2010-11-09 17:00:59 -08:00
|
|
|
|
/*
|
2012-05-02 15:21:36 -07:00
|
|
|
|
* Copyright (c) 2010, 2011, 2012 Nicira, Inc.
|
2010-11-09 17:00:59 -08:00
|
|
|
|
*
|
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
|
* You may obtain a copy of the License at:
|
|
|
|
|
*
|
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
*
|
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
|
* limitations under the License.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
|
|
|
|
|
|
#include "nx-match.h"
|
|
|
|
|
|
2011-02-01 22:54:11 -08:00
|
|
|
|
#include <netinet/icmp6.h>
|
|
|
|
|
|
2010-11-09 17:00:59 -08:00
|
|
|
|
#include "classifier.h"
|
|
|
|
|
#include "dynamic-string.h"
|
2011-09-12 12:11:50 -07:00
|
|
|
|
#include "meta-flow.h"
|
2012-07-03 22:17:14 -07:00
|
|
|
|
#include "ofp-actions.h"
|
2012-01-12 15:48:19 -08:00
|
|
|
|
#include "ofp-errors.h"
|
2010-11-09 17:00:59 -08:00
|
|
|
|
#include "ofp-util.h"
|
|
|
|
|
#include "ofpbuf.h"
|
|
|
|
|
#include "openflow/nicira-ext.h"
|
|
|
|
|
#include "packets.h"
|
|
|
|
|
#include "unaligned.h"
|
2012-01-17 16:38:23 -08:00
|
|
|
|
#include "util.h"
|
2010-11-09 17:00:59 -08:00
|
|
|
|
#include "vlog.h"
|
|
|
|
|
|
|
|
|
|
VLOG_DEFINE_THIS_MODULE(nx_match);
|
|
|
|
|
|
|
|
|
|
/* Rate limit for nx_match parse errors. These always indicate a bug in the
|
|
|
|
|
* peer and so there's not much point in showing a lot of them. */
|
|
|
|
|
static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 5);
|
|
|
|
|
|
|
|
|
|
/* Returns the width of the data for a field with the given 'header', in
|
|
|
|
|
* bytes. */
|
2010-12-16 13:57:08 -08:00
|
|
|
|
int
|
2010-11-09 17:00:59 -08:00
|
|
|
|
nxm_field_bytes(uint32_t header)
|
|
|
|
|
{
|
|
|
|
|
unsigned int length = NXM_LENGTH(header);
|
|
|
|
|
return NXM_HASMASK(header) ? length / 2 : length;
|
|
|
|
|
}
|
2010-11-11 10:41:33 -08:00
|
|
|
|
|
|
|
|
|
/* Returns the width of the data for a field with the given 'header', in
|
|
|
|
|
* bits. */
|
2010-12-16 13:57:08 -08:00
|
|
|
|
int
|
2010-11-11 10:41:33 -08:00
|
|
|
|
nxm_field_bits(uint32_t header)
|
|
|
|
|
{
|
|
|
|
|
return nxm_field_bytes(header) * 8;
|
|
|
|
|
}
|
2011-09-12 12:11:50 -07:00
|
|
|
|
|
|
|
|
|
/* nx_pull_match() and helpers. */
|
2010-11-09 17:00:59 -08:00
|
|
|
|
|
|
|
|
|
static uint32_t
|
|
|
|
|
nx_entry_ok(const void *p, unsigned int match_len)
|
|
|
|
|
{
|
|
|
|
|
unsigned int payload_len;
|
|
|
|
|
ovs_be32 header_be;
|
|
|
|
|
uint32_t header;
|
|
|
|
|
|
|
|
|
|
if (match_len < 4) {
|
|
|
|
|
if (match_len) {
|
2012-07-19 00:15:35 -07:00
|
|
|
|
VLOG_DBG_RL(&rl, "nx_match ends with partial (%u-byte) nxm_header",
|
|
|
|
|
match_len);
|
2010-11-09 17:00:59 -08:00
|
|
|
|
}
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
memcpy(&header_be, p, 4);
|
|
|
|
|
header = ntohl(header_be);
|
|
|
|
|
|
|
|
|
|
payload_len = NXM_LENGTH(header);
|
|
|
|
|
if (!payload_len) {
|
|
|
|
|
VLOG_DBG_RL(&rl, "nxm_entry %08"PRIx32" has invalid payload "
|
|
|
|
|
"length 0", header);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
if (match_len < payload_len + 4) {
|
|
|
|
|
VLOG_DBG_RL(&rl, "%"PRIu32"-byte nxm_entry but only "
|
|
|
|
|
"%u bytes left in nx_match", payload_len + 4, match_len);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return header;
|
|
|
|
|
}
|
|
|
|
|
|
2012-01-12 15:48:19 -08:00
|
|
|
|
static enum ofperr
|
2012-08-01 16:01:45 +09:00
|
|
|
|
nx_pull_raw(const uint8_t *p, unsigned int match_len, bool strict,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
struct match *match, ovs_be64 *cookie, ovs_be64 *cookie_mask)
|
2010-11-09 17:00:59 -08:00
|
|
|
|
{
|
|
|
|
|
uint32_t header;
|
|
|
|
|
|
2011-12-23 12:23:24 -08:00
|
|
|
|
assert((cookie != NULL) == (cookie_mask != NULL));
|
|
|
|
|
|
2012-08-07 15:28:18 -07:00
|
|
|
|
match_init_catchall(match);
|
2012-07-19 00:15:19 -07:00
|
|
|
|
if (cookie) {
|
|
|
|
|
*cookie = *cookie_mask = htonll(0);
|
|
|
|
|
}
|
|
|
|
|
if (!match_len) {
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2012-01-03 13:30:45 -08:00
|
|
|
|
for (;
|
|
|
|
|
(header = nx_entry_ok(p, match_len)) != 0;
|
|
|
|
|
p += 4 + NXM_LENGTH(header), match_len -= 4 + NXM_LENGTH(header)) {
|
2011-10-12 17:04:13 -07:00
|
|
|
|
const struct mf_field *mf;
|
2012-01-12 15:48:19 -08:00
|
|
|
|
enum ofperr error;
|
2010-11-09 17:00:59 -08:00
|
|
|
|
|
2011-10-12 17:04:13 -07:00
|
|
|
|
mf = mf_from_nxm_header(header);
|
|
|
|
|
if (!mf) {
|
2012-01-03 13:30:45 -08:00
|
|
|
|
if (strict) {
|
2012-03-26 13:46:35 -07:00
|
|
|
|
error = OFPERR_OFPBMC_BAD_FIELD;
|
2012-01-03 13:30:45 -08:00
|
|
|
|
} else {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
2012-08-07 15:28:18 -07:00
|
|
|
|
} else if (!mf_are_prereqs_ok(mf, &match->flow)) {
|
2012-03-26 13:46:35 -07:00
|
|
|
|
error = OFPERR_OFPBMC_BAD_PREREQ;
|
2012-08-07 15:28:18 -07:00
|
|
|
|
} else if (!mf_is_all_wild(mf, &match->wc)) {
|
2012-03-26 13:46:35 -07:00
|
|
|
|
error = OFPERR_OFPBMC_DUP_FIELD;
|
2012-06-11 09:56:12 -07:00
|
|
|
|
} else if (header != OXM_OF_IN_PORT) {
|
2011-10-12 17:04:13 -07:00
|
|
|
|
unsigned int width = mf->n_bytes;
|
2011-09-12 12:11:50 -07:00
|
|
|
|
union mf_value value;
|
|
|
|
|
|
|
|
|
|
memcpy(&value, p + 4, width);
|
2011-10-12 17:04:13 -07:00
|
|
|
|
if (!mf_is_value_valid(mf, &value)) {
|
2012-03-26 13:46:35 -07:00
|
|
|
|
error = OFPERR_OFPBMC_BAD_VALUE;
|
2011-09-12 12:11:50 -07:00
|
|
|
|
} else if (!NXM_HASMASK(header)) {
|
|
|
|
|
error = 0;
|
2012-08-07 15:28:18 -07:00
|
|
|
|
mf_set_value(mf, &value, match);
|
2011-09-12 12:11:50 -07:00
|
|
|
|
} else {
|
|
|
|
|
union mf_value mask;
|
|
|
|
|
|
|
|
|
|
memcpy(&mask, p + 4 + width, width);
|
2011-10-12 17:04:13 -07:00
|
|
|
|
if (!mf_is_mask_valid(mf, &mask)) {
|
2012-03-26 13:46:35 -07:00
|
|
|
|
error = OFPERR_OFPBMC_BAD_MASK;
|
2011-09-12 12:11:50 -07:00
|
|
|
|
} else {
|
|
|
|
|
error = 0;
|
2012-08-07 15:28:18 -07:00
|
|
|
|
mf_set(mf, &value, &mask, match);
|
2011-09-12 12:11:50 -07:00
|
|
|
|
}
|
|
|
|
|
}
|
2012-06-11 09:56:12 -07:00
|
|
|
|
} else {
|
|
|
|
|
/* Special case for 32bit ports when using OXM,
|
|
|
|
|
* ports are 16 bits wide otherwise. */
|
|
|
|
|
ovs_be32 port_of11;
|
|
|
|
|
uint16_t port;
|
|
|
|
|
|
|
|
|
|
memcpy(&port_of11, p + 4, sizeof port_of11);
|
|
|
|
|
error = ofputil_port_from_ofp11(port_of11, &port);
|
|
|
|
|
if (!error) {
|
2012-08-07 15:28:18 -07:00
|
|
|
|
match_set_in_port(match, port);
|
2012-06-11 09:56:12 -07:00
|
|
|
|
}
|
2010-11-09 17:00:59 -08:00
|
|
|
|
}
|
2011-09-12 12:11:50 -07:00
|
|
|
|
|
2011-12-23 12:23:24 -08:00
|
|
|
|
/* Check if the match is for a cookie rather than a classifier rule. */
|
|
|
|
|
if ((header == NXM_NX_COOKIE || header == NXM_NX_COOKIE_W) && cookie) {
|
|
|
|
|
if (*cookie_mask) {
|
2012-03-26 13:46:35 -07:00
|
|
|
|
error = OFPERR_OFPBMC_DUP_FIELD;
|
2011-12-23 12:23:24 -08:00
|
|
|
|
} else {
|
|
|
|
|
unsigned int width = sizeof *cookie;
|
|
|
|
|
|
|
|
|
|
memcpy(cookie, p + 4, width);
|
|
|
|
|
if (NXM_HASMASK(header)) {
|
|
|
|
|
memcpy(cookie_mask, p + 4 + width, width);
|
|
|
|
|
} else {
|
|
|
|
|
*cookie_mask = htonll(UINT64_MAX);
|
|
|
|
|
}
|
|
|
|
|
error = 0;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-11-09 17:00:59 -08:00
|
|
|
|
if (error) {
|
2011-10-12 17:04:13 -07:00
|
|
|
|
VLOG_DBG_RL(&rl, "bad nxm_entry %#08"PRIx32" (vendor=%"PRIu32", "
|
|
|
|
|
"field=%"PRIu32", hasmask=%"PRIu32", len=%"PRIu32"), "
|
|
|
|
|
"(%s)", header,
|
2010-11-09 17:00:59 -08:00
|
|
|
|
NXM_VENDOR(header), NXM_FIELD(header),
|
2011-10-12 17:04:13 -07:00
|
|
|
|
NXM_HASMASK(header), NXM_LENGTH(header),
|
2012-01-12 15:48:19 -08:00
|
|
|
|
ofperr_to_string(error));
|
2010-11-09 17:00:59 -08:00
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2012-03-26 13:46:35 -07:00
|
|
|
|
return match_len ? OFPERR_OFPBMC_BAD_LEN : 0;
|
2010-11-09 17:00:59 -08:00
|
|
|
|
}
|
2012-01-03 13:30:45 -08:00
|
|
|
|
|
2012-08-01 16:01:45 +09:00
|
|
|
|
static enum ofperr
|
|
|
|
|
nx_pull_match__(struct ofpbuf *b, unsigned int match_len, bool strict,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
struct match *match,
|
2012-08-01 16:01:45 +09:00
|
|
|
|
ovs_be64 *cookie, ovs_be64 *cookie_mask)
|
|
|
|
|
{
|
|
|
|
|
uint8_t *p = NULL;
|
|
|
|
|
|
|
|
|
|
if (match_len) {
|
|
|
|
|
p = ofpbuf_try_pull(b, ROUND_UP(match_len, 8));
|
|
|
|
|
if (!p) {
|
|
|
|
|
VLOG_DBG_RL(&rl, "nx_match length %u, rounded up to a "
|
|
|
|
|
"multiple of 8, is longer than space in message (max "
|
|
|
|
|
"length %zu)", match_len, b->size);
|
|
|
|
|
return OFPERR_OFPBMC_BAD_LEN;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2012-08-07 15:28:18 -07:00
|
|
|
|
return nx_pull_raw(p, match_len, strict, match, cookie, cookie_mask);
|
2012-08-01 16:01:45 +09:00
|
|
|
|
}
|
|
|
|
|
|
2012-01-03 13:30:45 -08:00
|
|
|
|
/* Parses the nx_match formatted match description in 'b' with length
|
2012-08-07 15:28:18 -07:00
|
|
|
|
* 'match_len'. Stores the results in 'match'. If 'cookie' and 'cookie_mask'
|
|
|
|
|
* are valid pointers, then stores the cookie and mask in them if 'b' contains
|
|
|
|
|
* a "NXM_NX_COOKIE*" match. Otherwise, stores 0 in both.
