/src/openvswitch/lib/match.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright (c) 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017 Nicira, Inc. |
3 | | * |
4 | | * Licensed under the Apache License, Version 2.0 (the "License"); |
5 | | * you may not use this file except in compliance with the License. |
6 | | * You may obtain a copy of the License at: |
7 | | * |
8 | | * http://www.apache.org/licenses/LICENSE-2.0 |
9 | | * |
10 | | * Unless required by applicable law or agreed to in writing, software |
11 | | * distributed under the License is distributed on an "AS IS" BASIS, |
12 | | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
13 | | * See the License for the specific language governing permissions and |
14 | | * limitations under the License. |
15 | | */ |
16 | | |
17 | | #include <config.h> |
18 | | #include "openvswitch/match.h" |
19 | | #include <stdlib.h> |
20 | | #include "flow.h" |
21 | | #include "byte-order.h" |
22 | | #include "colors.h" |
23 | | #include "openvswitch/dynamic-string.h" |
24 | | #include "openvswitch/meta-flow.h" |
25 | | #include "openvswitch/ofp-port.h" |
26 | | #include "packets.h" |
27 | | #include "tun-metadata.h" |
28 | | #include "openvswitch/nsh.h" |
29 | | |
30 | | /* Converts the flow in 'flow' into a match in 'match', with the given |
31 | | * 'wildcards'. */ |
32 | | void |
33 | | match_init(struct match *match, |
34 | | const struct flow *flow, const struct flow_wildcards *wc) |
35 | 0 | { |
36 | 0 | match->flow = *flow; |
37 | 0 | match->wc = *wc; |
38 | 0 | match_zero_wildcarded_fields(match); |
39 | 0 | memset(&match->tun_md, 0, sizeof match->tun_md); |
40 | 0 | } |
41 | | |
42 | | /* Converts a flow into a match. It sets the wildcard masks based on |
43 | | * the packet contents. It will not set the mask for fields that do not |
44 | | * make sense for the packet type. */ |
45 | | void |
46 | | match_wc_init(struct match *match, const struct flow *flow) |
47 | 0 | { |
48 | 0 | match->flow = *flow; |
49 | |
|
50 | 0 | flow_wildcards_init_for_packet(&match->wc, flow); |
51 | 0 | WC_MASK_FIELD(&match->wc, regs); |
52 | 0 | WC_MASK_FIELD(&match->wc, metadata); |
53 | |
|
54 | 0 | memset(&match->tun_md, 0, sizeof match->tun_md); |
55 | 0 | } |
56 | | |
57 | | /* Initializes 'match' as a "catch-all" match that matches every packet. */ |
58 | | void |
59 | | match_init_catchall(struct match *match) |
60 | 0 | { |
61 | 0 | memset(&match->flow, 0, sizeof match->flow); |
62 | 0 | flow_wildcards_init_catchall(&match->wc); |
63 | 0 | memset(&match->tun_md, 0, sizeof match->tun_md); |
64 | 0 | } |
65 | | |
66 | | /* For each bit or field wildcarded in 'match', sets the corresponding bit or |
67 | | * field in 'flow' to all-0-bits. It is important to maintain this invariant |
68 | | * in a match that might be inserted into a classifier. |
69 | | * |
70 | | * It is never necessary to call this function directly for a match that is |
71 | | * initialized or modified only by match_*() functions. It is useful to |
72 | | * restore the invariant in a match whose 'wc' member is modified by hand. |
73 | | */ |
74 | | void |
75 | | match_zero_wildcarded_fields(struct match *match) |
76 | 0 | { |
77 | 0 | flow_zero_wildcards(&match->flow, &match->wc); |
78 | 0 | } |
79 | | |
80 | | void |
81 | | match_set_dp_hash(struct match *match, uint32_t value) |
82 | 0 | { |
83 | 0 | match_set_dp_hash_masked(match, value, UINT32_MAX); |
84 | 0 | } |
85 | | |
86 | | void |
87 | | match_set_dp_hash_masked(struct match *match, uint32_t value, uint32_t mask) |
88 | 0 | { |
89 | 0 | match->wc.masks.dp_hash = mask; |
90 | 0 | match->flow.dp_hash = value & mask; |
91 | 0 | } |
92 | | |
93 | | void |
94 | | match_set_recirc_id(struct match *match, uint32_t value) |
95 | 0 | { |
96 | 0 | match->flow.recirc_id = value; |
97 | 0 | match->wc.masks.recirc_id = UINT32_MAX; |
98 | 0 | } |
99 | | |
100 | | void |
101 | | match_set_conj_id(struct match *match, uint32_t value) |
102 | 0 | { |
103 | 0 | match->flow.conj_id = value; |
104 | 0 | match->wc.masks.conj_id = UINT32_MAX; |
105 | 0 | } |
106 | | |
107 | | void |
108 | | match_set_reg(struct match *match, unsigned int reg_idx, uint32_t value) |
109 | 0 | { |
110 | 0 | match_set_reg_masked(match, reg_idx, value, UINT32_MAX); |
111 | 0 | } |
112 | | |
113 | | void |
114 | | match_set_reg_masked(struct match *match, unsigned int reg_idx, |
115 | | uint32_t value, uint32_t mask) |
116 | 0 | { |
117 | 0 | ovs_assert(reg_idx < FLOW_N_REGS); |
118 | 0 | flow_wildcards_set_reg_mask(&match->wc, reg_idx, mask); |
119 | 0 | match->flow.regs[reg_idx] = value & mask; |
120 | 0 | } |
121 | | |
122 | | void |
123 | | match_set_xreg(struct match *match, unsigned int xreg_idx, uint64_t value) |
124 | 0 | { |
125 | 0 | match_set_xreg_masked(match, xreg_idx, value, UINT64_MAX); |
126 | 0 | } |
127 | | |
128 | | void |
129 | | match_set_xreg_masked(struct match *match, unsigned int xreg_idx, |
130 | | uint64_t value, uint64_t mask) |
131 | 0 | { |
132 | 0 | ovs_assert(xreg_idx < FLOW_N_XREGS); |
133 | 0 | flow_wildcards_set_xreg_mask(&match->wc, xreg_idx, mask); |
134 | 0 | flow_set_xreg(&match->flow, xreg_idx, value & mask); |
135 | 0 | } |
136 | | |
137 | | void |
138 | | match_set_xxreg(struct match *match, unsigned int xxreg_idx, ovs_u128 value) |
139 | 0 | { |
140 | 0 | match_set_xxreg_masked(match, xxreg_idx, value, OVS_U128_MAX); |
141 | 0 | } |
142 | | |
143 | | void |
144 | | match_set_xxreg_masked(struct match *match, unsigned int xxreg_idx, |
145 | | ovs_u128 value, ovs_u128 mask) |
146 | 0 | { |
147 | 0 | ovs_assert(xxreg_idx < FLOW_N_XXREGS); |
148 | 0 | flow_wildcards_set_xxreg_mask(&match->wc, xxreg_idx, mask); |
149 | 0 | flow_set_xxreg(&match->flow, xxreg_idx, ovs_u128_and(value, mask)); |
150 | 0 | } |
151 | | |
152 | | void |
153 | | match_set_actset_output(struct match *match, ofp_port_t actset_output) |
154 | 0 | { |
155 | 0 | match->wc.masks.actset_output = u16_to_ofp(UINT16_MAX); |
156 | 0 | match->flow.actset_output = actset_output; |
157 | 0 | } |
158 | | |
159 | | void |
160 | | match_set_metadata(struct match *match, ovs_be64 metadata) |
161 | 0 | { |
162 | 0 | match_set_metadata_masked(match, metadata, OVS_BE64_MAX); |
163 | 0 | } |
164 | | |
165 | | void |
166 | | match_set_metadata_masked(struct match *match, |
167 | | ovs_be64 metadata, ovs_be64 mask) |
168 | 0 | { |
169 | 0 | match->wc.masks.metadata = mask; |
170 | 0 | match->flow.metadata = metadata & mask; |
171 | 0 | } |
172 | | |
173 | | void |
174 | | match_set_tun_id(struct match *match, ovs_be64 tun_id) |
175 | 0 | { |
176 | 0 | match_set_tun_id_masked(match, tun_id, OVS_BE64_MAX); |
177 | 0 | } |
178 | | |
179 | | void |
180 | | match_set_tun_id_masked(struct match *match, ovs_be64 tun_id, ovs_be64 mask) |
181 | 0 | { |
182 | 0 | match->wc.masks.tunnel.tun_id = mask; |
183 | 0 | match->flow.tunnel.tun_id = tun_id & mask; |
184 | 0 | } |
185 | | |
186 | | void |
187 | | match_set_tun_src(struct match *match, ovs_be32 src) |
188 | 0 | { |
189 | 0 | match_set_tun_src_masked(match, src, OVS_BE32_MAX); |
190 | 0 | } |
191 | | |
192 | | void |
193 | | match_set_tun_src_masked(struct match *match, ovs_be32 src, ovs_be32 mask) |
194 | 0 | { |
195 | 0 | match->wc.masks.tunnel.ip_src = mask; |
196 | 0 | match->flow.tunnel.ip_src = src & mask; |
197 | 0 | } |
198 | | |
199 | | void |
200 | | match_set_tun_dst(struct match *match, ovs_be32 dst) |
