed_arp - check for invalid ARP packet
|
|
|
|
|
*
|
|
|
|
|
* @skb: skbuff containing an Ethernet packet, with network header pointing
|
|
|
|
|
* just past the Ethernet and optional 802.1Q header.
|
|
|
|
|
* @key: flow key extracted from @skb by flow_extract()
|
|
|
|
|
*
|
|
|
|
|
* Returns true if @skb is an invalid Ethernet+IPv4 ARP packet: one with screwy
|
|
|
|
|
* or truncated header fields or one whose inner and outer Ethernet address
|
|
|
|
|
* differ.
|
|
|
|
|
*/
|
|
|
|
|
static bool is_spoofed_arp(struct sk_buff *skb, const struct odp_flow_key *key)
|
|
|
|
|
{
|
|
|
|
|
struct arp_eth_header *arp;
|
|
|
|
|
|
|
|
|
|
if (key->dl_type != htons(ETH_P_ARP))
|
|
|
|
|
return false;
|
|
|
|
|
|
|
|
|
|
if (skb_network_offset(skb) + sizeof(struct arp_eth_header) > skb->len)
|
|
|
|
|
return true;
|
|
|
|
|
|
|
|
|
|
arp = (struct arp_eth_header *)skb_network_header(skb);
|
|
|
|
|
return (arp->ar_hrd != htons(ARPHRD_ETHER) ||
|
|
|
|
|
arp->ar_pro != htons(ETH_P_IP) ||
|
|
|
|
|
arp->ar_hln != ETH_ALEN ||
|
|
|
|
|
arp->ar_pln != 4 ||
|
|
|
|
|
compare_ether_addr(arp->ar_sha, eth_hdr(skb)->h_source));
|
|
|
|
|
}
|
|
|
|
|
|
2010-07-14 19:27:18 -07:00
|
|
|
static void do_output(struct datapath *dp, struct sk_buff *skb, int out_port)
|
2009-07-08 13:19:16 -07:00
|
|
|
{
|
2010-12-03 13:09:26 -08:00
|
|
|
struct vport *p;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
|
|
|
|
if (!skb)
|
|
|
|
|
goto error;
|
|
|
|
|
|
2010-04-12 15:53:39 -04:00
|
|
|
p = rcu_dereference(dp->ports[out_port]);
|
2009-07-08 13:19:16 -07:00
|
|
|
if (!p)
|
|
|
|
|
goto error;
|
|
|
|
|
|
2010-12-03 13:09:26 -08:00
|
|
|
vport_send(p, skb);
|
2009-07-08 13:19:16 -07:00
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
error:
|
|
|
|
|
kfree_skb(skb);
|
|
|
|
|
}
|
|
|
|
|
|
2010-09-10 11:16:31 -07:00
|
|
|
static int output_control(struct datapath *dp, struct sk_buff *skb, u32 arg)
|
2009-07-08 13:19:16 -07:00
|
|
|
{
|
2010-09-10 11:16:31 -07:00
|
|
|
skb = skb_clone(skb, GFP_ATOMIC);
|
2009-07-08 13:19:16 -07:00
|
|
|
if (!skb)
|
|
|
|
|
return -ENOMEM;
|
|
|
|
|
return dp_output_control(dp, skb, _ODPL_ACTION_NR, arg);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Execute a list of actions against 'skb'. */
|
2010-12-23 09:35:15 -08:00
|
|
|
static int do_execute_actions(struct datapath *dp, struct sk_buff *skb,
|
|
|
|
|
const struct odp_flow_key *key,
|
|
|
|
|
const struct nlattr *actions, u32 actions_len)
|
2009-07-08 13:19:16 -07:00
|
|
|
{
|
|
|
|
|
/* Every output action needs a separate clone of 'skb', but the common
|
|
|
|
|
* case is just a single output action, so that doing a clone and
|
|
|
|
|
