*/
NXAST_RESUBMIT,
- NXAST_SET_TUNNEL /* Set encapsulating tunnel ID. */
+ /* Set encapsulating tunnel ID. */
+ NXAST_SET_TUNNEL,
+
+ /* Stops processing further actions, if the packet being processed is an
+ * Ethernet+IPv4 ARP packet for which the source Ethernet address inside
+ * the ARP packet differs from the source Ethernet address in the Ethernet
+ * header.
+ *
+ * This is useful because OpenFlow does not provide a way to match on the
+ * Ethernet addresses inside ARP packets, so there is no other way to drop
+ * spoofed ARPs other than sending every ARP packet to a controller. */
+ NXAST_DROP_SPOOFED_ARP,
+
+ /* Set the queue that should be used when packets are output. This
+ * is similar to the OpenFlow OFPAT_ENQUEUE action, but does not
+ * take the output port as an argument. This allows the queue
+ * to be defined before the port is known. */
+ NXAST_SET_QUEUE,
+
+ /* Restore the queue to the value it was before any NXAST_SET_QUEUE
+ * actions were used. */
+ NXAST_POP_QUEUE
};
/* Action structure for NXAST_RESUBMIT. */
};
OFP_ASSERT(sizeof(struct nx_action_set_tunnel) == 16);
+/* Action structure for NXAST_SET_QUEUE. */
+struct nx_action_set_queue {
+ uint16_t type; /* OFPAT_VENDOR. */
+ uint16_t len; /* Length is 16. */
+ uint32_t vendor; /* NX_VENDOR_ID. */
+ uint16_t subtype; /* NXAST_SET_QUEUE. */
+ uint8_t pad[2];
+ uint32_t queue_id; /* Where to enqueue packets. */
+};
+OFP_ASSERT(sizeof(struct nx_action_set_queue) == 16);
+
/* Header for Nicira-defined actions. */
struct nx_action_header {
uint16_t type; /* OFPAT_VENDOR. */