|
2012-01-03 13:30:45 -08:00
|
|
|
|
*
|
2012-08-07 15:28:18 -07:00
|
|
|
|
* Fails with an error upon encountering an unknown NXM header.
|
2012-01-03 13:30:45 -08:00
|
|
|
|
*
|
|
|
|
|
* Returns 0 if successful, otherwise an OpenFlow error code. */
|
2012-01-12 15:48:19 -08:00
|
|
|
|
enum ofperr
|
2012-08-07 15:28:18 -07:00
|
|
|
|
nx_pull_match(struct ofpbuf *b, unsigned int match_len, struct match *match,
|
2012-01-03 13:30:45 -08:00
|
|
|
|
ovs_be64 *cookie, ovs_be64 *cookie_mask)
|
|
|
|
|
{
|
2012-08-07 15:28:18 -07:00
|
|
|
|
return nx_pull_match__(b, match_len, true, match, cookie, cookie_mask);
|
2012-01-03 13:30:45 -08:00
|
|
|
|
}
|
|
|
|
|
|
2012-08-07 15:28:18 -07:00
|
|
|
|
/* Behaves the same as nx_pull_match(), but skips over unknown NXM headers,
|
|
|
|
|
* instead of failing with an error. */
|
2012-01-12 15:48:19 -08:00
|
|
|
|
enum ofperr
|
2012-01-03 13:30:45 -08:00
|
|
|
|
nx_pull_match_loose(struct ofpbuf *b, unsigned int match_len,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
struct match *match,
|
2012-01-03 13:30:45 -08:00
|
|
|
|
ovs_be64 *cookie, ovs_be64 *cookie_mask)
|
|
|
|
|
{
|
2012-08-07 15:28:18 -07:00
|
|
|
|
return nx_pull_match__(b, match_len, false, match, cookie, cookie_mask);
|
2012-01-03 13:30:45 -08:00
|
|
|
|
}
|
2012-08-01 16:01:45 +09:00
|
|
|
|
|
|
|
|
|
static enum ofperr
|
2012-08-07 15:28:18 -07:00
|
|
|
|
oxm_pull_match__(struct ofpbuf *b, bool strict, struct match *match)
|
2012-08-01 16:01:45 +09:00
|
|
|
|
{
|
|
|
|
|
struct ofp11_match_header *omh = b->data;
|
|
|
|
|
uint8_t *p;
|
|
|
|
|
uint16_t match_len;
|
|
|
|
|
|
|
|
|
|
if (b->size < sizeof *omh) {
|
|
|
|
|
return OFPERR_OFPBMC_BAD_LEN;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
match_len = ntohs(omh->length);
|
|
|
|
|
if (match_len < sizeof *omh) {
|
|
|
|
|
return OFPERR_OFPBMC_BAD_LEN;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (omh->type != htons(OFPMT_OXM)) {
|
|
|
|
|
return OFPERR_OFPBMC_BAD_TYPE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
p = ofpbuf_try_pull(b, ROUND_UP(match_len, 8));
|
|
|
|
|
if (!p) {
|
|
|
|
|
VLOG_DBG_RL(&rl, "oxm length %u, rounded up to a "
|
|
|
|
|
"multiple of 8, is longer than space in message (max "
|
|
|
|
|
"length %zu)", match_len, b->size);
|
|
|
|
|
return OFPERR_OFPBMC_BAD_LEN;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return nx_pull_raw(p + sizeof *omh, match_len - sizeof *omh,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
strict, match, NULL, NULL);
|
2012-08-01 16:01:45 +09:00
|
|
|
|
}
|
|
|
|
|
|
2012-08-07 15:28:18 -07:00
|
|
|
|
/* Parses the oxm formatted match description preceeded by a struct ofp11_match
|
|
|
|
|
* in 'b' with length 'match_len'. Stores the result in 'match'.
|
2012-08-01 16:01:45 +09:00
|
|
|
|
*
|
|
|
|
|
* Fails with an error when encountering unknown OXM headers.
|
|
|
|
|
*
|
|
|
|
|
* Returns 0 if successful, otherwise an OpenFlow error code. */
|
|
|
|
|
enum ofperr
|
2012-08-07 15:28:18 -07:00
|
|
|
|
oxm_pull_match(struct ofpbuf *b, struct match *match)
|
2012-08-01 16:01:45 +09:00
|
|
|
|
{
|
2012-08-07 15:28:18 -07:00
|
|
|
|
return oxm_pull_match__(b, true, match);
|
2012-08-01 16:01:45 +09:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Behaves the same as oxm_pull_match() with one exception. Skips over unknown
|
|
|
|
|
* PXM headers instead of failing with an error when they are encountered. */
|
|
|
|
|
enum ofperr
|
2012-08-07 15:28:18 -07:00
|
|
|
|
oxm_pull_match_loose(struct ofpbuf *b, struct match *match)
|
2012-08-01 16:01:45 +09:00
|
|
|
|
{
|
2012-08-07 15:28:18 -07:00
|
|
|
|
return oxm_pull_match__(b, false, match);
|
2012-08-01 16:01:45 +09:00
|
|
|
|
}
|
2010-11-09 17:00:59 -08:00
|
|
|
|
|
|
|
|
|
/* nx_put_match() and helpers.
|
|
|
|
|
*
|
|
|
|
|
* 'put' functions whose names end in 'w' add a wildcarded field.
|
|
|
|
|
* 'put' functions whose names end in 'm' add a field that might be wildcarded.
|
|
|
|
|
* Other 'put' functions add exact-match fields.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
nxm_put_header(struct ofpbuf *b, uint32_t header)
|
|
|
|
|
{
|
|
|
|
|
ovs_be32 n_header = htonl(header);
|
|
|
|
|
ofpbuf_put(b, &n_header, sizeof n_header);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
nxm_put_8(struct ofpbuf *b, uint32_t header, uint8_t value)
|
|
|
|
|
{
|
|
|
|
|
nxm_put_header(b, header);
|
|
|
|
|
ofpbuf_put(b, &value, sizeof value);
|
|
|
|
|
}
|
|
|
|
|
|
Implement new fragment handling policy.
Until now, OVS has handled IP fragments more awkwardly than necessary. It
has not been possible to match on L4 headers, even in fragments with offset
0 where they are actually present. This means that there was no way to
implement ACLs that treat, say, different TCP ports differently, on
fragmented traffic; instead, all decisions for fragment forwarding had to
be made on the basis of L2 and L3 headers alone.
This commit improves the situation significantly. It is still not possible
to match on L4 headers in fragments with nonzero offset, because that
information is simply not present in such fragments, but this commit adds
the ability to match on L4 headers for fragments with zero offset. This
means that it becomes possible to implement ACLs that drop such "first
fragments" on the basis of L4 headers. In practice, that effectively
blocks even fragmented traffic on an L4 basis, because the receiving IP
stack cannot reassemble a full packet when the first fragment is missing.
This commit works by adding a new "fragment type" to the kernel flow match
and making it available through OpenFlow as a new NXM field named
NXM_NX_IP_FRAG. Because OpenFlow 1.0 explicitly says that the L4 fields
are always 0 for IP fragments, it adds a new OpenFlow fragment handling
mode that fills in the L4 fields for "first fragments". It also enhances
ovs-ofctl to allow users to configure this new fragment handling mode and
to parse the new field.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Bug #7557.