201 | 0 | { |
202 | 0 | match_set_tun_dst_masked(match, dst, OVS_BE32_MAX); |
203 | 0 | } |
204 | | |
205 | | void |
206 | | match_set_tun_dst_masked(struct match *match, ovs_be32 dst, ovs_be32 mask) |
207 | 0 | { |
208 | 0 | match->wc.masks.tunnel.ip_dst = mask; |
209 | 0 | match->flow.tunnel.ip_dst = dst & mask; |
210 | 0 | } |
211 | | |
212 | | void |
213 | | match_set_tun_ipv6_src(struct match *match, const struct in6_addr *src) |
214 | 0 | { |
215 | 0 | match->flow.tunnel.ipv6_src = *src; |
216 | 0 | match->wc.masks.tunnel.ipv6_src = in6addr_exact; |
217 | 0 | } |
218 | | |
219 | | void |
220 | | match_set_tun_ipv6_src_masked(struct match *match, const struct in6_addr *src, |
221 | | const struct in6_addr *mask) |
222 | 0 | { |
223 | 0 | match->flow.tunnel.ipv6_src = ipv6_addr_bitand(src, mask); |
224 | 0 | match->wc.masks.tunnel.ipv6_src = *mask; |
225 | 0 | } |
226 | | |
227 | | void |
228 | | match_set_tun_ipv6_dst(struct match *match, const struct in6_addr *dst) |
229 | 0 | { |
230 | 0 | match->flow.tunnel.ipv6_dst = *dst; |
231 | 0 | match->wc.masks.tunnel.ipv6_dst = in6addr_exact; |
232 | 0 | } |
233 | | |
234 | | void |
235 | | match_set_tun_ipv6_dst_masked(struct match *match, const struct in6_addr *dst, |
236 | | const struct in6_addr *mask) |
237 | 0 | { |
238 | 0 | match->flow.tunnel.ipv6_dst = ipv6_addr_bitand(dst, mask); |
239 | 0 | match->wc.masks.tunnel.ipv6_dst = *mask; |
240 | 0 | } |
241 | | |
242 | | void |
243 | | match_set_tun_ttl(struct match *match, uint8_t ttl) |
244 | 0 | { |
245 | 0 | match_set_tun_ttl_masked(match, ttl, UINT8_MAX); |
246 | 0 | } |
247 | | |
248 | | void |
249 | | match_set_tun_ttl_masked(struct match *match, uint8_t ttl, uint8_t mask) |
250 | 0 | { |
251 | 0 | match->wc.masks.tunnel.ip_ttl = mask; |
252 | 0 | match->flow.tunnel.ip_ttl = ttl & mask; |
253 | 0 | } |
254 | | |
255 | | void |
256 | | match_set_tun_tos(struct match *match, uint8_t tos) |
257 | 0 | { |
258 | 0 | match_set_tun_tos_masked(match, tos, UINT8_MAX); |
259 | 0 | } |
260 | | |
261 | | void |
262 | | match_set_tun_tos_masked(struct match *match, uint8_t tos, uint8_t mask) |
263 | 0 | { |
264 | 0 | match->wc.masks.tunnel.ip_tos = mask; |
265 | 0 | match->flow.tunnel.ip_tos = tos & mask; |
266 | 0 | } |
267 | | |
268 | | void |
269 | | match_set_tun_flags(struct match *match, uint16_t flags) |
270 | 0 | { |
271 | 0 | match_set_tun_flags_masked(match, flags, UINT16_MAX); |
272 | 0 | } |
273 | | |
274 | | void |
275 | | match_set_tun_flags_masked(struct match *match, uint16_t flags, uint16_t mask) |
276 | 0 | { |
277 | 0 | mask &= FLOW_TNL_PUB_F_MASK; |
278 | |
|
279 | 0 | match->wc.masks.tunnel.flags = mask; |
280 | 0 | match->flow.tunnel.flags = flags & mask; |
281 | 0 | } |
282 | | |
283 | | void |
284 | | match_set_tun_tp_dst(struct match *match, ovs_be16 tp_dst) |
285 | 0 | { |
286 | 0 | match_set_tun_tp_dst_masked(match, tp_dst, OVS_BE16_MAX); |
287 | 0 | } |
288 | | |
289 | | void |
290 | | match_set_tun_tp_dst_masked(struct match *match, ovs_be16 port, ovs_be16 mask) |
291 | 0 | { |
292 | 0 | match->wc.masks.tunnel.tp_dst = mask; |
293 | 0 | match->flow.tunnel.tp_dst = port & mask; |
294 | 0 | } |
295 | | |
296 | | void |
297 | | match_set_tun_gbp_id_masked(struct match *match, ovs_be16 gbp_id, ovs_be16 mask) |
298 | 0 | { |
299 | 0 | match->wc.masks.tunnel.gbp_id = mask; |
300 | 0 | match->flow.tunnel.gbp_id = gbp_id & mask; |
301 | 0 | } |
302 | | |
303 | | void |
304 | | match_set_tun_gbp_id(struct match *match, ovs_be16 gbp_id) |
305 | 0 | { |
306 | 0 | match_set_tun_gbp_id_masked(match, gbp_id, OVS_BE16_MAX); |
307 | 0 | } |
308 | | |
309 | | void |
310 | | match_set_tun_gbp_flags_masked(struct match *match, uint8_t flags, uint8_t mask) |
311 | 0 | { |
312 | 0 | match->wc.masks.tunnel.gbp_flags = mask; |
313 | 0 | match->flow.tunnel.gbp_flags = flags & mask; |
314 | 0 | } |
315 | | |
316 | | void |
317 | | match_set_tun_gbp_flags(struct match *match, uint8_t flags) |
318 | 0 | { |
319 | 0 | match_set_tun_gbp_flags_masked(match, flags, UINT8_MAX); |
320 | 0 | } |
321 | | |
322 | | void |
323 | | match_set_tun_erspan_ver_masked(struct match *match, uint8_t ver, uint8_t mask) |
324 | 0 | { |
325 | 0 | match->wc.masks.tunnel.erspan_ver = ver; |
326 | 0 | match->flow.tunnel.erspan_ver = ver & mask; |
327 | 0 | } |
328 | | |
329 | | void |
330 | | match_set_tun_erspan_ver(struct match *match, uint8_t ver) |
331 | 0 | { |
332 | 0 | match_set_tun_erspan_ver_masked(match, ver, UINT8_MAX); |
333 | 0 | } |
334 | | |
335 | | void |
336 | | match_set_tun_erspan_idx_masked(struct match *match, uint32_t erspan_idx, |
337 | | uint32_t mask) |
338 | 0 | { |
339 | 0 | match->wc.masks.tunnel.erspan_idx = mask; |
340 | 0 | match->flow.tunnel.erspan_idx = erspan_idx & mask; |
341 | 0 | } |
342 | | |
343 | | void |
344 | | match_set_tun_erspan_idx(struct match *match, uint32_t erspan_idx) |
345 | 0 | { |
346 | 0 | match_set_tun_erspan_idx_masked(match, erspan_idx, UINT32_MAX); |
347 | 0 | } |
348 | | |
349 | | void |
350 | | match_set_tun_erspan_dir_masked(struct match *match, uint8_t dir, |
351 | | uint8_t mask) |
352 | 0 | { |
353 | 0 | match->wc.masks.tunnel.erspan_dir = dir; |
354 | 0 | match->flow.tunnel.erspan_dir = dir & mask; |
355 | 0 | } |
356 | | |
357 | | void |
358 | | match_set_tun_erspan_dir(struct match *match, uint8_t dir) |
359 | 0 | { |
360 | 0 | match_set_tun_erspan_dir_masked(match, dir, UINT8_MAX); |
361 | 0 | } |
362 | | |
363 | | void |
364 | | match_set_tun_erspan_hwid_masked(struct match *match, uint8_t hwid, |
365 | | uint8_t mask) |
366 | 0 | { |
367 | 0 | match->wc.masks.tunnel.erspan_hwid = hwid; |
368 | 0 | match->flow.tunnel.erspan_hwid = hwid & mask; |
369 | 0 | } |
370 | | |
371 | | void |
372 | | match_set_tun_erspan_hwid(struct match *match, uint8_t hwid) |
373 | 0 | { |
374 | 0 | match_set_tun_erspan_hwid_masked(match, hwid, UINT8_MAX); |
375 | 0 | } |
376 | | |
377 | | void |
378 | | match_set_tun_gtpu_flags_masked(struct match *match, uint8_t flags, |
379 | | uint8_t mask) |
380 | 0 | { |
381 | 0 | match->wc.masks.tunnel.gtpu_flags = flags; |
382 | 0 | match->flow.tunnel.gtpu_flags = flags & mask; |
383 | 0 | } |
384 | | |
385 | | void |
386 | | match_set_tun_gtpu_flags(struct match *match, uint8_t flags) |
387 | 0 | { |
388 | 0 | match_set_tun_gtpu_flags_masked(match, flags, UINT8_MAX); |
389 | 0 | } |
390 | | |
391 | | void |
392 | | match_set_tun_gtpu_msgtype_masked(struct match *match, uint8_t msgtype, |
393 | | uint8_t mask) |
394 | 0 | { |
395 | 0 | match->wc.masks.tunnel.gtpu_msgtype = msgtype; |
396 | 0 | match->flow.tunnel.gtpu_msgtype = msgtype & mask; |
397 | 0 | } |
398 | | |
399 | | void |
400 | | match_set_tun_gtpu_msgtype(struct match *match, uint8_t msgtype) |
401 | 0 | { |
402 | 0 | match_set_tun_gtpu_msgtype_masked(match, msgtype, UINT8_MAX); |
403 | 0 | } |
404 | | |
405 | | void |
406 | | match_set_in_port(struct match *match, ofp_port_t ofp_port) |
407 | 0 | { |
408 | 0 | match->wc.masks.in_port.ofp_port = u16_to_ofp(UINT16_MAX); |
409 | 0 | match->flow.in_port.ofp_port = ofp_port; |
410 | 0 | } |
411 | | |
412 | | void |
413 | | match_set_skb_priority(struct match *match, uint32_t skb_priority) |
414 | 0 | { |
415 | 0 | match->wc.masks.skb_priority = UINT32_MAX; |
416 | 0 | match->flow.skb_priority = skb_priority; |
417 | 0 | } |
418 | | |
419 | | void |
