Lines Matching full:key
381 static int parse_ipv6hdr(struct sk_buff *skb, struct sw_flow_key *key)
396 get_ipv6_ext_hdrs(skb, nh, &key->ipv6.exthdrs);
398 key->ip.proto = NEXTHDR_NONE;
399 key->ip.tos = ipv6_get_dsfield(nh);
400 key->ip.ttl = nh->hop_limit;
401 key->ipv6.label = *(__be32 *)nh & htonl(IPV6_FLOWINFO_FLOWLABEL);
402 key->ipv6.addr.src = nh->saddr;
403 key->ipv6.addr.dst = nh->daddr;
408 key->ip.frag = OVS_FRAG_TYPE_LATER;
409 key->ip.proto = NEXTHDR_FRAGMENT;
412 key->ip.frag = OVS_FRAG_TYPE_FIRST;
414 key->ip.frag = OVS_FRAG_TYPE_NONE;
419 * used to set key->ip.frag above.
426 key->ip.proto = nexthdr;
482 static void clear_vlan(struct sw_flow_key *key)
484 key->eth.vlan.tci = 0;
485 key->eth.vlan.tpid = 0;
486 key->eth.cvlan.tci = 0;
487 key->eth.cvlan.tpid = 0;
490 static int parse_vlan(struct sk_buff *skb, struct sw_flow_key *key)
495 key->eth.vlan.tci = htons(skb->vlan_tci) | htons(VLAN_CFI_MASK);
496 key->eth.vlan.tpid = skb->vlan_proto;
499 res = parse_vlan_tag(skb, &key->eth.vlan, true);
505 res = parse_vlan_tag(skb, &key->eth.cvlan, false);
550 static int parse_icmpv6(struct sk_buff *skb, struct sw_flow_key *key,
558 key->tp.src = htons(icmp->icmp6_type);
559 key->tp.dst = htons(icmp->icmp6_code);
568 memset(&key->ipv6.nd, 0, sizeof(key->ipv6.nd));
580 key->ipv6.nd.target = nd->target;
598 if (unlikely(!is_zero_ether_addr(key->ipv6.nd.sll)))
600 ether_addr_copy(key->ipv6.nd.sll,
604 if (unlikely(!is_zero_ether_addr(key->ipv6.nd.tll)))
606 ether_addr_copy(key->ipv6.nd.tll,
618 memset(&key->ipv6.nd.target, 0, sizeof(key->ipv6.nd.target));
619 memset(key->ipv6.nd.sll, 0, sizeof(key->ipv6.nd.sll));
620 memset(key->ipv6.nd.tll, 0, sizeof(key->ipv6.nd.tll));
625 static int parse_nsh(struct sk_buff *skb, struct sw_flow_key *key)
648 key->nsh.base.flags = nsh_get_flags(nh);
649 key->nsh.base.ttl = nsh_get_ttl(nh);
650 key->nsh.base.mdtype = nh->mdtype;
651 key->nsh.base.np = nh->np;
652 key->nsh.base.path_hdr = nh->path_hdr;
653 switch (key->nsh.base.mdtype) {
657 memcpy(key->nsh.context, nh->md1.context,
661 memset(key->nsh.context, 0,
675 * @key: output flow key
679 static int key_extract_l3l4(struct sk_buff *skb, struct sw_flow_key *key)
684 if (key->eth.type == htons(ETH_P_IP)) {
690 memset(&key->ip, 0, sizeof(key->ip));
691 memset(&key->ipv4, 0, sizeof(key->ipv4));
700 key->ipv4.addr.src = nh->saddr;
701 key->ipv4.addr.dst = nh->daddr;
703 key->ip.proto = nh->protocol;
704 key->ip.tos = nh->tos;
705 key->ip.ttl = nh->ttl;
709 key->ip.frag = OVS_FRAG_TYPE_LATER;
710 memset(&key->tp, 0, sizeof(key->tp));
715 key->ip.frag = OVS_FRAG_TYPE_FIRST;
717 key->ip.frag = OVS_FRAG_TYPE_NONE;
720 if (key->ip.proto == IPPROTO_TCP) {
723 key->tp.src = tcp->source;
724 key->tp.dst = tcp->dest;
725 key->tp.flags = TCP_FLAGS_BE16(tcp);
727 memset(&key->tp, 0, sizeof(key->tp));
730 } else if (key->ip.proto == IPPROTO_UDP) {
733 key->tp.src = udp->source;
734 key->tp.dst = udp->dest;
736 memset(&key->tp, 0, sizeof(key->tp));
738 } else if (key->ip.proto == IPPROTO_SCTP) {
741 key->tp.src = sctp->source;
742 key->tp.dst = sctp->dest;
744 memset(&key->tp, 0, sizeof(key->tp));
746 } else if (key->ip.proto == IPPROTO_ICMP) {
752 key->tp.src = htons(icmp->type);
753 key->tp.dst = htons(icmp->code);
755 memset(&key->tp, 0, sizeof(key->tp));
759 } else if (key->eth.type == htons(ETH_P_ARP) ||
760 key->eth.type == htons(ETH_P_RARP)) {
774 key->ip.proto = ntohs(arp->ar_op);
776 key->ip.proto = 0;
778 memcpy(&key->ipv4.addr.src, arp->ar_sip, sizeof(key->ipv4.addr.src));
779 memcpy(&key->ipv4.addr.dst, arp->ar_tip, sizeof(key->ipv4.addr.dst));
780 ether_addr_copy(key->ipv4.arp.sha, arp->ar_sha);
781 ether_addr_copy(key->ipv4.arp.tha, arp->ar_tha);
783 memset(&key->ip, 0, sizeof(key->ip));
784 memset(&key->ipv4, 0, sizeof(key->ipv4));
786 } else if (eth_p_mpls(key->eth.type)) {