2011-10-19 21:33:44 -07:00
|
|
|
|
static void
|
|
|
|
|
nxm_put_8m(struct ofpbuf *b, uint32_t header, uint8_t value, uint8_t mask)
|
|
|
|
|
{
|
|
|
|
|
switch (mask) {
|
|
|
|
|
case 0:
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case UINT8_MAX:
|
|
|
|
|
nxm_put_8(b, header, value);
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
nxm_put_header(b, NXM_MAKE_WILD_HEADER(header));
|
|
|
|
|
ofpbuf_put(b, &value, sizeof value);
|
|
|
|
|
ofpbuf_put(b, &mask, sizeof mask);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-11-09 17:00:59 -08:00
|
|
|
|
static void
|
|
|
|
|
nxm_put_16(struct ofpbuf *b, uint32_t header, ovs_be16 value)
|
|
|
|
|
{
|
|
|
|
|
nxm_put_header(b, header);
|
|
|
|
|
ofpbuf_put(b, &value, sizeof value);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
nxm_put_16w(struct ofpbuf *b, uint32_t header, ovs_be16 value, ovs_be16 mask)
|
|
|
|
|
{
|
|
|
|
|
nxm_put_header(b, header);
|
|
|
|
|
ofpbuf_put(b, &value, sizeof value);
|
|
|
|
|
ofpbuf_put(b, &mask, sizeof mask);
|
|
|
|
|
}
|
|
|
|
|
|
2010-11-23 10:06:28 -08:00
|
|
|
|
static void
|
|
|
|
|
nxm_put_16m(struct ofpbuf *b, uint32_t header, ovs_be16 value, ovs_be16 mask)
|
|
|
|
|
{
|
|
|
|
|
switch (mask) {
|
|
|
|
|
case 0:
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case CONSTANT_HTONS(UINT16_MAX):
|
|
|
|
|
nxm_put_16(b, header, value);
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
nxm_put_16w(b, NXM_MAKE_WILD_HEADER(header), value, mask);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-11-09 17:00:59 -08:00
|
|
|
|
static void
|
|
|
|
|
nxm_put_32(struct ofpbuf *b, uint32_t header, ovs_be32 value)
|
|
|
|
|
{
|
|
|
|
|
nxm_put_header(b, header);
|
|
|
|
|
ofpbuf_put(b, &value, sizeof value);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
nxm_put_32w(struct ofpbuf *b, uint32_t header, ovs_be32 value, ovs_be32 mask)
|
|
|
|
|
{
|
|
|
|
|
nxm_put_header(b, header);
|
|
|
|
|
ofpbuf_put(b, &value, sizeof value);
|
|
|
|
|
ofpbuf_put(b, &mask, sizeof mask);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
nxm_put_32m(struct ofpbuf *b, uint32_t header, ovs_be32 value, ovs_be32 mask)
|
|
|
|
|
{
|
|
|
|
|
switch (mask) {
|
|
|
|
|
case 0:
|
|
|
|
|
break;
|
|
|
|
|
|
2010-11-23 10:06:28 -08:00
|
|
|
|
case CONSTANT_HTONL(UINT32_MAX):
|
2010-11-09 17:00:59 -08:00
|
|
|
|
nxm_put_32(b, header, value);
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
nxm_put_32w(b, NXM_MAKE_WILD_HEADER(header), value, mask);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
nxm_put_64(struct ofpbuf *b, uint32_t header, ovs_be64 value)
|
|
|
|
|
{
|
|
|
|
|
nxm_put_header(b, header);
|
|
|
|
|
ofpbuf_put(b, &value, sizeof value);
|
|
|
|
|
}
|
|
|
|
|
|
2011-01-20 15:29:00 -08:00
|
|
|
|
static void
|
|
|
|
|
nxm_put_64w(struct ofpbuf *b, uint32_t header, ovs_be64 value, ovs_be64 mask)
|
|
|
|
|
{
|
|
|
|
|
nxm_put_header(b, header);
|
|
|
|
|
ofpbuf_put(b, &value, sizeof value);
|
|
|
|
|
ofpbuf_put(b, &mask, sizeof mask);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
nxm_put_64m(struct ofpbuf *b, uint32_t header, ovs_be64 value, ovs_be64 mask)
|
|
|
|
|
{
|
|
|
|
|
switch (mask) {
|
|
|
|
|
case 0:
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case CONSTANT_HTONLL(UINT64_MAX):
|
|
|
|
|
nxm_put_64(b, header, value);
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
nxm_put_64w(b, NXM_MAKE_WILD_HEADER(header), value, mask);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-11-09 17:00:59 -08:00
|
|
|
|
static void
|
|
|
|
|
nxm_put_eth(struct ofpbuf *b, uint32_t header,
|
|
|
|
|
const uint8_t value[ETH_ADDR_LEN])
|
|
|
|
|
{
|
|
|
|
|
nxm_put_header(b, header);
|
|
|
|
|
ofpbuf_put(b, value, ETH_ADDR_LEN);
|
|
|
|
|
}
|
|
|
|
|
|
2010-11-11 10:46:23 -08:00
|
|
|
|
static void
|
2012-05-29 00:38:21 +12:00
|
|
|
|
nxm_put_eth_masked(struct ofpbuf *b, uint32_t header,
|
|
|
|
|
const uint8_t value[ETH_ADDR_LEN],
|
|
|
|
|
const uint8_t mask[ETH_ADDR_LEN])
|
2010-11-11 10:46:23 -08:00
|
|
|
|
{
|
2012-05-29 00:38:21 +12:00
|
|
|
|
if (!eth_addr_is_zero(mask)) {
|
|
|
|
|
if (eth_mask_is_exact(mask)) {
|
|
|
|
|
nxm_put_eth(b, header, value);
|
|
|
|
|
} else {
|
|
|
|
|
nxm_put_header(b, NXM_MAKE_WILD_HEADER(header));
|
|
|
|
|
ofpbuf_put(b, value, ETH_ADDR_LEN);
|
|
|
|
|
ofpbuf_put(b, mask, ETH_ADDR_LEN);
|
|
|
|
|
}
|
2010-11-11 10:46:23 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-12-29 19:03:46 -08:00
|
|
|
|
static void
|
|
|
|
|
nxm_put_ipv6(struct ofpbuf *b, uint32_t header,
|
|
|
|
|
const struct in6_addr *value, const struct in6_addr *mask)
|
|
|
|
|
{
|
|
|
|
|
if (ipv6_mask_is_any(mask)) {
|
|
|
|
|
return;
|
|
|
|
|
} else if (ipv6_mask_is_exact(mask)) {
|
|
|
|
|
nxm_put_header(b, header);
|
|
|
|
|
ofpbuf_put(b, value, sizeof *value);
|
|
|
|
|
} else {
|
|
|
|
|
nxm_put_header(b, NXM_MAKE_WILD_HEADER(header));
|
|
|
|
|
ofpbuf_put(b, value, sizeof *value);
|
|
|
|
|
ofpbuf_put(b, mask, sizeof *mask);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
Implement new fragment handling policy.
Until now, OVS has handled IP fragments more awkwardly than necessary. It
has not been possible to match on L4 headers, even in fragments with offset
0 where they are actually present. This means that there was no way to
implement ACLs that treat, say, different TCP ports differently, on
fragmented traffic; instead, all decisions for fragment forwarding had to
be made on the basis of L2 and L3 headers alone.
This commit improves the situation significantly. It is still not possible
to match on L4 headers in fragments with nonzero offset, because that
information is simply not present in such fragments, but this commit adds
the ability to match on L4 headers for fragments with zero offset. This
means that it becomes possible to implement ACLs that drop such "first
fragments" on the basis of L4 headers. In practice, that effectively
blocks even fragmented traffic on an L4 basis, because the receiving IP
stack cannot reassemble a full packet when the first fragment is missing.
This commit works by adding a new "fragment type" to the kernel flow match
and making it available through OpenFlow as a new NXM field named
NXM_NX_IP_FRAG. Because OpenFlow 1.0 explicitly says that the L4 fields
are always 0 for IP fragments, it adds a new OpenFlow fragment handling
mode that fills in the L4 fields for "first fragments". It also enhances
ovs-ofctl to allow users to configure this new fragment handling mode and
to parse the new field.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Bug #7557.
2011-10-19 21:33:44 -07:00
|
|
|
|
static void
|
2012-08-07 15:28:18 -07:00
|
|
|
|
nxm_put_frag(struct ofpbuf *b, const struct match *match)
|
Implement new fragment handling policy.
Until now, OVS has handled IP fragments more awkwardly than necessary. It
has not been possible to match on L4 headers, even in fragments with offset
0 where they are actually present. This means that there was no way to
implement ACLs that treat, say, different TCP ports differently, on
fragmented traffic; instead, all decisions for fragment forwarding had to
be made on the basis of L2 and L3 headers alone.
This commit improves the situation significantly. It is still not possible
to match on L4 headers in fragments with nonzero offset, because that
information is simply not present in such fragments, but this commit adds
the ability to match on L4 headers for fragments with zero offset. This
means that it becomes possible to implement ACLs that drop such "first
fragments" on the basis of L4 headers. In practice, that effectively
blocks even fragmented traffic on an L4 basis, because the receiving IP
stack cannot reassemble a full packet when the first fragment is missing.
This commit works by adding a new "fragment type" to the kernel flow match
and making it available through OpenFlow as a new NXM field named
NXM_NX_IP_FRAG. Because OpenFlow 1.0 explicitly says that the L4 fields
are always 0 for IP fragments, it adds a new OpenFlow fragment handling
mode that fills in the L4 fields for "first fragments". It also enhances
ovs-ofctl to allow users to configure this new fragment handling mode and
to parse the new field.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Bug #7557.
2011-10-19 21:33:44 -07:00
|
|
|
|
{
|
2012-08-07 15:28:18 -07:00
|
|
|
|
uint8_t nw_frag = match->flow.nw_frag;
|
|
|
|
|
uint8_t nw_frag_mask = match->wc.masks.nw_frag;
|
Implement new fragment handling policy.
Until now, OVS has handled IP fragments more awkwardly than necessary. It
has not been possible to match on L4 headers, even in fragments with offset
0 where they are actually present. This means that there was no way to
implement ACLs that treat, say, different TCP ports differently, on
fragmented traffic; instead, all decisions for fragment forwarding had to
be made on the basis of L2 and L3 headers alone.
This commit improves the situation significantly. It is still not possible
to match on L4 headers in fragments with nonzero offset, because that
information is simply not present in such fragments, but this commit adds
the ability to match on L4 headers for fragments with zero offset. This
means that it becomes possible to implement ACLs that drop such "first
fragments" on the basis of L4 headers. In practice, that effectively
blocks even fragmented traffic on an L4 basis, because the receiving IP
stack cannot reassemble a full packet when the first fragment is missing.
This commit works by adding a new "fragment type" to the kernel flow match
and making it available through OpenFlow as a new NXM field named
NXM_NX_IP_FRAG. Because OpenFlow 1.0 explicitly says that the L4 fields
are always 0 for IP fragments, it adds a new OpenFlow fragment handling
mode that fills in the L4 fields for "first fragments". It also enhances
ovs-ofctl to allow users to configure this new fragment handling mode and
to parse the new field.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Bug #7557.
2011-10-19 21:33:44 -07:00
|
|
|
|
|
2011-11-09 17:10:27 -08:00
|
|
|
|
switch (nw_frag_mask) {
|
Implement new fragment handling policy.
Until now, OVS has handled IP fragments more awkwardly than necessary. It
has not been possible to match on L4 headers, even in fragments with offset
0 where they are actually present. This means that there was no way to
implement ACLs that treat, say, different TCP ports differently, on
fragmented traffic; instead, all decisions for fragment forwarding had to
be made on the basis of L2 and L3 headers alone.
This commit improves the situation significantly. It is still not possible
to match on L4 headers in fragments with nonzero offset, because that
information is simply not present in such fragments, but this commit adds
the ability to match on L4 headers for fragments with zero offset. This
means that it becomes possible to implement ACLs that drop such "first
fragments" on the basis of L4 headers. In practice, that effectively
blocks even fragmented traffic on an L4 basis, because the receiving IP
stack cannot reassemble a full packet when the first fragment is missing.
This commit works by adding a new "fragment type" to the kernel flow match
and making it available through OpenFlow as a new NXM field named
NXM_NX_IP_FRAG. Because OpenFlow 1.0 explicitly says that the L4 fields
are always 0 for IP fragments, it adds a new OpenFlow fragment handling
mode that fills in the L4 fields for "first fragments". It also enhances
ovs-ofctl to allow users to configure this new fragment handling mode and
to parse the new field.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Bug #7557.
2011-10-19 21:33:44 -07:00
|
|
|
|
case 0:
|
|
|
|
|
break;
|
|
|
|
|
|
2011-11-09 17:10:27 -08:00
|
|
|
|
case FLOW_NW_FRAG_MASK:
|
|
|
|
|
nxm_put_8(b, NXM_NX_IP_FRAG, nw_frag);
|
Implement new fragment handling policy.
Until now, OVS has handled IP fragments more awkwardly than necessary. It
has not been possible to match on L4 headers, even in fragments with offset
0 where they are actually present. This means that there was no way to
implement ACLs that treat, say, different TCP ports differently, on
fragmented traffic; instead, all decisions for fragment forwarding had to
be made on the basis of L2 and L3 headers alone.
This commit improves the situation significantly. It is still not possible
to match on L4 headers in fragments with nonzero offset, because that
information is simply not present in such fragments, but this commit adds
the ability to match on L4 headers for fragments with zero offset. This
means that it becomes possible to implement ACLs that drop such "first
fragments" on the basis of L4 headers. In practice, that effectively
blocks even fragmented traffic on an L4 basis, because the receiving IP
stack cannot reassemble a full packet when the first fragment is missing.