420 | | match_set_pkt_mark(struct match *match, uint32_t pkt_mark) |
421 | 0 | { |
422 | 0 | match_set_pkt_mark_masked(match, pkt_mark, UINT32_MAX); |
423 | 0 | } |
424 | | |
425 | | void |
426 | | match_set_pkt_mark_masked(struct match *match, uint32_t pkt_mark, uint32_t mask) |
427 | 0 | { |
428 | 0 | match->flow.pkt_mark = pkt_mark & mask; |
429 | 0 | match->wc.masks.pkt_mark = mask; |
430 | 0 | } |
431 | | |
432 | | void |
433 | | match_set_ct_state(struct match *match, uint32_t ct_state) |
434 | 0 | { |
435 | 0 | match_set_ct_state_masked(match, ct_state, UINT32_MAX); |
436 | 0 | } |
437 | | |
438 | | void |
439 | | match_set_ct_state_masked(struct match *match, uint32_t ct_state, uint32_t mask) |
440 | 0 | { |
441 | 0 | match->flow.ct_state = ct_state & mask & UINT8_MAX; |
442 | 0 | match->wc.masks.ct_state = mask & UINT8_MAX; |
443 | 0 | } |
444 | | |
445 | | void |
446 | | match_set_ct_zone(struct match *match, uint16_t ct_zone) |
447 | 0 | { |
448 | 0 | match_set_ct_zone_masked(match, ct_zone, UINT16_MAX); |
449 | 0 | } |
450 | | |
451 | | void |
452 | | match_set_ct_zone_masked(struct match *match, uint16_t ct_zone, uint16_t mask) |
453 | 0 | { |
454 | 0 | match->flow.ct_zone = ct_zone & mask; |
455 | 0 | match->wc.masks.ct_zone = mask; |
456 | 0 | } |
457 | | |
458 | | void |
459 | | match_set_ct_mark(struct match *match, uint32_t ct_mark) |
460 | 0 | { |
461 | 0 | match_set_ct_mark_masked(match, ct_mark, UINT32_MAX); |
462 | 0 | } |
463 | | |
464 | | void |
465 | | match_set_ct_mark_masked(struct match *match, uint32_t ct_mark, |
466 | | uint32_t mask) |
467 | 0 | { |
468 | 0 | match->flow.ct_mark = ct_mark & mask; |
469 | 0 | match->wc.masks.ct_mark = mask; |
470 | 0 | } |
471 | | |
472 | | void |
473 | | match_set_ct_label(struct match *match, ovs_u128 ct_label) |
474 | 0 | { |
475 | 0 | ovs_u128 mask; |
476 | |
|
477 | 0 | mask.u64.lo = UINT64_MAX; |
478 | 0 | mask.u64.hi = UINT64_MAX; |
479 | 0 | match_set_ct_label_masked(match, ct_label, mask); |
480 | 0 | } |
481 | | |
482 | | void |
483 | | match_set_ct_label_masked(struct match *match, ovs_u128 value, ovs_u128 mask) |
484 | 0 | { |
485 | 0 | match->flow.ct_label.u64.lo = value.u64.lo & mask.u64.lo; |
486 | 0 | match->flow.ct_label.u64.hi = value.u64.hi & mask.u64.hi; |
487 | 0 | match->wc.masks.ct_label = mask; |
488 | 0 | } |
489 | | |
490 | | void |
491 | | match_set_ct_nw_src(struct match *match, ovs_be32 ct_nw_src) |
492 | 0 | { |
493 | 0 | match->flow.ct_nw_src = ct_nw_src; |
494 | 0 | match->wc.masks.ct_nw_src = OVS_BE32_MAX; |
495 | 0 | } |
496 | | |
497 | | void |
498 | | match_set_ct_nw_src_masked(struct match *match, ovs_be32 ct_nw_src, |
499 | | ovs_be32 mask) |
500 | 0 | { |
501 | 0 | match->flow.ct_nw_src = ct_nw_src & mask; |
502 | 0 | match->wc.masks.ct_nw_src = mask; |
503 | 0 | } |
504 | | |
505 | | void |
506 | | match_set_ct_nw_dst(struct match *match, ovs_be32 ct_nw_dst) |
507 | 0 | { |
508 | 0 | match->flow.ct_nw_dst = ct_nw_dst; |
509 | 0 | match->wc.masks.ct_nw_dst = OVS_BE32_MAX; |
510 | 0 | } |
511 | | |
512 | | void |
513 | | match_set_ct_nw_dst_masked(struct match *match, ovs_be32 ct_nw_dst, |
514 | | ovs_be32 mask) |
515 | 0 | { |
516 | 0 | match->flow.ct_nw_dst = ct_nw_dst & mask; |
517 | 0 | match->wc.masks.ct_nw_dst = mask; |
518 | 0 | } |
519 | | |
520 | | void |
521 | | match_set_ct_nw_proto(struct match *match, uint8_t ct_nw_proto) |
522 | 0 | { |
523 | 0 | match->flow.ct_nw_proto = ct_nw_proto; |
524 | 0 | match->wc.masks.ct_nw_proto = UINT8_MAX; |
525 | 0 | } |
526 | | |
527 | | void |
528 | | match_set_ct_tp_src(struct match *match, ovs_be16 ct_tp_src) |
529 | 0 | { |
530 | 0 | match_set_ct_tp_src_masked(match, ct_tp_src, OVS_BE16_MAX); |
531 | 0 | } |
532 | | |
533 | | void |
534 | | match_set_ct_tp_src_masked(struct match *match, ovs_be16 port, ovs_be16 mask) |
535 | 0 | { |
536 | 0 | match->flow.ct_tp_src = port & mask; |
537 | 0 | match->wc.masks.ct_tp_src = mask; |
538 | 0 | } |
539 | | |
540 | | void |
541 | | match_set_ct_tp_dst(struct match *match, ovs_be16 ct_tp_dst) |
542 | 0 | { |
543 | 0 | match_set_ct_tp_dst_masked(match, ct_tp_dst, OVS_BE16_MAX); |
544 | 0 | } |
545 | | |
546 | | void |
547 | | match_set_ct_tp_dst_masked(struct match *match, ovs_be16 port, ovs_be16 mask) |
548 | 0 | { |
549 | 0 | match->flow.ct_tp_dst = port & mask; |
550 | 0 | match->wc.masks.ct_tp_dst = mask; |
551 | 0 | } |
552 | | |
553 | | void |
554 | | match_set_ct_ipv6_src(struct match *match, const struct in6_addr *src) |
555 | 0 | { |
556 | 0 | match->flow.ct_ipv6_src = *src; |
557 | 0 | match->wc.masks.ct_ipv6_src = in6addr_exact; |
558 | 0 | } |
559 | | |
560 | | void |
561 | | match_set_ct_ipv6_src_masked(struct match *match, const struct in6_addr *src, |
562 | | const struct in6_addr *mask) |
563 | 0 | { |
564 | 0 | match->flow.ct_ipv6_src = ipv6_addr_bitand(src, mask); |
565 | 0 | match->wc.masks.ct_ipv6_src = *mask; |
566 | 0 | } |
567 | | |
568 | | void |
569 | | match_set_ct_ipv6_dst(struct match *match, const struct in6_addr *dst) |
570 | 0 | { |
571 | 0 | match->flow.ct_ipv6_dst = *dst; |
572 | 0 | match->wc.masks.ct_ipv6_dst = in6addr_exact; |
573 | 0 | } |
574 | | |
575 | | void |
576 | | match_set_ct_ipv6_dst_masked(struct match *match, const struct in6_addr *dst, |
577 | | const struct in6_addr *mask) |
578 | 0 | { |
579 | 0 | match->flow.ct_ipv6_dst = ipv6_addr_bitand(dst, mask); |
580 | 0 | match->wc.masks.ct_ipv6_dst = *mask; |
581 | 0 | } |
582 | | |
583 | | void |
584 | | match_set_packet_type(struct match *match, ovs_be32 packet_type) |
585 | 0 | { |
586 | 0 | match->flow.packet_type = packet_type; |
587 | 0 | match->wc.masks.packet_type = OVS_BE32_MAX; |
588 | 0 | } |
589 | | |
590 | | /* If 'match' does not match on any packet type, make it match on Ethernet |
591 | | * packets (the default packet type, as specified by OpenFlow). */ |
592 | | void |
593 | | match_set_default_packet_type(struct match *match) |
594 | 0 | { |
595 | 0 | if (!match->wc.masks.packet_type) { |
596 | 0 | match_set_packet_type(match, htonl(PT_ETH)); |
597 | 0 | } |
598 | 0 | } |
599 | | |
600 | | /* Returns true if 'match' matches only Ethernet packets (the default packet |
601 | | * type, as specified by OpenFlow). */ |
602 | | bool |
603 | | match_has_default_packet_type(const struct match *match) |
604 | 0 | { |
605 | 0 | return (match->flow.packet_type == htonl(PT_ETH) |
606 | 0 | && match->wc.masks.packet_type == OVS_BE32_MAX); |
607 | 0 | } |
608 | | |
609 | | /* A match on 'field' is being added to or has been added to 'match'. If |
610 | | * 'field' is a data field, and 'match' does not already match on packet_type, |
611 | | * this function make it match on the Ethernet packet_type. |
612 | | * |
613 | | * This function is useful because OpenFlow implicitly applies to Ethernet |
614 | | * packets when there's no explicit packet_type, but matching on a metadata |
615 | | * field doesn't imply anything about the packet_type and falsely inferring |
616 | | * that it does can cause harm. A flow that matches only on metadata fields, |
617 | | * for example, should be able to match more than just Ethernet flows. There |
618 | | * are also important reasons that a catch-all match (one with no field matches |
619 | | * at all) should not imply a packet_type(0,0) match. For example, a "flow |
620 | | * dump" request that matches on no fields should return every flow in the |