* then freeing the original skbuff is wasteful. So the following code
|
|
|
|
|
* is slightly obscure just to avoid that. */
|
|
|
|
|
int prev_port = -1;
|
2010-06-17 15:04:12 -07:00
|
|
|
u32 priority = skb->priority;
|
2010-12-10 10:40:58 -08:00
|
|
|
const struct nlattr *a;
|
|
|
|
|
int rem, err;
|
2010-01-04 13:08:37 -08:00
|
|
|
|
2010-12-10 10:40:58 -08:00
|
|
|
for (a = actions, rem = actions_len; rem > 0; a = nla_next(a, &rem)) {
|
2009-07-08 13:19:16 -07:00
|
|
|
if (prev_port != -1) {
|
2010-09-10 11:16:31 -07:00
|
|
|
do_output(dp, skb_clone(skb, GFP_ATOMIC), prev_port);
|
2009-07-08 13:19:16 -07:00
|
|
|
prev_port = -1;
|
|
|
|
|
}
|
|
|
|
|
|
2010-12-10 10:40:58 -08:00
|
|
|
switch (nla_type(a)) {
|
2009-07-08 13:19:16 -07:00
|
|
|
case ODPAT_OUTPUT:
|
2010-12-10 10:40:58 -08:00
|
|
|
prev_port = nla_get_u32(a);
|
2009-07-08 13:19:16 -07:00
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case ODPAT_CONTROLLER:
|
2010-12-10 10:42:42 -08:00
|
|
|
err = output_control(dp, skb, nla_get_u64(a));
|
2009-07-08 13:19:16 -07:00
|
|
|
if (err) {
|
|
|
|
|
kfree_skb(skb);
|
|
|
|
|
return err;
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
|
2010-04-12 11:49:16 -04:00
|
|
|
case ODPAT_SET_TUNNEL:
|
2010-12-10 10:42:42 -08:00
|
|
|
OVS_CB(skb)->tun_id = nla_get_be64(a);
|
2010-04-12 11:49:16 -04:00
|
|
|
break;
|
|
|
|
|
|
2010-10-08 16:26:21 -07:00
|
|
|
case ODPAT_SET_DL_TCI:
|
2010-12-10 10:40:58 -08:00
|
|
|
skb = modify_vlan_tci(dp, skb, key, a, rem);
|
2009-07-08 13:19:16 -07:00
|
|
|
if (IS_ERR(skb))
|
|
|
|
|
return PTR_ERR(skb);
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case ODPAT_STRIP_VLAN:
|
2010-09-10 11:16:31 -07:00
|
|
|
skb = strip_vlan(skb);
|
2009-07-08 13:19:16 -07:00
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case ODPAT_SET_DL_SRC:
|
2010-12-10 10:40:58 -08:00
|
|
|
skb = make_writable(skb, 0);
|
|
|
|
|
if (!skb)
|
|
|
|
|
return -ENOMEM;
|
|
|
|
|
memcpy(eth_hdr(skb)->h_source, nla_data(a), ETH_ALEN);
|
|
|
|
|
break;
|
|
|
|
|
|
2009-07-08 13:19:16 -07:00
|
|
|
case ODPAT_SET_DL_DST:
|
2010-12-10 10:40:58 -08:00
|
|
|
skb = make_writable(skb, 0);
|
|
|
|
|
if (!skb)
|
|
|
|
|
return -ENOMEM;
|
|
|
|
|
memcpy(eth_hdr(skb)->h_dest, nla_data(a), ETH_ALEN);
|
2009-07-08 13:19:16 -07:00
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case ODPAT_SET_NW_SRC:
|
|
|
|
|
case ODPAT_SET_NW_DST:
|
2010-12-10 10:40:58 -08:00
|
|
|
skb = set_nw_addr(skb, key, a);
|
2009-07-08 13:19:16 -07:00
|
|
|
break;
|
|
|
|
|
|
2009-11-11 14:59:49 -08:00
|
|
|
case ODPAT_SET_NW_TOS:
|
2010-12-10 10:40:58 -08:00
|
|
|
skb = set_nw_tos(skb, key, nla_get_u8(a));
|
2009-11-11 14:59:49 -08:00
|
|
|
break;
|
|
|
|
|
|
2009-07-08 13:19:16 -07:00