This commit works by adding a new "fragment type" to the kernel flow match
and making it available through OpenFlow as a new NXM field named
NXM_NX_IP_FRAG. Because OpenFlow 1.0 explicitly says that the L4 fields
are always 0 for IP fragments, it adds a new OpenFlow fragment handling
mode that fills in the L4 fields for "first fragments". It also enhances
ovs-ofctl to allow users to configure this new fragment handling mode and
to parse the new field.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Bug #7557.
2011-10-19 21:33:44 -07:00
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
default:
|
2011-11-09 17:10:27 -08:00
|
|
|
|
nxm_put_8m(b, NXM_NX_IP_FRAG, nw_frag,
|
|
|
|
|
nw_frag_mask & FLOW_NW_FRAG_MASK);
|
Implement new fragment handling policy.
Until now, OVS has handled IP fragments more awkwardly than necessary. It
has not been possible to match on L4 headers, even in fragments with offset
0 where they are actually present. This means that there was no way to
implement ACLs that treat, say, different TCP ports differently, on
fragmented traffic; instead, all decisions for fragment forwarding had to
be made on the basis of L2 and L3 headers alone.
This commit improves the situation significantly. It is still not possible
to match on L4 headers in fragments with nonzero offset, because that
information is simply not present in such fragments, but this commit adds
the ability to match on L4 headers for fragments with zero offset. This
means that it becomes possible to implement ACLs that drop such "first
fragments" on the basis of L4 headers. In practice, that effectively
blocks even fragmented traffic on an L4 basis, because the receiving IP
stack cannot reassemble a full packet when the first fragment is missing.
This commit works by adding a new "fragment type" to the kernel flow match
and making it available through OpenFlow as a new NXM field named
NXM_NX_IP_FRAG. Because OpenFlow 1.0 explicitly says that the L4 fields
are always 0 for IP fragments, it adds a new OpenFlow fragment handling
mode that fills in the L4 fields for "first fragments". It also enhances
ovs-ofctl to allow users to configure this new fragment handling mode and
to parse the new field.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Bug #7557.
2011-10-19 21:33:44 -07:00
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2012-02-02 16:44:44 -08:00
|
|
|
|
static void
|
2012-08-07 15:28:18 -07:00
|
|
|
|
nxm_put_ip(struct ofpbuf *b, const struct match *match,
|
2012-06-11 09:56:12 -07:00
|
|
|
|
uint8_t icmp_proto, uint32_t icmp_type, uint32_t icmp_code,
|
|
|
|
|
bool oxm)
|
2012-02-02 16:44:44 -08:00
|
|
|
|
{
|
2012-08-07 15:28:18 -07:00
|
|
|
|
const struct flow *flow = &match->flow;
|
2012-02-02 16:44:44 -08:00
|
|
|
|
|
2012-08-07 15:28:18 -07:00
|
|
|
|
nxm_put_frag(b, match);
|
2012-02-02 16:44:44 -08:00
|
|
|
|
|
2012-08-07 15:28:18 -07:00
|
|
|
|
if (match->wc.masks.nw_tos & IP_DSCP_MASK) {
|
2012-06-11 09:56:12 -07:00
|
|
|
|
nxm_put_8(b, oxm ? OXM_OF_IP_DSCP : NXM_OF_IP_TOS,
|
|
|
|
|
flow->nw_tos & IP_DSCP_MASK);
|
2012-02-02 16:44:44 -08:00
|
|
|
|
}
|
|
|
|
|
|
2012-08-07 15:28:18 -07:00
|
|
|
|
if (match->wc.masks.nw_tos & IP_ECN_MASK) {
|
2012-06-11 09:56:12 -07:00
|
|
|
|
nxm_put_8(b, oxm ? OXM_OF_IP_ECN : NXM_NX_IP_ECN,
|
|
|
|
|
flow->nw_tos & IP_ECN_MASK);
|
2012-02-02 16:44:44 -08:00
|
|
|
|
}
|
|
|
|
|
|
2012-08-07 15:28:18 -07:00
|
|
|
|
if (!oxm && match->wc.masks.nw_ttl) {
|
2012-02-02 16:44:44 -08:00
|
|
|
|
nxm_put_8(b, NXM_NX_IP_TTL, flow->nw_ttl);
|
|
|
|
|
}
|
|
|
|
|
|
2012-08-07 15:28:18 -07:00
|
|
|
|
if (match->wc.masks.nw_proto) {
|
2012-06-11 09:56:12 -07:00
|
|
|
|
nxm_put_8(b, oxm ? OXM_OF_IP_PROTO : NXM_OF_IP_PROTO, flow->nw_proto);
|
2012-02-02 16:44:44 -08:00
|
|
|
|
|
|
|
|
|
if (flow->nw_proto == IPPROTO_TCP) {
|
2012-06-11 09:56:12 -07:00
|
|
|
|
nxm_put_16m(b, oxm ? OXM_OF_TCP_SRC : NXM_OF_TCP_SRC,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
flow->tp_src, match->wc.masks.tp_src);
|
2012-06-11 09:56:12 -07:00
|
|
|
|
nxm_put_16m(b, oxm ? OXM_OF_TCP_DST : NXM_OF_TCP_DST,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
flow->tp_dst, match->wc.masks.tp_dst);
|
2012-02-02 16:44:44 -08:00
|
|
|
|
} else if (flow->nw_proto == IPPROTO_UDP) {
|
2012-06-11 09:56:12 -07:00
|
|
|
|
nxm_put_16m(b, oxm ? OXM_OF_UDP_SRC : NXM_OF_UDP_SRC,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
flow->tp_src, match->wc.masks.tp_src);
|
2012-06-11 09:56:12 -07:00
|
|
|
|
nxm_put_16m(b, oxm ? OXM_OF_UDP_DST : NXM_OF_UDP_DST,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
flow->tp_dst, match->wc.masks.tp_dst);
|
2012-02-02 16:44:44 -08:00
|
|
|
|
} else if (flow->nw_proto == icmp_proto) {
|
2012-08-07 15:28:18 -07:00
|
|
|
|
if (match->wc.masks.tp_src) {
|
2012-02-02 16:44:44 -08:00
|
|
|
|
nxm_put_8(b, icmp_type, ntohs(flow->tp_src));
|
|
|
|
|
}
|
2012-08-07 15:28:18 -07:00
|
|
|
|
if (match->wc.masks.tp_dst) {
|
2012-02-02 16:44:44 -08:00
|
|
|
|
nxm_put_8(b, icmp_code, ntohs(flow->tp_dst));
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2012-08-07 15:28:18 -07:00
|
|
|
|
/* Appends to 'b' the nx_match format that expresses 'match'. For Flow Mod and
|
2012-08-01 16:01:45 +09:00
|
|
|
|
* Flow Stats Requests messages, a 'cookie' and 'cookie_mask' may be supplied.
|
|
|
|
|
* Otherwise, 'cookie_mask' should be zero.
|
2010-12-15 09:48:16 -08:00
|
|
|
|
*
|
|
|
|
|
* This function can cause 'b''s data to be reallocated.
|
|
|
|
|
*
|
|
|
|
|
* Returns the number of bytes appended to 'b', excluding padding.
|
|
|
|
|
*
|
2012-08-07 15:28:18 -07:00
|
|
|
|
* If 'match' is a catch-all rule that matches every packet, then this function
|
2010-12-15 09:48:16 -08:00
|
|
|
|
* appends nothing to 'b' and returns 0. */
|
2012-08-01 16:01:45 +09:00
|
|
|
|
static int
|
2012-08-07 15:28:18 -07:00
|
|
|
|
nx_put_raw(struct ofpbuf *b, bool oxm, const struct match *match,
|
2012-08-01 16:01:45 +09:00
|
|
|
|
ovs_be64 cookie, ovs_be64 cookie_mask)
|
2010-11-09 17:00:59 -08:00
|
|
|
|
{
|
2012-08-07 15:28:18 -07:00
|
|
|
|
const struct flow *flow = &match->flow;
|
2010-11-09 17:00:59 -08:00
|
|
|
|
const size_t start_len = b->size;
|
|
|
|
|
int match_len;
|
2010-11-11 10:41:33 -08:00
|
|
|
|
int i;
|
2010-11-09 17:00:59 -08:00
|
|
|
|
|
2012-06-18 13:33:13 -07:00
|
|
|
|
BUILD_ASSERT_DECL(FLOW_WC_SEQ == 17);
|
2011-07-29 13:15:09 -07:00
|
|
|
|
|
2010-11-09 17:00:59 -08:00
|
|
|
|
/* Metadata. */
|
2012-08-07 15:28:18 -07:00
|
|
|
|
if (match->wc.masks.in_port) {
|
2010-11-09 17:00:59 -08:00
|
|
|
|
uint16_t in_port = flow->in_port;
|
2012-06-11 09:56:12 -07:00
|
|
|
|
if (oxm) {
|
|
|
|
|
nxm_put_32(b, OXM_OF_IN_PORT, ofputil_port_to_ofp11(in_port));
|
|
|
|
|
} else {
|
|
|
|
|
nxm_put_16(b, NXM_OF_IN_PORT, htons(in_port));
|
|
|
|
|
}
|
2010-11-09 17:00:59 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Ethernet. */
|
2012-06-11 09:56:12 -07:00
|
|
|
|
nxm_put_eth_masked(b, oxm ? OXM_OF_ETH_SRC : NXM_OF_ETH_SRC,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
flow->dl_src, match->wc.masks.dl_src);
|
2012-06-11 09:56:12 -07:00
|
|
|
|
nxm_put_eth_masked(b, oxm ? OXM_OF_ETH_DST : NXM_OF_ETH_DST,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
flow->dl_dst, match->wc.masks.dl_dst);
|
2012-06-18 13:33:13 -07:00
|
|
|
|
nxm_put_16m(b, oxm ? OXM_OF_ETH_TYPE : NXM_OF_ETH_TYPE,
|
|
|
|
|
ofputil_dl_type_to_openflow(flow->dl_type),
|
2012-08-07 15:28:18 -07:00