621 | | * switch, not just the flows that match on Ethernet. As a second example, |
622 | | * OpenFlow 1.2+ special-cases "table miss" flows, that is catch-all flows with |
623 | | * priority 0, and inferring a match on packet_type(0,0) causes such a flow not |
624 | | * to be a table miss flow. */ |
625 | | void |
626 | | match_add_ethernet_prereq(struct match *match, const struct mf_field *field) |
627 | 0 | { |
628 | 0 | if (field->prereqs != MFP_NONE) { |
629 | 0 | match_set_default_packet_type(match); |
630 | 0 | } |
631 | 0 | } |
632 | | |
633 | | void |
634 | | match_set_dl_type(struct match *match, ovs_be16 dl_type) |
635 | 0 | { |
636 | 0 | match->wc.masks.dl_type = OVS_BE16_MAX; |
637 | 0 | match->flow.dl_type = dl_type; |
638 | 0 | } |
639 | | |
640 | | /* Modifies 'value_src' so that the Ethernet address must match 'value_dst' |
641 | | * exactly. 'mask_dst' is set to all 1s. */ |
642 | | static void |
643 | | set_eth(const struct eth_addr value_src, |
644 | | struct eth_addr *value_dst, |
645 | | struct eth_addr *mask_dst) |
646 | 0 | { |
647 | 0 | *value_dst = value_src; |
648 | 0 | *mask_dst = eth_addr_exact; |
649 | 0 | } |
650 | | |
651 | | /* Modifies 'value_src' so that the Ethernet address must match 'value_src' |
652 | | * after each byte is ANDed with the appropriate byte in 'mask_src'. |
653 | | * 'mask_dst' is set to 'mask_src' */ |
654 | | static void |
655 | | set_eth_masked(const struct eth_addr value_src, |
656 | | const struct eth_addr mask_src, |
657 | | struct eth_addr *value_dst, struct eth_addr *mask_dst) |
658 | 0 | { |
659 | 0 | size_t i; |
660 | |
|
661 | 0 | for (i = 0; i < ARRAY_SIZE(value_dst->be16); i++) { |
662 | 0 | value_dst->be16[i] = value_src.be16[i] & mask_src.be16[i]; |
663 | 0 | } |
664 | 0 | *mask_dst = mask_src; |
665 | 0 | } |
666 | | |
667 | | /* Modifies 'rule' so that the source Ethernet address must match 'dl_src' |
668 | | * exactly. */ |
669 | | void |
670 | | match_set_dl_src(struct match *match, const struct eth_addr dl_src) |
671 | 0 | { |
672 | 0 | set_eth(dl_src, &match->flow.dl_src, &match->wc.masks.dl_src); |
673 | 0 | } |
674 | | |
675 | | /* Modifies 'rule' so that the source Ethernet address must match 'dl_src' |
676 | | * after each byte is ANDed with the appropriate byte in 'mask'. */ |
677 | | void |
678 | | match_set_dl_src_masked(struct match *match, |
679 | | const struct eth_addr dl_src, |
680 | | const struct eth_addr mask) |
681 | 0 | { |
682 | 0 | set_eth_masked(dl_src, mask, &match->flow.dl_src, &match->wc.masks.dl_src); |
683 | 0 | } |
684 | | |
685 | | /* Modifies 'match' so that the Ethernet address must match 'dl_dst' |
686 | | * exactly. */ |
687 | | void |
688 | | match_set_dl_dst(struct match *match, const struct eth_addr dl_dst) |
689 | 0 | { |
690 | 0 | set_eth(dl_dst, &match->flow.dl_dst, &match->wc.masks.dl_dst); |
691 | 0 | } |
692 | | |
693 | | /* Modifies 'match' so that the Ethernet address must match 'dl_dst' after each |
694 | | * byte is ANDed with the appropriate byte in 'mask'. |
695 | | * |
696 | | * This function will assert-fail if 'mask' is invalid. Only 'mask' values |
697 | | * accepted by flow_wildcards_is_dl_dst_mask_valid() are allowed. */ |
698 | | void |
699 | | match_set_dl_dst_masked(struct match *match, |
700 | | const struct eth_addr dl_dst, |
701 | | const struct eth_addr mask) |
702 | 0 | { |
703 | 0 | set_eth_masked(dl_dst, mask, &match->flow.dl_dst, &match->wc.masks.dl_dst); |
704 | 0 | } |
705 | | |
706 | | void |
707 | | match_set_dl_tci(struct match *match, ovs_be16 tci) |
708 | 0 | { |
709 | 0 | match_set_dl_tci_masked(match, tci, htons(0xffff)); |
710 | 0 | } |
711 | | |
712 | | void |
713 | | match_set_dl_tci_masked(struct match *match, ovs_be16 tci, ovs_be16 mask) |
714 | 0 | { |
715 | 0 | match->flow.vlans[0].tci = tci & mask; |
716 | 0 | match->wc.masks.vlans[0].tci = mask; |
717 | 0 | } |
718 | | |
719 | | /* Modifies 'match' so that the VLAN VID is wildcarded. If the PCP is already |
720 | | * wildcarded, then 'match' will match a packet regardless of whether it has an |
721 | | * 802.1Q header or not. */ |
722 | | void |
723 | | match_set_any_vid(struct match *match) |
724 | 0 | { |
725 | 0 | if (match->wc.masks.vlans[0].tci & htons(VLAN_PCP_MASK)) { |
726 | 0 | match->wc.masks.vlans[0].tci &= ~htons(VLAN_VID_MASK); |
727 | 0 | match->flow.vlans[0].tci &= ~htons(VLAN_VID_MASK); |
728 | 0 | } else { |
729 | 0 | match_set_dl_tci_masked(match, htons(0), htons(0)); |
730 | 0 | } |
731 | 0 | } |
732 | | |
733 | | /* Modifies 'match' depending on 'dl_vlan': |
734 | | * |
735 | | * - If 'dl_vlan' is htons(OFP_VLAN_NONE), makes 'match' match only packets |
736 | | * without an 802.1Q header. |
737 | | * |
738 | | * - Otherwise, makes 'match' match only packets with an 802.1Q header whose |
739 | | * VID equals the low 12 bits of 'dl_vlan'. |
740 | | */ |
741 | | void |
742 | | match_set_dl_vlan(struct match *match, ovs_be16 dl_vlan, int id) |
743 | 0 | { |
744 | 0 | flow_set_dl_vlan(&match->flow, dl_vlan, id); |
745 | 0 | if (dl_vlan == htons(OFP10_VLAN_NONE)) { |
746 | 0 | match->wc.masks.vlans[id].tci = OVS_BE16_MAX; |
747 | 0 | } else { |
748 | 0 | match->wc.masks.vlans[id].tci |= htons(VLAN_VID_MASK | VLAN_CFI); |
749 | 0 | } |
750 | 0 | } |
751 | | |
752 | | /* Sets the VLAN VID that 'match' matches to 'vid', which is interpreted as an |
753 | | * OpenFlow 1.2 "vlan_vid" value, that is, the low 13 bits of 'vlan_tci' (VID |
754 | | * plus CFI). */ |
755 | | void |
756 | | match_set_vlan_vid(struct match *match, ovs_be16 vid) |
757 | 0 | { |
758 | 0 | match_set_vlan_vid_masked(match, vid, htons(VLAN_VID_MASK | VLAN_CFI)); |
759 | 0 | } |
760 | | |
761 | | |
762 | | /* Sets the VLAN VID that 'flow' matches to 'vid', which is interpreted as an |
763 | | * OpenFlow 1.2 "vlan_vid" value, that is, the low 13 bits of 'vlan_tci' (VID |
764 | | * plus CFI), with the corresponding 'mask'. */ |
765 | | void |
766 | | match_set_vlan_vid_masked(struct match *match, ovs_be16 vid, ovs_be16 mask) |
767 | 0 | { |
768 | 0 | ovs_be16 pcp_mask = htons(VLAN_PCP_MASK); |
769 | 0 | ovs_be16 vid_mask = htons(VLAN_VID_MASK | VLAN_CFI); |
770 | |
|
771 | 0 | mask &= vid_mask; |
772 | 0 | flow_set_vlan_vid(&match->flow, vid & mask); |
773 | 0 | match->wc.masks.vlans[0].tci = |
774 | 0 | mask | (match->wc.masks.vlans[0].tci & pcp_mask); |
775 | 0 | } |
776 | | |
777 | | /* Modifies 'match' so that the VLAN PCP is wildcarded. If the VID is already |
778 | | * wildcarded, then 'match' will match a packet regardless of whether it has an |
779 | | * 802.1Q header or not. */ |
780 | | void |
781 | | match_set_any_pcp(struct match *match) |
782 | 0 | { |
783 | 0 | if (match->wc.masks.vlans[0].tci & htons(VLAN_VID_MASK)) { |
784 | 0 | match->wc.masks.vlans[0].tci &= ~htons(VLAN_PCP_MASK); |
785 | 0 | match->flow.vlans[0].tci &= ~htons(VLAN_PCP_MASK); |
786 | 0 | } else { |
787 | 0 | match_set_dl_tci_masked(match, htons(0), htons(0)); |
788 | 0 | } |
789 | 0 | } |
790 | | |
791 | | /* Modifies 'match' so that it matches only packets with an 802.1Q header whose |
792 | | * PCP equals the low 3 bits of 'dl_vlan_pcp'. */ |
793 | | void |
794 | | match_set_dl_vlan_pcp(struct match *match, uint8_t dl_vlan_pcp, int id) |
795 | 0 | { |
796 | 0 | flow_set_vlan_pcp(&match->flow, dl_vlan_pcp, id); |
797 | 0 | match->wc.masks.vlans[id].tci |= htons(VLAN_CFI | VLAN_PCP_MASK); |
798 | 0 | } |
799 | | |