789 memset(&key->mpls, 0, sizeof(key->mpls));
802 memcpy(&key->mpls.lse[label_count - 1], &lse,
815 key->mpls.num_labels_mask = GENMASK(label_count - 1, 0);
816 } else if (key->eth.type == htons(ETH_P_IPV6)) {
819 nh_len = parse_ipv6hdr(skb, key);
823 memset(&key->ip, 0, sizeof(key->ip));
824 memset(&key->ipv6.addr, 0, sizeof(key->ipv6.addr));
836 if (key->ip.frag == OVS_FRAG_TYPE_LATER) {
837 memset(&key->tp, 0, sizeof(key->tp));
841 key->ip.frag = OVS_FRAG_TYPE_FIRST;
844 if (key->ip.proto == NEXTHDR_TCP) {
847 key->tp.src = tcp->source;
848 key->tp.dst = tcp->dest;
849 key->tp.flags = TCP_FLAGS_BE16(tcp);
851 memset(&key->tp, 0, sizeof(key->tp));
853 } else if (key->ip.proto == NEXTHDR_UDP) {
856 key->tp.src = udp->source;
857 key->tp.dst = udp->dest;
859 memset(&key->tp, 0, sizeof(key->tp));
861 } else if (key->ip.proto == NEXTHDR_SCTP) {
864 key->tp.src = sctp->source;
865 key->tp.dst = sctp->dest;
867 memset(&key->tp, 0, sizeof(key->tp));
869 } else if (key->ip.proto == NEXTHDR_ICMP) {
871 error = parse_icmpv6(skb, key, nh_len);
875 memset(&key->tp, 0, sizeof(key->tp));
878 } else if (key->eth.type == htons(ETH_P_NSH)) {
879 error = parse_nsh(skb, key);
887 * key_extract - extracts a flow key from an Ethernet frame.
890 * @key: output flow key
901 * - skb->transport_header: If key->eth.type is ETH_P_IP or ETH_P_IPV6
904 * For other key->eth.type values it is left untouched.
907 * Equals to key->eth.type.
911 static int key_extract(struct sk_buff *skb, struct sw_flow_key *key)
916 key->tp.flags = 0;
921 clear_vlan(key);
922 if (ovs_key_mac_proto(key) == MAC_PROTO_NONE) {
927 key->eth.type = skb->protocol;
930 ether_addr_copy(key->eth.src, eth->h_source);
931 ether_addr_copy(key->eth.dst, eth->h_dest);
938 if (unlikely(parse_vlan(skb, key)))
941 key->eth.type = parse_ethertype(skb);
942 if (unlikely(key->eth.type == htons(0)))
949 if (key->eth.cvlan.tci & htons(VLAN_CFI_MASK))
950 skb->protocol = key->eth.cvlan.tpid;
952 skb->protocol = key->eth.type;
960 /* Fill out L3/L4 key info, if any */
961 return key_extract_l3l4(skb, key);
967 int ovs_flow_key_update_l3l4(struct sk_buff *skb, struct sw_flow_key *key)
969 return key_extract_l3l4(skb, key);
972 int ovs_flow_key_update(struct sk_buff *skb, struct sw_flow_key *key)
976 res = key_extract(skb, key);
978 key->mac_proto &= ~SW_FLOW_KEY_INVALID;
998 struct sk_buff *skb, struct sw_flow_key *key)
1009 key->tun_proto = ip_tunnel_info_af(tun_info);
1010 memcpy(&key->tun_key, &tun_info->key, sizeof(key->tun_key));
1015 > sizeof(key->tun_opts));
1017 ip_tunnel_info_opts_get(TUN_METADATA_OPTS(key, tun_info->options_len),
1019 key->tun_opts_len = tun_info->options_len;
1021 key->tun_opts_len = 0;
1024 key->tun_proto = 0;
1025 key->tun_opts_len = 0;
1026 memset(&key->tun_key, 0, sizeof(key->tun_key));
1029 key->phy.priority = skb->priority;
1030 key->phy.in_port = OVS_CB(skb)->input_vport->port_no;
1031 key->phy.skb_mark = skb->mark;
1032 key->ovs_flow_hash = 0;
1036 key->mac_proto = res;
1041 key->recirc_id = tc_ext && !tc_ext->act_miss ?
1049 key->recirc_id = 0;
1052 key->recirc_id = 0;
1055 err = key_extract(skb, key);
1057 ovs_ct_fill_key(skb, key, post_ct); /* Must be after key_extract(). */
1060 key->ct_zone = zone;
1063 key->ct_state &= ~OVS_CS_F_DST_NAT;
1065 key->ct_state &= ~OVS_CS_F_SRC_NAT;
1074 struct sw_flow_key *key, bool log)
1085 err = ovs_nla_get_flow_metadata(net, a, attrs, key, log);
1094 * For L2 packet key eth type would be zero. skb protocol
1095 * would be set to correct value later during key-extact.
1098 skb->protocol = key->eth.type;
1099 err = key_extract(skb, key);
1104 * for packets for which it makes sense. Otherwise the key may be
1105 * corrupted due to overlapping key fields.
1108 key->eth.type != htons(ETH_P_IP))
1111 (key->eth.type != htons(ETH_P_IPV6) ||
1112 sw_flow_key_is_nd(key)))