|
|
|
|
match->wc.masks.dl_type);
|
2010-11-09 17:00:59 -08:00
|
|
|
|
|
2012-07-23 11:36:43 +09:00
|
|
|
|
/* 802.1Q. */
|
|
|
|
|
if (oxm) {
|
2012-08-07 13:38:38 -07:00
|
|
|
|
ovs_be16 VID_CFI_MASK = htons(VLAN_VID_MASK | VLAN_CFI);
|
|
|
|
|
ovs_be16 vid = flow->vlan_tci & VID_CFI_MASK;
|
2012-08-07 15:28:18 -07:00
|
|
|
|
ovs_be16 mask = match->wc.masks.vlan_tci & VID_CFI_MASK;
|
2012-07-23 11:36:43 +09:00
|
|
|
|
|
|
|
|
|
if (mask == htons(VLAN_VID_MASK | VLAN_CFI)) {
|
|
|
|
|
nxm_put_16(b, OXM_OF_VLAN_VID, vid);
|
|
|
|
|
} else if (mask) {
|
|
|
|
|
nxm_put_16m(b, OXM_OF_VLAN_VID, vid, mask);
|
|
|
|
|
}
|
|
|
|
|
|
2012-08-07 15:28:18 -07:00
|
|
|
|
if (vid && vlan_tci_to_pcp(match->wc.masks.vlan_tci)) {
|
2012-07-23 11:36:43 +09:00
|
|
|
|
nxm_put_8(b, OXM_OF_VLAN_PCP, vlan_tci_to_pcp(flow->vlan_tci));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
} else {
|
2012-08-07 15:28:18 -07:00
|
|
|
|
nxm_put_16m(b, NXM_OF_VLAN_TCI, flow->vlan_tci,
|
|
|
|
|
match->wc.masks.vlan_tci);
|
2012-07-23 11:36:43 +09:00
|
|
|
|
}
|
2010-11-09 17:00:59 -08:00
|
|
|
|
|
2010-11-23 10:06:28 -08:00
|
|
|
|
/* L3. */
|
2012-06-18 13:33:13 -07:00
|
|
|
|
if (flow->dl_type == htons(ETH_TYPE_IP)) {
|
2010-11-09 17:00:59 -08:00
|
|
|
|
/* IP. */
|
2012-06-11 09:56:12 -07:00
|
|
|
|
nxm_put_32m(b, oxm ? OXM_OF_IPV4_SRC : NXM_OF_IP_SRC,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
flow->nw_src, match->wc.masks.nw_src);
|
2012-06-11 09:56:12 -07:00
|
|
|
|
nxm_put_32m(b, oxm ? OXM_OF_IPV4_DST : NXM_OF_IP_DST,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
flow->nw_dst, match->wc.masks.nw_dst);
|
|
|
|
|
nxm_put_ip(b, match, IPPROTO_ICMP,
|
2012-06-11 09:56:12 -07:00
|
|
|
|
oxm ? OXM_OF_ICMPV4_TYPE : NXM_OF_ICMP_TYPE,
|
|
|
|
|
oxm ? OXM_OF_ICMPV4_CODE : NXM_OF_ICMP_CODE, oxm);
|
2012-06-18 13:33:13 -07:00
|
|
|
|
} else if (flow->dl_type == htons(ETH_TYPE_IPV6)) {
|
2010-12-29 19:03:46 -08:00
|
|
|
|
/* IPv6. */
|
2012-06-11 09:56:12 -07:00
|
|
|
|
nxm_put_ipv6(b, oxm ? OXM_OF_IPV6_SRC : NXM_NX_IPV6_SRC,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
&flow->ipv6_src, &match->wc.masks.ipv6_src);
|
2012-06-11 09:56:12 -07:00
|
|
|
|
nxm_put_ipv6(b, oxm ? OXM_OF_IPV6_DST : NXM_NX_IPV6_DST,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
&flow->ipv6_dst, &match->wc.masks.ipv6_dst);
|
|
|
|
|
nxm_put_ip(b, match, IPPROTO_ICMPV6,
|
2012-06-11 09:56:12 -07:00
|
|
|
|
oxm ? OXM_OF_ICMPV6_TYPE : NXM_NX_ICMPV6_TYPE,
|
|
|
|
|
oxm ? OXM_OF_ICMPV6_CODE : NXM_NX_ICMPV6_CODE, oxm);
|
2011-11-02 18:17:36 -07:00
|
|
|
|
|
2012-07-18 12:02:19 +09:00
|
|
|
|
nxm_put_32m(b, oxm ? OXM_OF_IPV6_FLABEL : NXM_NX_IPV6_LABEL,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
flow->ipv6_label, match->wc.masks.ipv6_label);
|
2010-12-29 19:03:46 -08:00
|
|
|
|
|
2012-02-02 16:44:44 -08:00
|
|
|
|
if (flow->nw_proto == IPPROTO_ICMPV6
|
|
|
|
|
&& (flow->tp_src == htons(ND_NEIGHBOR_SOLICIT) ||
|
|
|
|
|
flow->tp_src == htons(ND_NEIGHBOR_ADVERT))) {
|
2012-06-11 09:56:12 -07:00
|
|
|
|
nxm_put_ipv6(b, oxm ? OXM_OF_IPV6_ND_TARGET : NXM_NX_ND_TARGET,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
&flow->nd_target, &match->wc.masks.nd_target);
|
2012-07-19 09:21:49 -07:00
|
|
|
|
if (flow->tp_src == htons(ND_NEIGHBOR_SOLICIT)) {
|
|
|
|
|
nxm_put_eth_masked(b, oxm ? OXM_OF_IPV6_ND_SLL : NXM_NX_ND_SLL,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
flow->arp_sha, match->wc.masks.arp_sha);
|
2012-02-02 16:44:44 -08:00
|
|
|
|
}
|
2012-07-19 09:21:49 -07:00
|
|
|
|
if (flow->tp_src == htons(ND_NEIGHBOR_ADVERT)) {
|
|
|
|
|
nxm_put_eth_masked(b, oxm ? OXM_OF_IPV6_ND_TLL : NXM_NX_ND_TLL,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
flow->arp_tha, match->wc.masks.arp_tha);
|
2010-12-29 19:03:46 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
2012-06-18 13:33:13 -07:00
|
|
|
|
} else if (flow->dl_type == htons(ETH_TYPE_ARP)) {
|
2010-11-09 17:00:59 -08:00
|
|
|
|
/* ARP. */
|
2012-08-07 15:28:18 -07:00
|
|
|
|
if (match->wc.masks.nw_proto) {
|
2012-06-11 09:56:12 -07:00
|
|
|
|
nxm_put_16(b, oxm ? OXM_OF_ARP_OP : NXM_OF_ARP_OP,
|
|
|
|
|
htons(flow->nw_proto));
|
2010-11-09 17:00:59 -08:00
|
|
|
|
}
|
2012-06-11 09:56:12 -07:00
|
|
|
|
nxm_put_32m(b, oxm ? OXM_OF_ARP_SPA : NXM_OF_ARP_SPA,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
flow->nw_src, match->wc.masks.nw_src);
|
2012-06-11 09:56:12 -07:00
|
|
|
|
nxm_put_32m(b, oxm ? OXM_OF_ARP_TPA : NXM_OF_ARP_TPA,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
flow->nw_dst, match->wc.masks.nw_dst);
|
2012-07-19 09:21:49 -07:00
|
|
|
|
nxm_put_eth_masked(b, oxm ? OXM_OF_ARP_SHA : NXM_NX_ARP_SHA,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
flow->arp_sha, match->wc.masks.arp_sha);
|
2012-07-19 09:21:49 -07:00
|
|
|
|
nxm_put_eth_masked(b, oxm ? OXM_OF_ARP_THA : NXM_NX_ARP_THA,
|
2012-08-07 15:28:18 -07:00
|
|
|
|
flow->arp_tha, match->wc.masks.arp_tha);
|
2010-11-09 17:00:59 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Tunnel ID. */
|
2012-09-13 20:11:08 -07:00
|
|
|
|
nxm_put_64m(b, NXM_NX_TUN_ID, flow->tunnel.tun_id,
|
|
|
|
|
match->wc.masks.tunnel.tun_id);
|
2010-11-09 17:00:59 -08:00
|
|
|
|
|
2010-11-11 10:41:33 -08:00
|
|
|
|
/* Registers. */
|
|
|
|
|
for (i = 0; i < FLOW_N_REGS; i++) {
|
|
|
|
|
nxm_put_32m(b, NXM_NX_REG(i),
|
2012-08-07 15:28:18 -07:00
|
|
|
|
htonl(flow->regs[i]), htonl(match->wc.masks.regs[i]));
|
2010-11-11 10:41:33 -08:00
|
|
|
|
}
|
|
|
|
|
|
2012-06-27 01:09:44 +12:00
|
|
|
|
/* OpenFlow 1.1+ Metadata. */
|
2012-08-07 15:28:18 -07:00
|
|
|
|
nxm_put_64m(b, OXM_OF_METADATA, flow->metadata, match->wc.masks.metadata);
|
2012-06-27 01:09:44 +12:00
|
|
|
|
|
2011-12-23 12:23:24 -08:00
|
|
|
|
/* Cookie. */
|
|
|
|
|
nxm_put_64m(b, NXM_NX_COOKIE, cookie, cookie_mask);
|
|
|
|
|
|
2010-11-09 17:00:59 -08:00
|
|
|
|
match_len = b->size - start_len;
|
2012-08-01 16:01:45 +09:00
|
|
|
|
return match_len;
|
|
|
|
|
}
|
|
|
|
|
|
2012-08-07 15:28:18 -07:00
|
|
|
|
/* Appends to 'b' the nx_match format that expresses 'match', plus enough zero
|
2012-08-01 16:01:45 +09:00
|
|
|
|
* bytes to pad the nx_match out to a multiple of 8. For Flow Mod and Flow
|
|
|
|
|
* Stats Requests messages, a 'cookie' and 'cookie_mask' may be supplied.
|
|
|
|
|
* Otherwise, 'cookie_mask' should be zero.
|
|
|
|
|
*
|
|
|
|
|
* This function can cause 'b''s data to be reallocated.
|
|
|
|
|
*
|
|
|
|
|
* Returns the number of bytes appended to 'b', excluding padding. The return
|
|
|
|
|
* value can be zero if it appended nothing at all to 'b' (which happens if
|
|
|
|
|
* 'cr' is a catch-all rule that matches every packet). */
|
|
|
|
|
int
|
2012-08-07 15:28:18 -07:00
|
|
|
|
nx_put_match(struct ofpbuf *b, const struct match *match,
|
2012-08-01 16:01:45 +09:00
|
|
|
|
ovs_be64 cookie, ovs_be64 cookie_mask)
|
|
|
|
|
{
|
2012-08-07 15:28:18 -07:00
|
|
|
|
int match_len = nx_put_raw(b, false, match, cookie, cookie_mask);
|
2012-08-01 16:01:45 +09:00
|
|
|
|
|
|
|
|
|
ofpbuf_put_zeros(b, ROUND_UP(match_len, 8) - match_len);
|
|
|
|
|
return match_len;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Appends to 'b' an struct ofp11_match_header followed by the oxm format that
|
2012-08-07 15:28:18 -07:00
|
|
|
|
* expresses 'cr', plus enough zero bytes to pad the data appended out to a
|
|
|
|
|
* multiple of 8.
|
2012-08-01 16:01:45 +09:00
|
|
|
|
*
|
|
|
|
|
* This function can cause 'b''s data to be reallocated.