800 | | /* Modifies 'match' so that the MPLS label 'idx' matches 'lse' exactly. */ |
801 | | void |
802 | | match_set_mpls_lse(struct match *match, int idx, ovs_be32 lse) |
803 | 0 | { |
804 | 0 | match->wc.masks.mpls_lse[idx] = OVS_BE32_MAX; |
805 | 0 | match->flow.mpls_lse[idx] = lse; |
806 | 0 | } |
807 | | |
808 | | /* Modifies 'match' so that the MPLS label is wildcarded. */ |
809 | | void |
810 | | match_set_any_mpls_label(struct match *match, int idx) |
811 | 0 | { |
812 | 0 | match->wc.masks.mpls_lse[idx] &= ~htonl(MPLS_LABEL_MASK); |
813 | 0 | flow_set_mpls_label(&match->flow, idx, htonl(0)); |
814 | 0 | } |
815 | | |
816 | | /* Modifies 'match' so that it matches only packets with an MPLS header whose |
817 | | * label equals the low 20 bits of 'mpls_label'. */ |
818 | | void |
819 | | match_set_mpls_label(struct match *match, int idx, ovs_be32 mpls_label) |
820 | 0 | { |
821 | 0 | match->wc.masks.mpls_lse[idx] |= htonl(MPLS_LABEL_MASK); |
822 | 0 | flow_set_mpls_label(&match->flow, idx, mpls_label); |
823 | 0 | } |
824 | | |
825 | | /* Modifies 'match' so that the MPLS TC is wildcarded. */ |
826 | | void |
827 | | match_set_any_mpls_tc(struct match *match, int idx) |
828 | 0 | { |
829 | 0 | match->wc.masks.mpls_lse[idx] &= ~htonl(MPLS_TC_MASK); |
830 | 0 | flow_set_mpls_tc(&match->flow, idx, 0); |
831 | 0 | } |
832 | | |
833 | | /* Modifies 'match' so that it matches only packets with an MPLS header whose |
834 | | * Traffic Class equals the low 3 bits of 'mpls_tc'. */ |
835 | | void |
836 | | match_set_mpls_tc(struct match *match, int idx, uint8_t mpls_tc) |
837 | 0 | { |
838 | 0 | match->wc.masks.mpls_lse[idx] |= htonl(MPLS_TC_MASK); |
839 | 0 | flow_set_mpls_tc(&match->flow, idx, mpls_tc); |
840 | 0 | } |
841 | | |
842 | | /* Modifies 'match' so that the MPLS stack flag is wildcarded. */ |
843 | | void |
844 | | match_set_any_mpls_bos(struct match *match, int idx) |
845 | 0 | { |
846 | 0 | match->wc.masks.mpls_lse[idx] &= ~htonl(MPLS_BOS_MASK); |
847 | 0 | flow_set_mpls_bos(&match->flow, idx, 0); |
848 | 0 | } |
849 | | |
850 | | /* Modifies 'match' so that it matches only packets with an MPLS header whose |
851 | | * Stack Flag equals the lower bit of 'mpls_bos' */ |
852 | | void |
853 | | match_set_mpls_bos(struct match *match, int idx, uint8_t mpls_bos) |
854 | 0 | { |
855 | 0 | match->wc.masks.mpls_lse[idx] |= htonl(MPLS_BOS_MASK); |
856 | 0 | flow_set_mpls_bos(&match->flow, idx, mpls_bos); |
857 | 0 | } |
858 | | |
859 | | /* Modifies 'match' so that the TTL of MPLS label 'idx' is wildcarded. */ |
860 | | void |
861 | | match_set_any_mpls_ttl(struct match *match, int idx) |
862 | 0 | { |
863 | 0 | match->wc.masks.mpls_lse[idx] &= ~htonl(MPLS_TTL_MASK); |
864 | 0 | flow_set_mpls_ttl(&match->flow, idx, 0); |
865 | 0 | } |
866 | | |
867 | | /* Modifies 'match' so that it matches only packets in which the TTL of MPLS |
868 | | * label 'idx' equals 'mpls_ttl'. */ |
869 | | void |
870 | | match_set_mpls_ttl(struct match *match, int idx, uint8_t mpls_ttl) |
871 | 0 | { |
872 | 0 | match->wc.masks.mpls_lse[idx] |= htonl(MPLS_TTL_MASK); |
873 | 0 | flow_set_mpls_ttl(&match->flow, idx, mpls_ttl); |
874 | 0 | } |
875 | | |
876 | | /* Modifies 'match' so that the MPLS LSE is wildcarded. */ |
877 | | void |
878 | | match_set_any_mpls_lse(struct match *match, int idx) |
879 | 0 | { |
880 | 0 | match->wc.masks.mpls_lse[idx] = htonl(0); |
881 | 0 | flow_set_mpls_lse(&match->flow, idx, htonl(0)); |
882 | 0 | } |
883 | | |
884 | | void |
885 | | match_set_tp_src(struct match *match, ovs_be16 tp_src) |
886 | 0 | { |
887 | 0 | match_set_tp_src_masked(match, tp_src, OVS_BE16_MAX); |
888 | 0 | } |
889 | | |
890 | | void |
891 | | match_set_tp_src_masked(struct match *match, ovs_be16 port, ovs_be16 mask) |
892 | 0 | { |
893 | 0 | match->flow.tp_src = port & mask; |
894 | 0 | match->wc.masks.tp_src = mask; |
895 | 0 | } |
896 | | |
897 | | void |
898 | | match_set_tp_dst(struct match *match, ovs_be16 tp_dst) |
899 | 0 | { |
900 | 0 | match_set_tp_dst_masked(match, tp_dst, OVS_BE16_MAX); |
901 | 0 | } |
902 | | |
903 | | void |
904 | | match_set_tp_dst_masked(struct match *match, ovs_be16 port, ovs_be16 mask) |
905 | 0 | { |
906 | 0 | match->flow.tp_dst = port & mask; |
907 | 0 | match->wc.masks.tp_dst = mask; |
908 | 0 | } |
909 | | |
910 | | void |
911 | | match_set_tcp_flags(struct match *match, ovs_be16 flags) |
912 | 0 | { |
913 | 0 | match_set_tcp_flags_masked(match, flags, OVS_BE16_MAX); |
914 | 0 | } |
915 | | |
916 | | void |
917 | | match_set_tcp_flags_masked(struct match *match, ovs_be16 flags, ovs_be16 mask) |
918 | 0 | { |
919 | 0 | match->flow.tcp_flags = flags & mask; |
920 | 0 | match->wc.masks.tcp_flags = mask; |
921 | 0 | } |
922 | | |
923 | | void |
924 | | match_set_nw_proto(struct match *match, uint8_t nw_proto) |
925 | 0 | { |
926 | 0 | match->flow.nw_proto = nw_proto; |
927 | 0 | match->wc.masks.nw_proto = UINT8_MAX; |
928 | 0 | } |
929 | | |
930 | | void |
931 | | match_set_nw_proto_masked(struct match *match, |
932 | | const uint8_t nw_proto, const uint8_t mask) |
933 | 0 | { |
934 | 0 | match->flow.nw_proto = nw_proto; |
935 | 0 | match->wc.masks.nw_proto = mask; |
936 | 0 | } |
937 | | |
938 | | void |
939 | | match_set_nw_src(struct match *match, ovs_be32 nw_src) |
940 | 0 | { |
941 | 0 | match->flow.nw_src = nw_src; |
942 | 0 | match->wc.masks.nw_src = OVS_BE32_MAX; |
943 | 0 | } |
944 | | |
945 | | void |
946 | | match_set_nw_src_masked(struct match *match, |
947 | | ovs_be32 nw_src, ovs_be32 mask) |
948 | 0 | { |
949 | 0 | match->flow.nw_src = nw_src & mask; |
950 | 0 | match->wc.masks.nw_src = mask; |
951 | 0 | } |
952 | | |
953 | | void |
954 | | match_set_nw_dst(struct match *match, ovs_be32 nw_dst) |
955 | 0 | { |
956 | 0 | match->flow.nw_dst = nw_dst; |
957 | 0 | match->wc.masks.nw_dst = OVS_BE32_MAX; |
958 | 0 | } |
959 | | |
960 | | void |
961 | | match_set_nw_dst_masked(struct match *match, ovs_be32 ip, ovs_be32 mask) |
962 | 0 | { |
963 | 0 | match->flow.nw_dst = ip & mask; |
964 | 0 | match->wc.masks.nw_dst = mask; |
965 | 0 | } |
966 | | |
967 | | void |
968 | | match_set_nw_dscp(struct match *match, uint8_t nw_dscp) |
969 | 0 | { |
970 | 0 | match->wc.masks.nw_tos |= IP_DSCP_MASK; |
971 | 0 | match->flow.nw_tos &= ~IP_DSCP_MASK; |
972 | 0 | match->flow.nw_tos |= nw_dscp & IP_DSCP_MASK; |
973 | 0 | } |
974 | | |
975 | | void |
976 | | match_set_nw_ecn(struct match *match, uint8_t nw_ecn) |
977 | 0 | { |
978 | 0 | match->wc.masks.nw_tos |= IP_ECN_MASK; |
979 | 0 | match->flow.nw_tos &= ~IP_ECN_MASK; |
980 | 0 | match->flow.nw_tos |= nw_ecn & IP_ECN_MASK; |
981 | 0 | } |
982 | | |
983 | | void |
984 | | match_set_nw_ttl(struct match *match, uint8_t nw_ttl) |
985 | 0 | { |
986 | 0 | match->wc.masks.nw_ttl = UINT8_MAX; |
987 | 0 | match->flow.nw_ttl = nw_ttl; |
988 | 0 | } |
989 | | |
990 | | void |
991 | | match_set_nw_tos_masked(struct match *match, uint8_t nw_tos, uint8_t mask) |
992 | 0 | { |
993 | 0 | match->flow.nw_tos = nw_tos & mask; |
994 | 0 | match->wc.masks.nw_tos = mask; |
995 | 0 | } |
996 | | |
997 | | void |
998 | | match_set_nw_ttl_masked(struct match *match, uint8_t nw_ttl, uint8_t mask) |
999 | 0 | { |
1000 | 0 | match->flow.nw_ttl = nw_ttl & mask; |
1001 | 0 | match->wc.masks.nw_ttl = mask; |
1002 | 0 | } |
1003 | | |
1004 | | void |
1005 | | match_set_nw_frag(struct match *match, uint8_t nw_frag) |
1006 | 0 | { |
