X-Git-Url: https://pintos-os.org/cgi-bin/gitweb.cgi?a=blobdiff_plain;f=datapath%2Factions.c;h=3223c65bd66b75680caf790ac470ff9f498e6d58;hb=f696f12fbe84f49d650f48c45ce1a24b94547ad2;hp=9f738e4c1b7721adcad3be4fef292fc86aab21c2;hpb=e7d737d175dfe53436b356445ecb154541d2afff;p=openvswitch diff --git a/datapath/actions.c b/datapath/actions.c index 9f738e4c..3223c65b 100644 --- a/datapath/actions.c +++ b/datapath/actions.c @@ -1,6 +1,6 @@ /* * Distributed under the terms of the GNU GPL version 2. - * Copyright (c) 2007, 2008, 2009, 2010 Nicira Networks. + * Copyright (c) 2007, 2008, 2009, 2010, 2011 Nicira Networks. * * Significant portions of this file may be copied from parts of the Linux * kernel, by Linus Torvalds and others. @@ -26,6 +26,10 @@ #include "openvswitch/datapath-protocol.h" #include "vport.h" +static int do_execute_actions(struct datapath *, struct sk_buff *, + const struct sw_flow_key *, + const struct nlattr *actions, u32 actions_len); + static struct sk_buff *make_writable(struct sk_buff *skb, unsigned min_headroom) { if (skb_cloned(skb)) { @@ -72,10 +76,10 @@ static struct sk_buff *vlan_pull_tag(struct sk_buff *skb) } static struct sk_buff *modify_vlan_tci(struct datapath *dp, struct sk_buff *skb, - const struct odp_flow_key *key, - const union odp_action *a, int n_actions) + const struct sw_flow_key *key, + const struct nlattr *a, u32 actions_len) { - __be16 tci = a->dl_tci.tci; + __be16 tci = nla_get_be16(a); skb = make_writable(skb, VLAN_HLEN); if (!skb) @@ -132,16 +136,20 @@ static struct sk_buff *modify_vlan_tci(struct datapath *dp, struct sk_buff *skb, * support hardware-accelerated VLAN tagging without VLAN * groups configured). */ if (skb_is_gso(skb)) { + const struct nlattr *actions_left; + int actions_len_left; struct sk_buff *segs; segs = skb_gso_segment(skb, 0); kfree_skb(skb); - if (unlikely(IS_ERR(segs))) + if (IS_ERR(segs)) return ERR_CAST(segs); + actions_len_left = actions_len; + actions_left = nla_next(a, &actions_len_left); + do { struct sk_buff *nskb = segs->next; - int err; segs->next = NULL; @@ -151,9 +159,9 @@ static struct sk_buff *modify_vlan_tci(struct datapath *dp, struct sk_buff *skb, segs = __vlan_put_tag(segs, ntohs(tci)); err = -ENOMEM; if (segs) { - err = execute_actions(dp, segs, - key, a + 1, - n_actions - 1); + err = do_execute_actions( + dp, segs, key, actions_left, + actions_len_left); } if (unlikely(err)) { @@ -199,27 +207,13 @@ static struct sk_buff *strip_vlan(struct sk_buff *skb) return skb; } -static struct sk_buff *set_dl_addr(struct sk_buff *skb, - const struct odp_action_dl_addr *a) -{ - skb = make_writable(skb, 0); - if (skb) { - struct ethhdr *eh = eth_hdr(skb); - if (a->type == ODPAT_SET_DL_SRC) - memcpy(eh->h_source, a->dl_addr, ETH_ALEN); - else - memcpy(eh->h_dest, a->dl_addr, ETH_ALEN); - } - return skb; -} - -static bool is_ip(struct sk_buff *skb, const struct odp_flow_key *key) +static bool is_ip(struct sk_buff *skb, const struct