|
|
|
|
|
*
|
|
|
|
|
* Returns the number of bytes appended to 'b', excluding the padding. Never
|
|
|
|
|
* returns zero. */
|
|
|
|
|
int
|
2012-08-07 15:28:18 -07:00
|
|
|
|
oxm_put_match(struct ofpbuf *b, const struct match *match)
|
2012-08-01 16:01:45 +09:00
|
|
|
|
{
|
|
|
|
|
int match_len;
|
|
|
|
|
struct ofp11_match_header *omh;
|
|
|
|
|
size_t start_len = b->size;
|
|
|
|
|
ovs_be64 cookie = htonll(0), cookie_mask = htonll(0);
|
|
|
|
|
|
|
|
|
|
ofpbuf_put_uninit(b, sizeof *omh);
|
2012-08-07 15:28:18 -07:00
|
|
|
|
match_len = nx_put_raw(b, true, match, cookie, cookie_mask) + sizeof *omh;
|
2010-11-09 17:00:59 -08:00
|
|
|
|
ofpbuf_put_zeros(b, ROUND_UP(match_len, 8) - match_len);
|
2012-08-01 16:01:45 +09:00
|
|
|
|
|
|
|
|
|
omh = (struct ofp11_match_header *)((char *)b->data + start_len);
|
|
|
|
|
omh->type = htons(OFPMT_OXM);
|
|
|
|
|
omh->length = htons(match_len);
|
|
|
|
|
|
2010-11-09 17:00:59 -08:00
|
|
|
|
return match_len;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* nx_match_to_string() and helpers. */
|
|
|
|
|
|
2010-12-09 11:03:35 -08:00
|
|
|
|
static void format_nxm_field_name(struct ds *, uint32_t header);
|
|
|
|
|
|
2010-11-09 17:00:59 -08:00
|
|
|
|
char *
|
|
|
|
|
nx_match_to_string(const uint8_t *p, unsigned int match_len)
|
|
|
|
|
{
|
|
|
|
|
uint32_t header;
|
|
|
|
|
struct ds s;
|
|
|
|
|
|
|
|
|
|
if (!match_len) {
|
|
|
|
|
return xstrdup("<any>");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ds_init(&s);
|
|
|
|
|
while ((header = nx_entry_ok(p, match_len)) != 0) {
|
|
|
|
|
unsigned int length = NXM_LENGTH(header);
|
|
|
|
|
unsigned int value_len = nxm_field_bytes(header);
|
|
|
|
|
const uint8_t *value = p + 4;
|
|
|
|
|
const uint8_t *mask = value + value_len;
|
|
|
|
|
unsigned int i;
|
|
|
|
|
|
|
|
|
|
if (s.length) {
|
|
|
|
|
ds_put_cstr(&s, ", ");
|
|
|
|
|
}
|
|
|
|
|
|
2010-12-09 11:03:35 -08:00
|
|
|
|
format_nxm_field_name(&s, header);
|
2010-11-09 17:00:59 -08:00
|
|
|
|
ds_put_char(&s, '(');
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < value_len; i++) {
|
|
|
|
|
ds_put_format(&s, "%02x", value[i]);
|
|
|
|
|
}
|
|
|
|
|
if (NXM_HASMASK(header)) {
|
|
|
|
|
ds_put_char(&s, '/');
|
|
|
|
|
for (i = 0; i < value_len; i++) {
|
|
|
|
|
ds_put_format(&s, "%02x", mask[i]);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
ds_put_char(&s, ')');
|
|
|
|
|
|
|
|
|
|
p += 4 + length;
|
|
|
|
|
match_len -= 4 + length;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (match_len) {
|
|
|
|
|
if (s.length) {
|
|
|
|
|
ds_put_cstr(&s, ", ");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ds_put_format(&s, "<%u invalid bytes>", match_len);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return ds_steal_cstr(&s);
|
|
|
|
|
}
|
|
|
|
|
|
2012-08-01 16:01:45 +09:00
|
|
|
|
char *
|
|
|
|
|
oxm_match_to_string(const uint8_t *p, unsigned int match_len)
|
|
|
|
|
{
|
|
|
|
|
const struct ofp11_match_header *omh = (struct ofp11_match_header *)p;
|
|
|
|
|
uint16_t match_len_;
|
|
|
|
|
struct ds s;
|
|
|
|
|
|
|
|
|
|
ds_init(&s);
|
|
|
|
|
|
|
|
|
|
if (match_len < sizeof *omh) {
|
|
|
|
|
ds_put_format(&s, "<match too short: %u>", match_len);
|
|
|
|
|
goto err;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (omh->type != htons(OFPMT_OXM)) {
|
|
|
|
|
ds_put_format(&s, "<bad match type field: %u>", ntohs(omh->type));
|
|
|
|
|
goto err;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
match_len_ = ntohs(omh->length);
|
|
|
|
|
if (match_len_ < sizeof *omh) {
|
|
|
|
|
ds_put_format(&s, "<match length field too short: %u>", match_len_);
|
|
|
|
|
goto err;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (match_len_ != match_len) {
|
|
|
|
|
ds_put_format(&s, "<match length field incorrect: %u != %u>",
|
|
|
|
|
match_len_, match_len);
|
|
|
|
|
goto err;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return nx_match_to_string(p + sizeof *omh, match_len - sizeof *omh);
|
|
|
|
|
|
|
|
|
|
err:
|
|
|
|
|
return ds_steal_cstr(&s);
|
|
|
|
|
}
|
|
|
|
|
|
2010-12-09 11:03:35 -08:00
|
|
|
|
static void
|
|
|
|
|
format_nxm_field_name(struct ds *s, uint32_t header)
|
|
|
|
|
{
|
2011-10-12 17:04:13 -07:00
|
|
|
|
const struct mf_field *mf = mf_from_nxm_header(header);
|
|
|
|
|
if (mf) {
|
2012-06-11 09:56:12 -07:00
|
|
|
|
ds_put_cstr(s, IS_OXM_HEADER(header) ? mf->oxm_name : mf->nxm_name);
|
2011-10-12 17:04:13 -07:00
|
|
|
|
if (NXM_HASMASK(header)) {
|
|
|
|
|
ds_put_cstr(s, "_W");
|
|
|
|
|
}
|
2011-12-23 12:23:24 -08:00
|
|
|
|
} else if (header == NXM_NX_COOKIE) {
|
|
|
|
|
ds_put_cstr(s, "NXM_NX_COOKIE");
|
|
|
|
|
} else if (header == NXM_NX_COOKIE_W) {
|
|
|
|
|
ds_put_cstr(s, "NXM_NX_COOKIE_W");
|
2010-12-09 11:03:35 -08:00
|
|
|
|
} else {
|
|
|
|
|
ds_put_format(s, "%d:%d", NXM_VENDOR(header), NXM_FIELD(header));
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-12-07 11:04:15 -08:00
|
|
|
|
static uint32_t
|
|
|
|
|
parse_nxm_field_name(const char *name, int name_len)
|
2010-11-09 17:00:59 -08:00
|
|
|
|
{
|
2011-10-12 17:04:13 -07:00
|
|
|
|
bool wild;
|
|
|
|
|
int i;
|
2010-11-09 17:00:59 -08:00
|
|
|
|
|
2010-12-07 11:04:15 -08:00
|
|
|
|
/* Check whether it's a field name. */
|
2011-10-12 17:04:13 -07:00
|
|
|
|
wild = name_len > 2 && !memcmp(&name[name_len - 2], "_W", 2);
|
|
|
|
|
if (wild) {
|
|
|
|
|
name_len -= 2;
|
|
|
|
|
}
|
2011-12-23 12:23:24 -08:00
|
|
|
|
|
2011-10-12 17:04:13 -07:00
|
|
|
|
for (i = 0; i < MFF_N_IDS; i++) {
|
|
|
|
|
const struct mf_field *mf = mf_from_id(i);
|
2012-06-11 09:56:12 -07:00
|
|
|
|
uint32_t header;
|
|
|
|
|
|
|
|
|
|
if (mf->nxm_name &&
|
|
|
|
|
!strncmp(mf->nxm_name, name, name_len) &&
|
|
|
|
|
mf->nxm_name[name_len] == '\0') {
|
|
|
|
|
header = mf->nxm_header;
|
|
|
|
|
} else if (mf->oxm_name &&
|
|
|
|
|
!strncmp(mf->oxm_name, name, name_len) &&
|
|
|
|
|
mf->oxm_name[name_len] == '\0') {
|
|
|
|
|
header = mf->oxm_header;
|
|
|
|
|
} else {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
2011-10-12 17:04:13 -07:00
|
|
|
|
|
2012-06-11 09:56:12 -07:00
|
|
|
|
if (!wild) {
|
|
|
|
|
return header;
|
|
|
|
|
} else if (mf->maskable != MFM_NONE) {
|
|
|
|
|
return NXM_MAKE_WILD_HEADER(header);
|
2010-11-09 17:00:59 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2012-06-11 09:56:12 -07:00
|
|
|
|
if (!strncmp("NXM_NX_COOKIE", name, name_len) &&
|
|
|
|
|
(name_len == strlen("NXM_NX_COOKIE"))) {
|
2011-12-23 12:23:24 -08:00
|
|
|
|
if (!wild) {
|
|
|
|
|
return NXM_NX_COOKIE;
|
|
|
|
|
} else {
|
|
|
|
|
return NXM_NX_COOKIE_W;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-12-07 11:04:15 -08:00
|
|
|
|
/* Check whether it's a 32-bit field header value as hex.
|
|
|
|
|
* (This isn't ordinarily useful except for testing error behavior.) */
|
|
|
|
|
if (name_len == 8) {
|
|
|
|
|
uint32_t header = hexits_value(name, name_len, NULL);
|
|
|
|
|
if (header != UINT_MAX) {
|
|
|
|
|
return header;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
2010-11-09 17:00:59 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* nx_match_from_string(). */
|
|
|
|
|
|
2012-08-01 16:01:45 +09:00
|
|
|
|
static int
|
|
|
|
|
nx_match_from_string_raw(const char *s, struct ofpbuf *b)
|
2010-11-09 17:00:59 -08:00
|
|
|
|
{
|
|
|
|
|
const char *full_s = s;
|
|
|
|
|
const size_t start_len = b->size;
|
|
|
|
|
|
|
|
|
|
if (!strcmp(s, "<any>")) {
|
|
|
|
|
/* Ensure that 'b->data' isn't actually null. */
|
|
|
|
|
ofpbuf_prealloc_tailroom(b, 1);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (s += strspn(s, ", "); *s; s += strspn(s, ", ")) {
|
2010-12-07 11:04:15 -08:00
|
|
|
|
const char *name;
|
|
|
|
|
uint32_t header;
|
2010-11-09 17:00:59 -08:00
|
|
|
|
int name_len;
|
2010-12-08 13:09:59 -08:00
|
|
|
|
size_t n;
|
2010-11-09 17:00:59 -08:00
|
|
|
|
|
2010-12-07 11:04:15 -08:00
|
|
|
|
name = s;
|
2010-11-09 17:00:59 -08:00
|
|
|
|
name_len = strcspn(s, "(");
|
|
|
|
|
if (s[name_len] != '(') {
|
|
|
|
|
ovs_fatal(0, "%s: missing ( at end of nx_match", full_s);
|
|
|
|
|
}
|
|
|
|
|
|
2010-12-07 11:04:15 -08:00
|
|
|
|
header = parse_nxm_field_name(name, name_len);
|
|
|
|
|
if (!header) {
|