1007 | 0 | match->wc.masks.nw_frag |= FLOW_NW_FRAG_MASK; |
1008 | 0 | match->flow.nw_frag = nw_frag; |
1009 | 0 | } |
1010 | | |
1011 | | void |
1012 | | match_set_nw_frag_masked(struct match *match, |
1013 | | uint8_t nw_frag, uint8_t mask) |
1014 | 0 | { |
1015 | 0 | match->flow.nw_frag = nw_frag & mask; |
1016 | 0 | match->wc.masks.nw_frag = mask; |
1017 | 0 | } |
1018 | | |
1019 | | void |
1020 | | match_set_icmp_type(struct match *match, uint8_t icmp_type) |
1021 | 0 | { |
1022 | 0 | match_set_tp_src(match, htons(icmp_type)); |
1023 | 0 | } |
1024 | | |
1025 | | void |
1026 | | match_set_icmp_code(struct match *match, uint8_t icmp_code) |
1027 | 0 | { |
1028 | 0 | match_set_tp_dst(match, htons(icmp_code)); |
1029 | 0 | } |
1030 | | |
1031 | | void |
1032 | | match_set_arp_opcode_masked(struct match *match, |
1033 | | const uint8_t opcode, |
1034 | | const uint8_t mask) |
1035 | 0 | { |
1036 | 0 | match_set_nw_proto_masked(match, opcode, mask); |
1037 | 0 | } |
1038 | | |
1039 | | void |
1040 | | match_set_arp_spa_masked(struct match *match, |
1041 | | const ovs_be32 arp_spa, |
1042 | | const ovs_be32 mask) |
1043 | 0 | { |
1044 | 0 | match_set_nw_src_masked(match, arp_spa, mask); |
1045 | 0 | } |
1046 | | |
1047 | | void |
1048 | | match_set_arp_tpa_masked(struct match *match, |
1049 | | const ovs_be32 arp_tpa, |
1050 | | const ovs_be32 mask) |
1051 | 0 | { |
1052 | 0 | match_set_nw_dst_masked(match, arp_tpa, mask); |
1053 | 0 | } |
1054 | | |
1055 | | void |
1056 | | match_set_arp_sha(struct match *match, const struct eth_addr sha) |
1057 | 0 | { |
1058 | 0 | match->flow.arp_sha = sha; |
1059 | 0 | match->wc.masks.arp_sha = eth_addr_exact; |
1060 | 0 | } |
1061 | | |
1062 | | void |
1063 | | match_set_arp_sha_masked(struct match *match, |
1064 | | const struct eth_addr arp_sha, |
1065 | | const struct eth_addr mask) |
1066 | 0 | { |
1067 | 0 | set_eth_masked(arp_sha, mask, |
1068 | 0 | &match->flow.arp_sha, &match->wc.masks.arp_sha); |
1069 | 0 | } |
1070 | | |
1071 | | void |
1072 | | match_set_arp_tha(struct match *match, const struct eth_addr tha) |
1073 | 0 | { |
1074 | 0 | match->flow.arp_tha = tha; |
1075 | 0 | match->wc.masks.arp_tha = eth_addr_exact; |
1076 | 0 | } |
1077 | | |
1078 | | void |
1079 | | match_set_arp_tha_masked(struct match *match, |
1080 | | const struct eth_addr arp_tha, |
1081 | | const struct eth_addr mask) |
1082 | 0 | { |
1083 | 0 | set_eth_masked(arp_tha, mask, |
1084 | 0 | &match->flow.arp_tha, &match->wc.masks.arp_tha); |
1085 | 0 | } |
1086 | | |
1087 | | void |
1088 | | match_set_ipv6_src(struct match *match, const struct in6_addr *src) |
1089 | 0 | { |
1090 | 0 | match->flow.ipv6_src = *src; |
1091 | 0 | match->wc.masks.ipv6_src = in6addr_exact; |
1092 | 0 | } |
1093 | | |
1094 | | void |
1095 | | match_set_ipv6_src_masked(struct match *match, const struct in6_addr *src, |
1096 | | const struct in6_addr *mask) |
1097 | 0 | { |
1098 | 0 | match->flow.ipv6_src = ipv6_addr_bitand(src, mask); |
1099 | 0 | match->wc.masks.ipv6_src = *mask; |
1100 | 0 | } |
1101 | | |
1102 | | void |
1103 | | match_set_ipv6_dst(struct match *match, const struct in6_addr *dst) |
1104 | 0 | { |
1105 | 0 | match->flow.ipv6_dst = *dst; |
1106 | 0 | match->wc.masks.ipv6_dst = in6addr_exact; |
1107 | 0 | } |
1108 | | |
1109 | | void |
1110 | | match_set_ipv6_dst_masked(struct match *match, const struct in6_addr *dst, |
1111 | | const struct in6_addr *mask) |
1112 | 0 | { |
1113 | 0 | match->flow.ipv6_dst = ipv6_addr_bitand(dst, mask); |
1114 | 0 | match->wc.masks.ipv6_dst = *mask; |
1115 | 0 | } |
1116 | | |
1117 | | void |
1118 | | match_set_ipv6_label(struct match *match, ovs_be32 ipv6_label) |
1119 | 0 | { |
1120 | 0 | match->wc.masks.ipv6_label = OVS_BE32_MAX; |
1121 | 0 | match->flow.ipv6_label = ipv6_label; |
1122 | 0 | } |
1123 | | |
1124 | | |
1125 | | void |
1126 | | match_set_ipv6_label_masked(struct match *match, ovs_be32 ipv6_label, |
1127 | | ovs_be32 mask) |
1128 | 0 | { |
1129 | 0 | match->flow.ipv6_label = ipv6_label & mask; |
1130 | 0 | match->wc.masks.ipv6_label = mask; |
1131 | 0 | } |
1132 | | |
1133 | | void |
1134 | | match_set_nd_target(struct match *match, const struct in6_addr *target) |
1135 | 0 | { |
1136 | 0 | match->flow.nd_target = *target; |
1137 | 0 | match->wc.masks.nd_target = in6addr_exact; |
1138 | 0 | } |
1139 | | |
1140 | | void |
1141 | | match_set_nd_target_masked(struct match *match, |
1142 | | const struct in6_addr *target, |
1143 | | const struct in6_addr *mask) |
1144 | 0 | { |
1145 | 0 | match->flow.nd_target = ipv6_addr_bitand(target, mask); |
1146 | 0 | match->wc.masks.nd_target = *mask; |
1147 | 0 | } |
1148 | | |
1149 | | void |
1150 | | match_set_nd_reserved (struct match *match, ovs_be32 value) |
1151 | 0 | { |
1152 | 0 | match->flow.igmp_group_ip4 = value; |
1153 | 0 | match->wc.masks.igmp_group_ip4 = OVS_BE32_MAX; |
1154 | 0 | } |
1155 | | |
1156 | | void |
1157 | | match_set_nd_options_type(struct match *match, uint8_t option) |
1158 | 0 | { |
1159 | 0 | match_set_tcp_flags(match, htons(option)); |
1160 | 0 | } |
1161 | | |
1162 | | /* Returns true if 'a' and 'b' wildcard the same fields and have the same |
1163 | | * values for fixed fields, otherwise false. */ |
1164 | | bool |
1165 | | match_equal(const struct match *a, const struct match *b) |
1166 | 0 | { |
1167 | 0 | return (flow_wildcards_equal(&a->wc, &b->wc) |
1168 | 0 | && flow_equal(&a->flow, &b->flow)); |
1169 | 0 | } |
1170 | | |
1171 | | /* Returns a hash value for the flow and wildcards in 'match', starting from |
1172 | | * 'basis'. */ |
1173 | | uint32_t |
1174 | | match_hash(const struct match *match, uint32_t basis) |
1175 | 0 | { |
1176 | 0 | return flow_wildcards_hash(&match->wc, flow_hash(&match->flow, basis)); |
1177 | 0 | } |
1178 | | |
1179 | | static bool |
1180 | | match_has_default_recirc_id(const struct match *m) |
1181 | 0 | { |
1182 | 0 | return m->flow.recirc_id == 0 && (m->wc.masks.recirc_id == UINT32_MAX || |
1183 | 0 | m->wc.masks.recirc_id == 0); |
1184 | 0 | } |
1185 | | |
1186 | | static bool |
1187 | | match_has_default_dp_hash(const struct match *m) |
1188 | 0 | { |
1189 | 0 | return ((m->flow.dp_hash | m->wc.masks.dp_hash) == 0); |
1190 | 0 | } |
1191 | | |
1192 | | /* Return true if the hidden fields of the match are set to the default values. |
1193 | | * The default values equals to those set up by match_init_hidden_fields(). */ |
1194 | | bool |
1195 | | match_has_default_hidden_fields(const struct match *m) |
1196 | 0 | { |
1197 | 0 | return match_has_default_recirc_id(m) && match_has_default_dp_hash(m); |
1198 | 0 | } |
1199 | | |
1200 | | void |
1201 | | match_init_hidden_fields(struct match *m) |
1202 | 0 | { |
1203 | 0 | match_set_recirc_id(m, 0); |
1204 | 0 | match_set_dp_hash_masked(m, 0, 0); |
1205 | 0 | } |
1206 | | |
1207 | | static void |
1208 | | format_eth_masked(struct ds *s, const char *name, |
1209 | | const struct eth_addr eth, const struct eth_addr mask) |
1210 | 0 | { |
1211 | 0 | if (!eth_addr_is_zero(mask)) { |
1212 | 0 | ds_put_format(s, "%s%s=%s", colors.param, name, colors.end); |
1213 | 0 | eth_format_masked(eth, &mask, s); |
1214 | 0 | ds_put_char(s, ','); |
1215 | 0 | } |
1216 | 0 | } |
1217 | | |
1218 | | static void |
1219 | | format_ip_netmask(struct ds *s, const char *name, ovs_be32 ip, |
1220 | | ovs_be32 netmask) |
1221 | 0 | { |
1222 | 0 | if (netmask) { |