sw_flow_key *key) { return (key->dl_type == htons(ETH_P_IP) && skb->transport_header > skb->network_header); } -static __sum16 *get_l4_checksum(struct sk_buff *skb, const struct odp_flow_key *key) +static __sum16 *get_l4_checksum(struct sk_buff *skb, const struct sw_flow_key *key) { int transport_len = skb->len - skb_transport_offset(skb); if (key->nw_proto == IPPROTO_TCP) { @@ -233,9 +227,10 @@ static __sum16 *get_l4_checksum(struct sk_buff *skb, const struct odp_flow_key * } static struct sk_buff *set_nw_addr(struct sk_buff *skb, - const struct odp_flow_key *key, - const struct odp_action_nw_addr *a) + const struct sw_flow_key *key, + const struct nlattr *a) { + __be32 new_nwaddr = nla_get_be32(a); struct iphdr *nh; __sum16 *check; __be32 *nwaddr; @@ -248,21 +243,21 @@ static struct sk_buff *set_nw_addr(struct sk_buff *skb, return NULL; nh = ip_hdr(skb); - nwaddr = a->type == ODPAT_SET_NW_SRC ? &nh->saddr : &nh->daddr; + nwaddr = nla_type(a) == ODP_ACTION_ATTR_SET_NW_SRC ? &nh->saddr : &nh->daddr; check = get_l4_checksum(skb, key); if (likely(check)) - inet_proto_csum_replace4(check, skb, *nwaddr, a->nw_addr, 1); - csum_replace4(&nh->check, *nwaddr, a->nw_addr); + inet_proto_csum_replace4(check, skb, *nwaddr, new_nwaddr, 1); + csum_replace4(&nh->check, *nwaddr, new_nwaddr); - *nwaddr = a->nw_addr; + *nwaddr = new_nwaddr; return skb; } static struct sk_buff *set_nw_tos(struct sk_buff *skb, - const struct odp_flow_key *key, - const struct odp_action_nw_tos *a) + const struct sw_flow_key *key, + u8 nw_tos) { if (unlikely(!is_ip(skb, key))) return skb; @@ -275,7 +270,7 @@ static struct sk_buff *set_nw_tos(struct sk_buff *skb, u8 new; /* Set the DSCP bits and preserve the ECN bits. */ - new = a->nw_tos | (nh->tos & INET_ECN_MASK); + new = nw_tos | (nh->tos & INET_ECN_MASK); csum_replace4(&nh->check, (__force __be32)old, (__force __be32)new); *f = new; @@ -284,8 +279,8 @@ static struct sk_buff *set_nw_tos(struct sk_buff *skb, } static struct sk_buff *set_tp_port(struct sk_buff *skb, - const struct odp_flow_key *key, - const struct odp_action_tp_port *a) + const struct sw_flow_key *key, + const struct nlattr *a) { struct udphdr *th; __sum16 *check; @@ -311,9 +306,9 @@ static struct sk_buff *set_tp_port(struct sk_buff *skb, * supports those protocols. */ th = udp_hdr(skb); - port = a->type == ODPAT_SET_TP_SRC ? &th->source : &th->dest; - inet_proto_csum_replace2(check, skb, *port, a->tp_port, 0); - *port = a->tp_port; + port = nla_type(a) == ODP_ACTION_ATTR_SET_TP_SRC ? &th->source : &th->dest; + inet_proto_csum_replace2(check, skb, *port, nla_get_be16(a), 0); + *port = nla_get_be16(a); return skb; } @@ -329,7 +324,7 @@ static struct sk_buff *set_tp_port(struct sk_buff *skb, * or truncated header fields or one whose inner and outer Ethernet address * differ. */ -static bool is_spoofed_arp(struct sk_buff *skb, const struct odp_flow_key *key) +static bool is_spoofed_arp(struct sk_buff *skb, const struct