2010-11-09 17:00:59 -08:00
|
|
|
|
ovs_fatal(0, "%s: unknown field `%.*s'", full_s, name_len, s);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
s += name_len + 1;
|
|
|
|
|
|
2010-12-07 11:04:15 -08:00
|
|
|
|
nxm_put_header(b, header);
|
2010-12-08 13:09:59 -08:00
|
|
|
|
s = ofpbuf_put_hex(b, s, &n);
|
|
|
|
|
if (n != nxm_field_bytes(header)) {
|
|
|
|
|
ovs_fatal(0, "%.2s: hex digits expected", s);
|
|
|
|
|
}
|
2010-12-07 11:04:15 -08:00
|
|
|
|
if (NXM_HASMASK(header)) {
|
2010-11-09 17:00:59 -08:00
|
|
|
|
s += strspn(s, " ");
|
|
|
|
|
if (*s != '/') {
|
2010-12-07 11:04:15 -08:00
|
|
|
|
ovs_fatal(0, "%s: missing / in masked field %.*s",
|
|
|
|
|
full_s, name_len, name);
|
2010-11-09 17:00:59 -08:00
|
|
|
|
}
|
2010-12-08 13:09:59 -08:00
|
|
|
|
s = ofpbuf_put_hex(b, s + 1, &n);
|
|
|
|
|
if (n != nxm_field_bytes(header)) {
|
|
|
|
|
ovs_fatal(0, "%.2s: hex digits expected", s);
|
|
|
|
|
}
|
2010-11-09 17:00:59 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
s += strspn(s, " ");
|
|
|
|
|
if (*s != ')') {
|
2010-12-07 11:04:15 -08:00
|
|
|
|
ovs_fatal(0, "%s: missing ) following field %.*s",
|
|
|
|
|
full_s, name_len, name);
|
2010-11-09 17:00:59 -08:00
|
|
|
|
}
|
|
|
|
|
s++;
|
|
|
|
|
}
|
|
|
|
|
|
2012-08-01 16:01:45 +09:00
|
|
|
|
return b->size - start_len;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
nx_match_from_string(const char *s, struct ofpbuf *b)
|
|
|
|
|
{
|
|
|
|
|
int match_len = nx_match_from_string_raw(s, b);
|
|
|
|
|
ofpbuf_put_zeros(b, ROUND_UP(match_len, 8) - match_len);
|
|
|
|
|
return match_len;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
oxm_match_from_string(const char *s, struct ofpbuf *b)
|
|
|
|
|
{
|
|
|
|
|
int match_len;
|
|
|
|
|
struct ofp11_match_header *omh;
|
|
|
|
|
size_t start_len = b->size;
|
|
|
|
|
|
|
|
|
|
ofpbuf_put_uninit(b, sizeof *omh);
|
|
|
|
|
match_len = nx_match_from_string_raw(s, b) + sizeof *omh;
|
2010-11-09 17:00:59 -08:00
|
|
|
|
ofpbuf_put_zeros(b, ROUND_UP(match_len, 8) - match_len);
|
2012-08-01 16:01:45 +09:00
|
|
|
|
|
|
|
|
|
omh = (struct ofp11_match_header *)((char *)b->data + start_len);
|
|
|
|
|
omh->type = htons(OFPMT_OXM);
|
|
|
|
|
omh->length = htons(match_len);
|
|
|
|
|
|
2010-11-09 17:00:59 -08:00
|
|
|
|
return match_len;
|
|
|
|
|
}
|
2010-11-11 10:41:33 -08:00
|
|
|
|
|
2010-12-09 11:03:35 -08:00
|
|
|
|
void
|
2012-07-03 22:17:14 -07:00
|
|
|
|
nxm_parse_reg_move(struct ofpact_reg_move *move, const char *s)
|
2010-12-09 11:03:35 -08:00
|
|
|
|
{
|
|
|
|
|
const char *full_s = s;
|
|
|
|
|
|
2012-07-03 22:17:14 -07:00
|
|
|
|
s = mf_parse_subfield(&move->src, s);
|
2010-12-09 11:03:35 -08:00
|
|
|
|
if (strncmp(s, "->", 2)) {
|
|
|
|
|
ovs_fatal(0, "%s: missing `->' following source", full_s);
|
|
|
|
|
}
|
|
|
|
|
s += 2;
|
2012-07-03 22:17:14 -07:00
|
|
|
|
s = mf_parse_subfield(&move->dst, s);
|
2010-12-09 11:03:35 -08:00
|
|
|
|
if (*s != '\0') {
|
|
|
|
|
ovs_fatal(0, "%s: trailing garbage following destination", full_s);
|
|
|
|
|
}
|
|
|
|
|
|
2012-07-03 22:17:14 -07:00
|
|
|
|
if (move->src.n_bits != move->dst.n_bits) {
|
2010-12-09 11:03:35 -08:00
|
|
|
|
ovs_fatal(0, "%s: source field is %d bits wide but destination is "
|
2012-07-03 22:17:14 -07:00
|
|
|
|
"%d bits wide", full_s,
|
|
|
|
|
move->src.n_bits, move->dst.n_bits);
|
2010-12-09 11:03:35 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
2012-07-03 22:17:14 -07:00
|
|
|
|
nxm_parse_reg_load(struct ofpact_reg_load *load, const char *s)
|
2010-12-09 11:03:35 -08:00
|
|
|
|
{
|
|
|
|
|
const char *full_s = s;
|
2012-09-12 17:44:28 +09:00
|
|
|
|
uint64_t value = strtoull(s, (char **) &s, 0);
|
2010-12-09 11:03:35 -08:00
|
|
|
|
|
|
|
|
|
if (strncmp(s, "->", 2)) {
|
|
|
|
|
ovs_fatal(0, "%s: missing `->' following value", full_s);
|
|
|
|
|
}
|
|
|
|
|
s += 2;
|
2012-07-03 22:17:14 -07:00
|
|
|
|
s = mf_parse_subfield(&load->dst, s);
|
2010-12-09 11:03:35 -08:00
|
|
|
|
if (*s != '\0') {
|
|
|
|
|
ovs_fatal(0, "%s: trailing garbage following destination", full_s);
|
|
|
|
|
}
|
|
|
|
|
|
2012-09-12 17:44:28 +09:00
|
|
|
|
if (load->dst.n_bits < 64 && (value >> load->dst.n_bits) != 0) {
|
2012-07-03 22:17:14 -07:00
|
|
|
|
ovs_fatal(0, "%s: value %"PRIu64" does not fit into %d bits",
|
2012-09-12 17:44:28 +09:00
|
|
|
|
full_s, value, load->dst.n_bits);
|
2010-12-09 11:03:35 -08:00
|
|
|
|
}
|
2012-09-12 17:44:28 +09:00
|
|
|
|
|
2012-09-12 11:37:53 -07:00
|
|
|
|
load->subvalue.be64[0] = htonll(0);
|
|
|
|
|
load->subvalue.be64[1] = htonll(value);
|
2010-12-09 11:03:35 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* nxm_format_reg_move(), nxm_format_reg_load(). */
|
|
|
|
|
|
|
|
|
|
void
|
2012-07-03 22:17:14 -07:00
|
|
|
|
nxm_format_reg_move(const struct ofpact_reg_move *move, struct ds *s)
|
2010-12-09 11:03:35 -08:00
|
|
|
|
{
|
|
|
|
|
ds_put_format(s, "move:");
|
2012-07-03 22:17:14 -07:00
|
|
|
|
mf_format_subfield(&move->src, s);
|
2010-12-09 11:03:35 -08:00
|
|
|
|
ds_put_cstr(s, "->");
|
2012-07-03 22:17:14 -07:00
|
|
|
|
mf_format_subfield(&move->dst, s);
|
2010-12-09 11:03:35 -08:00
|
|
|
|
}
|
|
|
|
|
|
2012-09-14 12:05:44 +09:00
|
|
|
|
static void
|
|
|
|
|
set_field_format(const struct ofpact_reg_load *load, struct ds *s)
|
|
|
|
|
{
|
|
|
|
|
const struct mf_field *mf = load->dst.field;
|
|
|
|
|
union mf_value value;
|
|
|
|
|
|
|
|
|
|
assert(load->ofpact.compat == OFPUTIL_OFPAT12_SET_FIELD);
|
|
|
|
|
ds_put_format(s, "set_field:");
|
|
|
|
|
memset(&value, 0, sizeof value);
|
|
|
|
|
bitwise_copy(&load->subvalue, sizeof load->subvalue, 0,
|
|
|
|
|
&value, mf->n_bytes, 0, load->dst.n_bits);
|
|
|
|
|
mf_format(mf, &value, NULL, s);
|
|
|
|
|
ds_put_format(s, "->%s", mf->name);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
load_format(const struct ofpact_reg_load *load, struct ds *s)
|
2012-07-03 22:17:14 -07:00
|
|
|
|
{
|
2012-09-12 17:44:28 +09:00
|
|
|
|
ds_put_cstr(s, "load:");
|
2012-09-12 11:37:53 -07:00
|
|
|
|
mf_format_subvalue(&load->subvalue, s);
|
2012-09-12 17:44:28 +09:00
|
|
|
|
ds_put_cstr(s, "->");
|
2012-07-03 22:17:14 -07:00
|
|
|
|
mf_format_subfield(&load->dst, s);
|
|
|
|
|
}
|
2012-09-14 12:05:44 +09:00
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
nxm_format_reg_load(const struct ofpact_reg_load *load, struct ds *s)
|
|
|
|
|
{
|
|
|
|
|
if (load->ofpact.compat == OFPUTIL_OFPAT12_SET_FIELD) {
|
|
|
|
|
set_field_format(load, s);
|
|
|
|
|
} else {
|
|
|
|
|
load_format(load, s);
|
|
|
|
|
}
|
|
|
|
|
}
|
2012-07-03 22:17:14 -07:00
|
|
|
|
|
|
|
|
|
enum ofperr
|
|
|
|
|
nxm_reg_move_from_openflow(const struct nx_action_reg_move *narm,
|
|
|
|
|
struct ofpbuf *ofpacts)
|
2010-12-09 11:03:35 -08:00
|
|
|
|
{
|
2012-07-03 22:17:14 -07:00
|
|
|
|
struct ofpact_reg_move *move;
|
2010-12-09 11:03:35 -08:00
|
|
|
|
|
2012-07-03 22:17:14 -07:00
|
|
|
|
move = ofpact_put_REG_MOVE(ofpacts);
|
|
|
|
|
move->src.field = mf_from_nxm_header(ntohl(narm->src));
|
|
|
|
|
move->src.ofs = ntohs(narm->src_ofs);
|
|
|
|
|
move->src.n_bits = ntohs(narm->n_bits);
|
|
|
|
|
move->dst.field = mf_from_nxm_header(ntohl(narm->dst));
|
|
|
|
|
move->dst.ofs = ntohs(narm->dst_ofs);
|
|
|
|
|
move->dst.n_bits = ntohs(narm->n_bits);
|
2011-12-28 12:42:14 -08:00
|
|
|
|
|
2012-07-03 22:17:14 -07:00
|
|
|
|
return nxm_reg_move_check(move, NULL);
|
2010-12-09 11:03:35 -08:00
|
|
|
|
}
|
2010-11-11 10:41:33 -08:00
|
|
|
|
|
2011-12-28 12:42:14 -08:00
|
|
|
|
enum ofperr
|
2012-07-03 22:17:14 -07:00
|
|
|
|
nxm_reg_load_from_openflow(const struct nx_action_reg_load *narl,
|
|
|
|
|
struct ofpbuf *ofpacts)
|
2010-11-11 10:41:33 -08:00
|
|
|
|
{
|
2012-07-03 22:17:14 -07:00
|
|
|
|
struct ofpact_reg_load *load;
|
2010-11-11 10:41:33 -08:00
|
|
|
|
|
2012-07-03 22:17:14 -07:00
|
|
|
|
load = ofpact_put_REG_LOAD(ofpacts);
|
|
|
|
|
load->dst.field = mf_from_nxm_header(ntohl(narl->dst));
|
|
|
|
|
load->dst.ofs = nxm_decode_ofs(narl->ofs_nbits);
|
|
|
|
|
load->dst.n_bits = nxm_decode_n_bits(narl->ofs_nbits);
|
2012-09-12 11:37:53 -07:00
|
|
|
|
load->subvalue.be64[1] = narl->value;
|
2012-07-03 22:17:14 -07:00
|
|
|
|
|
|
|
|
|