1223 | 0 | ds_put_format(s, "%s%s=%s", colors.param, name, colors.end); |
1224 | 0 | ip_format_masked(ip, netmask, s); |
1225 | 0 | ds_put_char(s, ','); |
1226 | 0 | } |
1227 | 0 | } |
1228 | | |
1229 | | static void |
1230 | | format_ipv6_netmask(struct ds *s, const char *name, |
1231 | | const struct in6_addr *addr, |
1232 | | const struct in6_addr *netmask) |
1233 | 0 | { |
1234 | 0 | if (!ipv6_mask_is_any(netmask)) { |
1235 | 0 | ds_put_format(s, "%s%s=%s", colors.param, name, colors.end); |
1236 | 0 | ipv6_format_masked(addr, netmask, s); |
1237 | 0 | ds_put_char(s, ','); |
1238 | 0 | } |
1239 | 0 | } |
1240 | | |
1241 | | static void |
1242 | | format_uint8_masked(struct ds *s, const char *name, |
1243 | | uint8_t value, uint8_t mask) |
1244 | 0 | { |
1245 | 0 | if (mask != 0) { |
1246 | 0 | ds_put_format(s, "%s%s=%s", colors.param, name, colors.end); |
1247 | 0 | if (mask == UINT8_MAX) { |
1248 | 0 | ds_put_format(s, "%"PRIu8, value); |
1249 | 0 | } else { |
1250 | 0 | ds_put_format(s, "0x%02"PRIx8"/0x%02"PRIx8, value, mask); |
1251 | 0 | } |
1252 | 0 | ds_put_char(s, ','); |
1253 | 0 | } |
1254 | 0 | } |
1255 | | |
1256 | | static void |
1257 | | format_uint16_masked(struct ds *s, const char *name, |
1258 | | uint16_t value, uint16_t mask) |
1259 | 0 | { |
1260 | 0 | if (mask != 0) { |
1261 | 0 | ds_put_format(s, "%s%s=%s", colors.param, name, colors.end); |
1262 | 0 | if (mask == UINT16_MAX) { |
1263 | 0 | ds_put_format(s, "%"PRIu16, value); |
1264 | 0 | } else { |
1265 | 0 | ds_put_format(s, "0x%"PRIx16"/0x%"PRIx16, value, mask); |
1266 | 0 | } |
1267 | 0 | ds_put_char(s, ','); |
1268 | 0 | } |
1269 | 0 | } |
1270 | | |
1271 | | static void |
1272 | | format_be16_masked(struct ds *s, const char *name, |
1273 | | ovs_be16 value, ovs_be16 mask) |
1274 | 0 | { |
1275 | 0 | if (mask != htons(0)) { |
1276 | 0 | ds_put_format(s, "%s%s=%s", colors.param, name, colors.end); |
1277 | 0 | if (mask == OVS_BE16_MAX) { |
1278 | 0 | ds_put_format(s, "%"PRIu16, ntohs(value)); |
1279 | 0 | } else { |
1280 | 0 | ds_put_format(s, "0x%"PRIx16"/0x%"PRIx16, |
1281 | 0 | ntohs(value), ntohs(mask)); |
1282 | 0 | } |
1283 | 0 | ds_put_char(s, ','); |
1284 | 0 | } |
1285 | 0 | } |
1286 | | |
1287 | | static void |
1288 | | format_be32_masked(struct ds *s, const char *name, |
1289 | | ovs_be32 value, ovs_be32 mask) |
1290 | 0 | { |
1291 | 0 | if (mask != htonl(0)) { |
1292 | 0 | ds_put_format(s, "%s%s=%s", colors.param, name, colors.end); |
1293 | 0 | if (mask == OVS_BE32_MAX) { |
1294 | 0 | ds_put_format(s, "%"PRIu32, ntohl(value)); |
1295 | 0 | } else { |
1296 | 0 | ds_put_format(s, "0x%08"PRIx32"/0x%08"PRIx32, |
1297 | 0 | ntohl(value), ntohl(mask)); |
1298 | 0 | } |
1299 | 0 | ds_put_char(s, ','); |
1300 | 0 | } |
1301 | 0 | } |
1302 | | |
1303 | | static void |
1304 | | format_be32_masked_hex(struct ds *s, const char *name, |
1305 | | ovs_be32 value, ovs_be32 mask) |
1306 | 0 | { |
1307 | 0 | if (mask != htonl(0)) { |
1308 | 0 | ds_put_format(s, "%s%s=%s", colors.param, name, colors.end); |
1309 | 0 | if (mask == OVS_BE32_MAX) { |
1310 | 0 | ds_put_format(s, "0x%"PRIx32, ntohl(value)); |
1311 | 0 | } else { |
1312 | 0 | ds_put_format(s, "0x%"PRIx32"/0x%"PRIx32, |
1313 | 0 | ntohl(value), ntohl(mask)); |
1314 | 0 | } |
1315 | 0 | ds_put_char(s, ','); |
1316 | 0 | } |
1317 | 0 | } |
1318 | | |
1319 | | static void |
1320 | | format_uint32_masked(struct ds *s, const char *name, |
1321 | | uint32_t value, uint32_t mask) |
1322 | 0 | { |
1323 | 0 | if (mask) { |
1324 | 0 | ds_put_format(s, "%s%s=%s%#"PRIx32, |
1325 | 0 | colors.param, name, colors.end, value); |
1326 | 0 | if (mask != UINT32_MAX) { |
1327 | 0 | ds_put_format(s, "/%#"PRIx32, mask); |
1328 | 0 | } |
1329 | 0 | ds_put_char(s, ','); |
1330 | 0 | } |
1331 | 0 | } |
1332 | | |
1333 | | static void |
1334 | | format_be64_masked(struct ds *s, const char *name, |
1335 | | ovs_be64 value, ovs_be64 mask) |
1336 | 0 | { |
1337 | 0 | if (mask != htonll(0)) { |
1338 | 0 | ds_put_format(s, "%s%s=%s%#"PRIx64, |
1339 | 0 | colors.param, name, colors.end, ntohll(value)); |
1340 | 0 | if (mask != OVS_BE64_MAX) { |
1341 | 0 | ds_put_format(s, "/%#"PRIx64, ntohll(mask)); |
1342 | 0 | } |
1343 | 0 | ds_put_char(s, ','); |
1344 | 0 | } |
1345 | 0 | } |
1346 | | |
1347 | | static void |
1348 | | format_flow_tunnel(struct ds *s, const struct match *match) |
1349 | 0 | { |
1350 | 0 | const struct flow_wildcards *wc = &match->wc; |
1351 | 0 | const struct flow_tnl *tnl = &match->flow.tunnel; |
1352 | |
|
1353 | 0 | format_be64_masked(s, "tun_id", tnl->tun_id, wc->masks.tunnel.tun_id); |
1354 | 0 | format_ip_netmask(s, "tun_src", tnl->ip_src, wc->masks.tunnel.ip_src); |
1355 | 0 | format_ip_netmask(s, "tun_dst", tnl->ip_dst, wc->masks.tunnel.ip_dst); |
1356 | 0 | format_ipv6_netmask(s, "tun_ipv6_src", &tnl->ipv6_src, |
1357 | 0 | &wc->masks.tunnel.ipv6_src); |
1358 | 0 | format_ipv6_netmask(s, "tun_ipv6_dst", &tnl->ipv6_dst, |
1359 | 0 | &wc->masks.tunnel.ipv6_dst); |
1360 | |
|
1361 | 0 | if (wc->masks.tunnel.gbp_id) { |
1362 | 0 | format_be16_masked(s, "tun_gbp_id", tnl->gbp_id, |
1363 | 0 | wc->masks.tunnel.gbp_id); |
1364 | 0 | } |
1365 | |
|
1366 | 0 | if (wc->masks.tunnel.gbp_flags) { |
1367 | 0 | ds_put_format(s, "tun_gbp_flags=%#"PRIx8",", tnl->gbp_flags); |
1368 | 0 | } |
1369 | |
|
1370 | 0 | if (wc->masks.tunnel.ip_tos) { |
1371 | 0 | ds_put_format(s, "tun_tos=%"PRIx8",", tnl->ip_tos); |
1372 | 0 | } |
1373 | 0 | if (wc->masks.tunnel.ip_ttl) { |
1374 | 0 | ds_put_format(s, "tun_ttl=%"PRIu8",", tnl->ip_ttl); |
1375 | 0 | } |
1376 | 0 | if (wc->masks.tunnel.erspan_ver) { |
1377 | 0 | ds_put_format(s, "tun_erspan_ver=%"PRIu8",", tnl->erspan_ver); |
1378 | 0 | } |
1379 | 0 | if (wc->masks.tunnel.erspan_idx && tnl->erspan_ver == 1) { |
1380 | 0 | ds_put_format(s, "tun_erspan_idx=%#"PRIx32",", tnl->erspan_idx); |
1381 | 0 | } |
1382 | 0 | if (wc->masks.tunnel.erspan_dir && tnl->erspan_ver == 2) { |
1383 | 0 | ds_put_format(s, "tun_erspan_dir=%"PRIu8",", tnl->erspan_dir); |
1384 | 0 | } |
1385 | 0 | if (wc->masks.tunnel.erspan_hwid && tnl->erspan_ver == 2) { |
1386 | 0 | ds_put_format(s, "tun_erspan_hwid=%#"PRIx8",", tnl->erspan_hwid); |
1387 | 0 | } |
1388 | 0 | if (wc->masks.tunnel.gtpu_flags) { |
1389 | 0 | ds_put_format(s, "gtpu_flags=%#"PRIx8",", tnl->gtpu_flags); |
1390 | 0 | } |
1391 | 0 | if (wc->masks.tunnel.gtpu_msgtype) { |
1392 | 0 | ds_put_format(s, "gtpu_msgtype=%"PRIu8",", tnl->gtpu_msgtype); |
1393 | 0 | } |
1394 | 0 | if (wc->masks.tunnel.flags & FLOW_TNL_F_MASK) { |
1395 | 0 | format_flags_masked(s, "tun_flags", flow_tun_flag_to_string, |
1396 | 0 | tnl->flags & FLOW_TNL_F_MASK, |
1397 | 0 | wc->masks.tunnel.flags & FLOW_TNL_F_MASK, |
1398 | 0 | FLOW_TNL_F_MASK); |
1399 | 0 | ds_put_char(s, ','); |
1400 | 0 | } |
1401 | 0 | tun_metadata_match_format(s, match); |
1402 | 0 | } |
1403 | | |
1404 | | static void |
1405 | | format_ct_label_masked(struct ds *s, const ovs_u128 *key, const ovs_u128 *mask) |
1406 | 0 | { |
1407 | 0 | if (!ovs_u128_is_zero(*mask)) { |
1408 | 0 | ovs_be128 value = hton128(*key); |
1409 | 0 | ds_put_format(s, "%sct_label=%s", colors.param, colors.end); |
1410 | 0 | ds_put_hex(s, &value, sizeof value); |
1411 | 0 | if (!is_all_ones(mask, sizeof(*mask))) { |
1412 | 0 | value = hton128(*mask); |
1413 | 0 | ds_put_char(s, '/'); |
1414 | 0 | ds_put_hex(s, &value, sizeof value); |
1415 | 0 | } |
1416 | 0 | ds_put_char(s, ','); |
1417 | 0 | } |