sw_flow_key *key) { struct arp_eth_header *arp; @@ -365,40 +360,28 @@ error: kfree_skb(skb); } -static int output_control(struct datapath *dp, struct sk_buff *skb, u32 arg) +static int output_control(struct datapath *dp, struct sk_buff *skb, u64 arg, + const struct sw_flow_key *key) { + struct dp_upcall_info upcall; + skb = skb_clone(skb, GFP_ATOMIC); if (!skb) return -ENOMEM; - return dp_output_control(dp, skb, _ODPL_ACTION_NR, arg); -} -/* Send a copy of this packet up to the sFlow agent, along with extra - * information about what happened to it. */ -static void sflow_sample(struct datapath *dp, struct sk_buff *skb, - const union odp_action *a, int n_actions, - struct vport *vport) -{ - struct odp_sflow_sample_header *hdr; - unsigned int actlen = n_actions * sizeof(union odp_action); - unsigned int hdrlen = sizeof(struct odp_sflow_sample_header); - struct sk_buff *nskb; - - nskb = skb_copy_expand(skb, actlen + hdrlen, 0, GFP_ATOMIC); - if (!nskb) - return; - - memcpy(__skb_push(nskb, actlen), a, actlen); - hdr = (struct odp_sflow_sample_header*)__skb_push(nskb, hdrlen); - hdr->n_actions = n_actions; - hdr->sample_pool = atomic_read(&vport->sflow_pool); - dp_output_control(dp, nskb, _ODPL_SFLOW_NR, 0); + upcall.cmd = ODP_PACKET_CMD_ACTION; + upcall.key = key; + upcall.userdata = arg; + upcall.sample_pool = 0; + upcall.actions = NULL; + upcall.actions_len = 0; + return dp_upcall(dp, skb, &upcall); } /* Execute a list of actions against 'skb'. */ -int execute_actions(struct datapath *dp, struct sk_buff *skb, - const struct odp_flow_key *key, - const union odp_action *a, int n_actions) +static int do_execute_actions(struct datapath *dp, struct sk_buff *skb, + const struct sw_flow_key *key, + const struct nlattr *actions, u32 actions_len) { /* Every output action needs a separate clone of 'skb', but the common * case is just a single output action, so that doing a clone and @@ -406,81 +389,79 @@ int execute_actions(struct datapath *dp, struct sk_buff *skb, * is slightly obscure just to avoid that. */ int prev_port = -1; u32 priority = skb->priority; - int err; - - if (dp->sflow_probability) { - struct vport *p = OVS_CB(skb)->vport; - if (p) { - atomic_inc(&p->sflow_pool); - if (dp->sflow_probability == UINT_MAX || - net_random() < dp->sflow_probability) - sflow_sample(dp, skb, a, n_actions, p); - } - } - - OVS_CB(skb)->tun_id = 0; + const struct nlattr *a; + int rem, err; - for (; n_actions > 0; a++, n_actions--) { + for (a = actions, rem = actions_len; rem > 0; a = nla_next(a, &rem)) { if (prev_port != -1) { do_output(dp, skb_clone(skb, GFP_ATOMIC), prev_port); prev_port = -1; } - switch (a->type) { - case ODPAT_OUTPUT: - prev_port = a->output.port; + switch (nla_type(a)) { + case ODP_ACTION_ATTR_OUTPUT: + prev_port = nla_get_u32(a); break; - case ODPAT_CONTROLLER: - err = output_control(dp, skb, a->controller.arg); + case ODP_ACTION_ATTR_CONTROLLER: + err = output_control(dp, skb, nla_get_u64(a), key); if (err) { kfree_skb(skb); return err; } break; - case ODPAT_SET_TUNNEL: - OVS_CB(skb)->tun_id = a->tunnel.tun_id; + case ODP_ACTION_ATTR_SET_TUNNEL: + OVS_CB(skb)->tun_id = nla_get_be64(a); break; - case ODPAT_SET_DL_TCI: - skb = modify_vlan_tci(dp, skb, key, a, n_actions); + case ODP_ACTION_ATTR_SET_DL_TCI: + skb = modify_vlan_tci(dp, skb, key, a, rem); if (IS_ERR(skb)) return PTR_ERR(skb); break; - case ODPAT_STRIP_VLAN: + case ODP_ACTION_ATTR_STRIP_VLAN: skb = strip_vlan(skb); break; - case ODPAT_SET_DL_SRC: - case ODPAT_SET_DL_DST: - skb = set_dl_addr(skb, &a->dl_addr); + case ODP_ACTION_ATTR_SET_DL_SRC: + skb = make_writable(skb, 0); + if (!skb) + return -ENOMEM; + memcpy(eth_hdr(skb)->h_source, nla_data(a), ETH_ALEN); break; - case ODPAT_SET_NW_SRC: - case ODPAT_SET_NW_DST: - skb = set_nw_addr(skb, key, &a->nw_addr); + case ODP_ACTION_ATTR_SET_DL_DST: + skb = make_writable(skb, 0); + if (!skb) + return -ENOMEM; + memcpy(eth_hdr(skb)->h_dest, nla_data(a), ETH_ALEN); break; - case ODPAT_SET_NW_TOS: - skb = set_nw_tos(skb, key, &a->nw_tos); + case ODP_ACTION_ATTR_SET_NW_SRC: + case ODP_ACTION_ATTR_SET_NW_DST: + skb = set_nw_addr(skb, key, a); break; - case ODPAT_SET_TP_SRC: - case ODPAT_SET_TP_DST: - skb = set_tp_port(skb, key, &a->tp_port); + case ODP_ACTION_ATTR_SET_NW_TOS: + skb = set_nw_tos(skb, key, nla_get_u8(a)); break; - case ODPAT_SET_PRIORITY: - skb->priority = a->priority.priority; + case ODP_ACTION_ATTR_SET_TP_SRC: + case ODP_ACTION_ATTR_SET_TP_DST: + skb = set_tp_port(skb, key, a); break; - case ODPAT_POP_PRIORITY: + case ODP_ACTION_ATTR_SET_PRIORITY: + skb->priority = nla_get_u32(a); + break; + + case ODP_ACTION_ATTR_POP_PRIORITY: skb->priority = priority; break; - case ODPAT_DROP_SPOOFED_ARP: + case ODP_ACTION_ATTR_DROP_SPOOFED_ARP: if (unlikely(is_spoofed_arp(skb, key))) goto exit; break; @@ -495,3 +476,44 @@ exit: kfree_skb(skb); return 0; } + +static void sflow_sample(struct datapath *dp, struct sk_buff *skb, + const struct sw_flow_key *key, + const struct nlattr *a, u32 actions_len) +{ + struct sk_buff *nskb; + struct vport *p = OVS_CB(skb)->vport; + struct dp_upcall_info upcall; + + if (unlikely(!p)) + return; + + atomic_inc(&p->sflow_pool); + if (net_random() >= dp->sflow_probability) + return; + + nskb = skb_clone(skb, GFP_ATOMIC); + if (unlikely(!nskb)) + return; + + upcall.cmd = ODP_PACKET_CMD_SAMPLE; + upcall.key = key; + upcall.userdata = 0; + upcall.sample_pool = atomic_read(&p->sflow_pool); + upcall.actions = a; + upcall.actions_len = actions_len; + dp_upcall(dp, nskb, &upcall); +} + +/* Execute a list of actions against 'skb'. */ +int execute_actions(struct datapath *dp, struct sk_buff *skb, + const struct sw_flow_key *key, + const struct nlattr *actions, u32 actions_len) +{ + if (dp->sflow_probability) + sflow_sample(dp, skb, key, actions, actions_len); + + OVS_CB(skb)->tun_id = 0; + + return do_execute_actions(dp, skb, key, actions, actions_len); +}