/* Reject 'narl' if a bit numbered 'n_bits' or higher is set to 1 in
|
|
|
|
|
* narl->value. */
|
2012-09-12 17:44:28 +09:00
|
|
|
|
if (load->dst.n_bits < 64 &&
|
|
|
|
|
ntohll(narl->value) >> load->dst.n_bits) {
|
2012-07-03 22:17:14 -07:00
|
|
|
|
return OFPERR_OFPBAC_BAD_ARGUMENT;
|
2010-11-11 10:41:33 -08:00
|
|
|
|
}
|
|
|
|
|
|
2012-07-03 22:17:14 -07:00
|
|
|
|
return nxm_reg_load_check(load, NULL);
|
2011-07-19 15:47:02 -07:00
|
|
|
|
}
|
2012-09-14 12:05:44 +09:00
|
|
|
|
|
|
|
|
|
enum ofperr
|
|
|
|
|
nxm_reg_load_from_openflow12_set_field(
|
|
|
|
|
const struct ofp12_action_set_field * oasf, struct ofpbuf *ofpacts)
|
|
|
|
|
{
|
|
|
|
|
uint16_t oasf_len = ntohs(oasf->len);
|
|
|
|
|
uint32_t oxm_header = ntohl(oasf->dst);
|
|
|
|
|
uint8_t oxm_length = NXM_LENGTH(oxm_header);
|
|
|
|
|
struct ofpact_reg_load *load;
|
|
|
|
|
const struct mf_field *mf;
|
|
|
|
|
|
|
|
|
|
/* ofp12_action_set_field is padded to 64 bits by zero */
|
|
|
|
|
if (oasf_len != ROUND_UP(sizeof(*oasf) + oxm_length, 8)) {
|
|
|
|
|
return OFPERR_OFPBAC_BAD_ARGUMENT;
|
|
|
|
|
}
|
|
|
|
|
if (!is_all_zeros((const uint8_t *)(oasf) + sizeof *oasf + oxm_length,
|
|
|
|
|
oasf_len - oxm_length - sizeof *oasf)) {
|
|
|
|
|
return OFPERR_OFPBAC_BAD_ARGUMENT;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (NXM_HASMASK(oxm_header)) {
|
|
|
|
|
return OFPERR_OFPBAC_BAD_ARGUMENT;
|
|
|
|
|
}
|
|
|
|
|
mf = mf_from_nxm_header(oxm_header);
|
|
|
|
|
if (!mf) {
|
|
|
|
|
return OFPERR_OFPBAC_BAD_ARGUMENT;
|
|
|
|
|
}
|
|
|
|
|
load = ofpact_put_REG_LOAD(ofpacts);
|
2012-09-28 14:59:10 +09:00
|
|
|
|
ofpact_set_field_init(load, mf, oasf + 1);
|
2012-09-14 12:05:44 +09:00
|
|
|
|
|
|
|
|
|
return nxm_reg_load_check(load, NULL);
|
|
|
|
|
}
|
2012-07-03 22:17:14 -07:00
|
|
|
|
|
2012-01-12 15:48:19 -08:00
|
|
|
|
enum ofperr
|
2012-07-03 22:17:14 -07:00
|
|
|
|
nxm_reg_move_check(const struct ofpact_reg_move *move, const struct flow *flow)
|
2011-07-19 15:47:02 -07:00
|
|
|
|
{
|
2012-01-12 15:48:19 -08:00
|
|
|
|
enum ofperr error;
|
2011-07-19 15:47:02 -07:00
|
|
|
|
|
2012-07-03 22:17:14 -07:00
|
|
|
|
error = mf_check_src(&move->src, flow);
|
2011-07-19 15:47:02 -07:00
|
|
|
|
if (error) {
|
|
|
|
|
return error;
|
2010-11-11 10:41:33 -08:00
|
|
|
|
}
|
|
|
|
|
|
2012-07-03 22:17:14 -07:00
|
|
|
|
return mf_check_dst(&move->dst, NULL);
|
|
|
|
|
}
|
2010-11-11 10:41:33 -08:00
|
|
|
|
|
2012-07-03 22:17:14 -07:00
|
|
|
|
enum ofperr
|
|
|
|
|
nxm_reg_load_check(const struct ofpact_reg_load *load, const struct flow *flow)
|
|
|
|
|
{
|
|
|
|
|
return mf_check_dst(&load->dst, flow);
|
2010-11-11 10:41:33 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
2012-07-03 22:17:14 -07:00
|
|
|
|
nxm_reg_move_to_nxast(const struct ofpact_reg_move *move,
|
|
|
|
|
struct ofpbuf *openflow)
|
2010-11-11 10:41:33 -08:00
|
|
|
|
{
|
2012-07-03 22:17:14 -07:00
|
|
|
|
struct nx_action_reg_move *narm;
|
2011-10-12 17:04:13 -07:00
|
|
|
|
|
2012-07-03 22:17:14 -07:00
|
|
|
|
narm = ofputil_put_NXAST_REG_MOVE(openflow);
|
|
|
|
|
narm->n_bits = htons(move->dst.n_bits);
|
|
|
|
|
narm->src_ofs = htons(move->src.ofs);
|
|
|
|
|
narm->dst_ofs = htons(move->dst.ofs);
|
|
|
|
|
narm->src = htonl(move->src.field->nxm_header);
|
|
|
|
|
narm->dst = htonl(move->dst.field->nxm_header);
|
|
|
|
|
}
|
2011-12-28 12:42:14 -08:00
|
|
|
|
|
2012-09-14 12:05:44 +09:00
|
|
|
|
static void
|
|
|
|
|
reg_load_to_nxast(const struct ofpact_reg_load *load, struct ofpbuf *openflow)
|
2012-07-03 22:17:14 -07:00
|
|
|
|
{
|
|
|
|
|
struct nx_action_reg_load *narl;
|
|
|
|
|
|
|
|
|
|
narl = ofputil_put_NXAST_REG_LOAD(openflow);
|
|
|
|
|
narl->ofs_nbits = nxm_encode_ofs_nbits(load->dst.ofs, load->dst.n_bits);
|
|
|
|
|
narl->dst = htonl(load->dst.field->nxm_header);
|
2012-09-12 11:37:53 -07:00
|
|
|
|
narl->value = load->subvalue.be64[1];
|
2010-11-11 10:41:33 -08:00
|
|
|
|
}
|
2012-09-14 12:05:44 +09:00
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
set_field_to_ofast(const struct ofpact_reg_load *load,
|
|
|
|
|
struct ofpbuf *openflow)
|
|
|
|
|
{
|
|
|
|
|
const struct mf_field *mf = load->dst.field;
|
|
|
|
|
struct ofp12_action_set_field *oasf;
|
|
|
|
|
uint16_t padded_value_len;
|
|
|
|
|
|
|
|
|
|
oasf = ofputil_put_OFPAT12_SET_FIELD(openflow);
|
|
|
|
|
oasf->dst = htonl(mf->oxm_header);
|
|
|
|
|
|
|
|
|
|
/* Set field is the only action of variable length (so far),
|
|
|
|
|
* so handling the variable length portion is open-coded here */
|
|
|
|
|
padded_value_len = ROUND_UP(mf->n_bytes, 8);
|
|
|
|
|
ofpbuf_put_uninit(openflow, padded_value_len);
|
|
|
|
|
oasf->len = htons(ntohs(oasf->len) + padded_value_len);
|
|
|
|
|
memset(oasf + 1, 0, padded_value_len);
|
|
|
|
|
|
|
|
|
|
bitwise_copy(&load->subvalue, sizeof load->subvalue, load->dst.ofs,
|
|
|
|
|
oasf + 1, mf->n_bytes, load->dst.ofs, load->dst.n_bits);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
nxm_reg_load_to_nxast(const struct ofpact_reg_load *load,
|
|
|
|
|
struct ofpbuf *openflow)
|
|
|
|
|
{
|
|
|
|
|
|
|
|
|
|
if (load->ofpact.compat == OFPUTIL_OFPAT12_SET_FIELD) {
|
|
|
|
|
struct ofp_header *oh = (struct ofp_header *)openflow->l2;
|
|
|
|
|
|
|
|
|
|
switch(oh->version) {
|
|
|
|
|
case OFP12_VERSION:
|
|
|
|
|
set_field_to_ofast(load, openflow);
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case OFP11_VERSION:
|
|
|
|
|
case OFP10_VERSION:
|
|
|
|
|
if (load->dst.n_bits < 64) {
|
|
|
|
|
reg_load_to_nxast(load, openflow);
|
|
|
|
|
} else {
|
|
|
|
|
/* Split into 64bit chunks */
|
|
|
|
|
int chunk, ofs;
|
|
|
|
|
for (ofs = 0; ofs < load->dst.n_bits; ofs += chunk) {
|
|
|
|
|
struct ofpact_reg_load subload = *load;
|
|
|
|
|
|
|
|
|
|
chunk = MIN(load->dst.n_bits - ofs, 64);
|
|
|
|
|
|
|
|
|
|
subload.dst.field = load->dst.field;
|
|
|
|
|
subload.dst.ofs = load->dst.ofs + ofs;
|
|
|
|
|
subload.dst.n_bits = chunk;
|
|
|
|
|
bitwise_copy(&load->subvalue, sizeof load->subvalue, ofs,
|
|
|
|
|
&subload.subvalue, sizeof subload.subvalue, 0,
|
|
|
|
|
chunk);
|
|
|
|
|
reg_load_to_nxast(&subload, openflow);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
NOT_REACHED();
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
reg_load_to_nxast(load, openflow);
|
|
|
|
|
}
|
|
|
|
|
}
|
2012-07-03 22:17:14 -07:00
|
|
|
|
|
|
|
|
|
/* nxm_execute_reg_move(), nxm_execute_reg_load(). */
|
2010-11-11 10:41:33 -08:00
|
|
|
|
|
|
|
|
|
void
|
2012-07-03 22:17:14 -07:00
|
|
|
|
nxm_execute_reg_move(const struct ofpact_reg_move *move,
|
2010-11-11 10:41:33 -08:00
|
|
|
|
struct flow *flow)
|
|
|
|
|
{
|
2012-07-03 22:17:14 -07:00
|
|
|
|
union mf_value src_value;
|
|
|
|
|
union mf_value dst_value;
|
2011-12-28 12:42:14 -08:00
|
|
|
|
|
2012-07-03 22:17:14 -07:00
|
|
|
|
mf_get_value(move->dst.field, flow, &dst_value);
|
|
|
|
|
mf_get_value(move->src.field, flow, &src_value);
|
|
|
|
|
bitwise_copy(&src_value, move->src.field->n_bytes, move->src.ofs,
|
|
|
|
|
&dst_value, move->dst.field->n_bytes, move->dst.ofs,
|
|
|
|
|
move->src.n_bits);
|
|
|
|
|
mf_set_flow_value(move->dst.field, &dst_value, flow);
|
2011-07-19 15:47:02 -07:00
|
|
|
|
}
|
2010-11-11 10:41:33 -08:00
|
|
|
|
|
2011-07-19 15:47:02 -07:00
|
|
|
|
void
|
2012-07-03 22:17:14 -07:00
|
|
|
|
nxm_execute_reg_load(const struct ofpact_reg_load *load, struct flow *flow)
|
2011-07-19 15:47:02 -07:00
|
|
|
|
{
|
2012-09-12 17:44:28 +09:00
|
|
|
|
mf_write_subfield_flow(&load->dst, &load->subvalue, flow);
|
2011-12-28 12:42:14 -08:00
|
|
|
|
}
|
2011-10-12 17:04:13 -07:00
|
|
|
|
|
2011-12-28 12:42:14 -08:00
|
|
|
|
void
|
2012-07-03 22:17:14 -07:00
|
|
|
|
nxm_reg_load(const struct mf_subfield *dst, uint64_t src_data,
|
|
|
|
|
struct flow *flow)
|
2011-12-28 12:42:14 -08:00
|
|
|
|
{
|
2012-09-12 17:44:28 +09:00
|
|
|
|
union mf_subvalue src_subvalue;
|
|
|
|
|
ovs_be64 src_data_be = htonll(src_data);
|
2012-07-03 22:17:14 -07:00
|
|
|
|
|
2012-09-12 17:44:28 +09:00
|
|
|
|
bitwise_copy(&src_data_be, sizeof src_data_be, 0,
|
|
|
|
|
&src_subvalue, sizeof src_subvalue, 0,
|
|
|
|
|
sizeof src_data_be * 8);
|
|
|
|
|
mf_write_subfield_flow(dst, &src_subvalue, flow);
|
2010-11-11 10:41:33 -08:00
|
|
|
|
}
|