|
|
|
case ODPAT_SET_TP_SRC:
|
|
|
|
|
case ODPAT_SET_TP_DST:
|
2010-12-10 10:40:58 -08:00
|
|
|
skb = set_tp_port(skb, key, a);
|
2009-07-08 13:19:16 -07:00
|
|
|
break;
|
2010-06-17 15:04:12 -07:00
|
|
|
|
|
|
|
|
case ODPAT_SET_PRIORITY:
|
2010-12-10 10:40:58 -08:00
|
|
|
skb->priority = nla_get_u32(a);
|
2010-06-17 15:04:12 -07:00
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case ODPAT_POP_PRIORITY:
|
|
|
|
|
skb->priority = priority;
|
|
|
|
|
break;
|
2010-08-24 16:00:27 -07:00
|
|
|
|
|
|
|
|
case ODPAT_DROP_SPOOFED_ARP:
|
|
|
|
|
if (unlikely(is_spoofed_arp(skb, key)))
|
|
|
|
|
goto exit;
|
|
|
|
|
break;
|
2009-07-08 13:19:16 -07:00
|
|
|
}
|
|
|
|
|
if (!skb)
|
|
|
|
|
return -ENOMEM;
|
|
|
|
|
}
|
2010-08-24 16:00:27 -07:00
|
|
|
exit:
|
2009-07-08 13:19:16 -07:00
|
|
|
if (prev_port != -1)
|
|
|
|
|
do_output(dp, skb, prev_port);
|
|
|
|
|
else
|
|
|
|
|
kfree_skb(skb);
|
2009-06-19 14:03:12 -07:00
|
|
|
return 0;
|
2009-07-08 13:19:16 -07:00
|
|
|
}
|
2010-12-23 09:35:15 -08:00
|
|
|
|
|
|
|
|
/* Send a copy of this packet up to the sFlow agent, along with extra
|
|
|
|
|
* information about what happened to it. */
|
|
|
|
|
static void sflow_sample(struct datapath *dp, struct sk_buff *skb,
|
|
|
|
|
const struct nlattr *a, u32 actions_len,
|
|
|
|
|
struct vport *vport)
|
|
|
|
|
{
|
|
|
|
|
struct odp_sflow_sample_header *hdr;
|
|
|
|
|
unsigned int hdrlen = sizeof(struct odp_sflow_sample_header);
|
|
|
|
|
struct sk_buff *nskb;
|
|
|
|
|
|
|
|
|
|
nskb = skb_copy_expand(skb, actions_len + hdrlen, 0, GFP_ATOMIC);
|
|
|
|
|
if (!nskb)
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
memcpy(__skb_push(nskb, actions_len), a, actions_len);
|
|
|
|
|
hdr = (struct odp_sflow_sample_header*)__skb_push(nskb, hdrlen);
|
|
|
|
|
hdr->actions_len = actions_len;
|
|
|
|
|
hdr->sample_pool = atomic_read(&vport->sflow_pool);
|
|
|
|
|
dp_output_control(dp, nskb, _ODPL_SFLOW_NR, 0);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Execute a list of actions against 'skb'. */
|
|
|
|
|
int execute_actions(struct datapath *dp, struct sk_buff *skb,
|
|
|
|
|
const struct odp_flow_key *key,
|
|
|
|
|
const struct nlattr *actions, u32 actions_len)
|
|
|
|
|
{
|
|
|
|
|
if (dp->sflow_probability) {
|
|
|
|
|
struct vport *p = OVS_CB(skb)->vport;
|
|
|
|
|
if (p) {
|
|
|
|
|
atomic_inc(&p->sflow_pool);
|
|
|
|
|
if (dp->sflow_probability == UINT_MAX ||
|
|
|
|
|
net_random() < dp->sflow_probability)
|
|
|
|
|
sflow_sample(dp, skb, actions, actions_len, p);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
OVS_CB(skb)->tun_id = 0;
|
|
|
|
|
|
|
|
|
|
return do_execute_actions(dp, skb, key, actions, actions_len);
|
|
|
|
|
}
|