1418 | 0 | } |
1419 | | |
1420 | | static void |
1421 | | format_nsh_masked(struct ds *s, const struct flow *f, const struct flow *m) |
1422 | 0 | { |
1423 | 0 | ovs_be32 spi_mask = nsh_path_hdr_to_spi(m->nsh.path_hdr); |
1424 | 0 | if (spi_mask == htonl(NSH_SPI_MASK >> NSH_SPI_SHIFT)) { |
1425 | 0 | spi_mask = OVS_BE32_MAX; |
1426 | 0 | } |
1427 | 0 | format_uint8_masked(s, "nsh_flags", f->nsh.flags, m->nsh.flags); |
1428 | 0 | format_uint8_masked(s, "nsh_ttl", f->nsh.ttl, m->nsh.ttl); |
1429 | 0 | format_uint8_masked(s, "nsh_mdtype", f->nsh.mdtype, m->nsh.mdtype); |
1430 | 0 | format_uint8_masked(s, "nsh_np", f->nsh.np, m->nsh.np); |
1431 | |
|
1432 | 0 | format_be32_masked_hex(s, "nsh_spi", nsh_path_hdr_to_spi(f->nsh.path_hdr), |
1433 | 0 | spi_mask); |
1434 | 0 | format_uint8_masked(s, "nsh_si", nsh_path_hdr_to_si(f->nsh.path_hdr), |
1435 | 0 | nsh_path_hdr_to_si(m->nsh.path_hdr)); |
1436 | 0 | if (m->nsh.mdtype == UINT8_MAX && f->nsh.mdtype == NSH_M_TYPE1) { |
1437 | 0 | format_be32_masked_hex(s, "nsh_c1", f->nsh.context[0], |
1438 | 0 | m->nsh.context[0]); |
1439 | 0 | format_be32_masked_hex(s, "nsh_c2", f->nsh.context[1], |
1440 | 0 | m->nsh.context[1]); |
1441 | 0 | format_be32_masked_hex(s, "nsh_c3", f->nsh.context[2], |
1442 | 0 | m->nsh.context[2]); |
1443 | 0 | format_be32_masked_hex(s, "nsh_c4", f->nsh.context[3], |
1444 | 0 | m->nsh.context[3]); |
1445 | 0 | } |
1446 | 0 | } |
1447 | | |
1448 | | /* Appends a string representation of 'match' to 's'. If 'priority' is |
1449 | | * different from OFP_DEFAULT_PRIORITY, includes it in 's'. If 'port_map' is |
1450 | | * nonnull, uses it to translate port numbers to names in output. */ |
1451 | | void |
1452 | | match_format(const struct match *match, |
1453 | | const struct ofputil_port_map *port_map, |
1454 | | struct ds *s, int priority) |
1455 | 0 | { |
1456 | 0 | const struct flow_wildcards *wc = &match->wc; |
1457 | 0 | size_t start_len = s->length; |
1458 | 0 | const struct flow *f = &match->flow; |
1459 | 0 | bool skip_type = false; |
1460 | 0 | bool skip_proto = false; |
1461 | 0 | ovs_be16 dl_type = f->dl_type; |
1462 | 0 | bool is_megaflow = false; |
1463 | 0 | int i; |
1464 | |
|
1465 | 0 | BUILD_ASSERT_DECL(FLOW_WC_SEQ == 42); |
1466 | |
|
1467 | 0 | if (priority != OFP_DEFAULT_PRIORITY) { |
1468 | 0 | ds_put_format(s, "%spriority=%s%d,", |
1469 | 0 | colors.special, colors.end, priority); |
1470 | 0 | } |
1471 | |
|
1472 | 0 | format_uint32_masked(s, "pkt_mark", f->pkt_mark, wc->masks.pkt_mark); |
1473 | |
|
1474 | 0 | if (wc->masks.recirc_id) { |
1475 | 0 | format_uint32_masked(s, "recirc_id", f->recirc_id, |
1476 | 0 | wc->masks.recirc_id); |
1477 | 0 | is_megaflow = true; |
1478 | 0 | } |
1479 | |
|
1480 | 0 | if (wc->masks.dp_hash) { |
1481 | 0 | format_uint32_masked(s, "dp_hash", f->dp_hash, |
1482 | 0 | wc->masks.dp_hash); |
1483 | 0 | } |
1484 | |
|
1485 | 0 | if (wc->masks.conj_id) { |
1486 | 0 | ds_put_format(s, "%sconj_id%s=%"PRIu32",", |
1487 | 0 | colors.param, colors.end, f->conj_id); |
1488 | 0 | } |
1489 | |
|
1490 | 0 | if (wc->masks.skb_priority) { |
1491 | 0 | ds_put_format(s, "%sskb_priority=%s%#"PRIx32",", |
1492 | 0 | colors.param, colors.end, f->skb_priority); |
1493 | 0 | } |
1494 | |
|
1495 | 0 | if (wc->masks.actset_output) { |
1496 | 0 | ds_put_format(s, "%sactset_output=%s", colors.param, colors.end); |
1497 | 0 | ofputil_format_port(f->actset_output, port_map, s); |
1498 | 0 | ds_put_char(s, ','); |
1499 | 0 | } |
1500 | |
|
1501 | 0 | if (wc->masks.ct_state) { |
1502 | 0 | if (wc->masks.ct_state == UINT8_MAX) { |
1503 | 0 | ds_put_format(s, "%sct_state=%s", colors.param, colors.end); |
1504 | 0 | if (f->ct_state) { |
1505 | 0 | format_flags(s, ct_state_to_string, f->ct_state, '|'); |
1506 | 0 | } else { |
1507 | 0 | ds_put_cstr(s, "0"); /* No state. */ |
1508 | 0 | } |
1509 | 0 | } else { |
1510 | 0 | format_flags_masked(s, "ct_state", ct_state_to_string, |
1511 | 0 | f->ct_state, wc->masks.ct_state, UINT8_MAX); |
1512 | 0 | } |
1513 | 0 | ds_put_char(s, ','); |
1514 | 0 | } |
1515 | |
|
1516 | 0 | if (wc->masks.ct_zone) { |
1517 | 0 | format_uint16_masked(s, "ct_zone", f->ct_zone, wc->masks.ct_zone); |
1518 | 0 | } |
1519 | |
|
1520 | 0 | if (wc->masks.ct_mark) { |
1521 | 0 | format_uint32_masked(s, "ct_mark", f->ct_mark, wc->masks.ct_mark); |
1522 | 0 | } |
1523 | |
|
1524 | 0 | if (!ovs_u128_is_zero(wc->masks.ct_label)) { |
1525 | 0 | format_ct_label_masked(s, &f->ct_label, &wc->masks.ct_label); |
1526 | 0 | } |
1527 | |
|
1528 | 0 | format_ip_netmask(s, "ct_nw_src", f->ct_nw_src, |
1529 | 0 | wc->masks.ct_nw_src); |
1530 | 0 | format_ipv6_netmask(s, "ct_ipv6_src", &f->ct_ipv6_src, |
1531 | 0 | &wc->masks.ct_ipv6_src); |
1532 | 0 | format_ip_netmask(s, "ct_nw_dst", f->ct_nw_dst, |
1533 | 0 | wc->masks.ct_nw_dst); |
1534 | 0 | format_ipv6_netmask(s, "ct_ipv6_dst", &f->ct_ipv6_dst, |
1535 | 0 | &wc->masks.ct_ipv6_dst); |
1536 | 0 | if (wc->masks.ct_nw_proto) { |
1537 | 0 | ds_put_format(s, "%sct_nw_proto=%s%"PRIu8",", |
1538 | 0 | colors.param, colors.end, f->ct_nw_proto); |
1539 | 0 | format_be16_masked(s, "ct_tp_src", f->ct_tp_src, wc->masks.ct_tp_src); |
1540 | 0 | format_be16_masked(s, "ct_tp_dst", f->ct_tp_dst, wc->masks.ct_tp_dst); |
1541 | 0 | } |
1542 | |
|
1543 | 0 | if (wc->masks.packet_type && |
1544 | 0 | (!match_has_default_packet_type(match) || is_megaflow)) { |
1545 | 0 | format_packet_type_masked(s, f->packet_type, wc->masks.packet_type); |
1546 | 0 | ds_put_char(s, ','); |
1547 | 0 | if (pt_ns(f->packet_type) == OFPHTN_ETHERTYPE) { |
1548 | 0 | dl_type = pt_ns_type_be(f->packet_type); |
1549 | 0 | } |
1550 | 0 | } |
1551 | |
|
1552 | 0 | if (wc->masks.dl_type) { |
1553 | 0 | skip_type = true; |
1554 | 0 | if (dl_type == htons(ETH_TYPE_IP)) { |
1555 | 0 | if (wc->masks.nw_proto) { |
1556 | 0 | skip_proto = true; |
1557 | 0 | if (f->nw_proto == IPPROTO_ICMP) { |
1558 | 0 | ds_put_format(s, "%sicmp%s,", colors.value, colors.end); |
1559 | 0 | } else if (f->nw_proto == IPPROTO_TCP) { |
1560 | 0 | ds_put_format(s, "%stcp%s,", colors.value, colors.end); |
1561 | 0 | } else if (f->nw_proto == IPPROTO_UDP) { |
1562 | 0 | ds_put_format(s, "%sudp%s,", colors.value, colors.end); |
1563 | 0 | } else if (f->nw_proto == IPPROTO_SCTP) { |
1564 | 0 | ds_put_format(s, "%ssctp%s,", colors.value, colors.end); |
1565 | 0 | } else { |
1566 | 0 | ds_put_format(s, "%sip%s,", colors.value, colors.end); |
1567 | 0 | skip_proto = false; |
1568 | 0 | } |
1569 | 0 | } else { |
1570 | 0 | ds_put_format(s, "%sip%s,", colors.value, colors.end); |
1571 | 0 | } |
1572 | 0 | } else if (dl_type == htons(ETH_TYPE_IPV6)) { |
1573 | 0 | if (wc->masks.nw_proto) { |
1574 | 0 | skip_proto = true; |
1575 | 0 | if (f->nw_proto == IPPROTO_ICMPV6) { |
1576 | 0 | ds_put_format(s, "%sicmp6%s,", colors.value, colors.end); |
1577 | 0 | } else if (f->nw_proto == IPPROTO_TCP) { |
1578 | 0 | ds_put_format(s, "%stcp6%s,", colors.value, colors.end); |
1579 | 0 | } else if (f->nw_proto == IPPROTO_UDP) { |
1580 | 0 | ds_put_format(s, "%sudp6%s,", colors.value, colors.end); |
1581 | 0 | } else if (f->nw_proto == IPPROTO_SCTP) { |
1582 | 0 | ds_put_format(s, "%ssctp6%s,", colors.value, colors.end); |
1583 | 0 | } else { |
1584 | 0 | ds_put_format(s, "%sipv6%s,", colors.value, colors.end); |
1585 | 0 | skip_proto = false; |
1586 | 0 | } |
1587 | 0 | } else { |
1588 | 0 | ds_put_format(s, "%sipv6%s,", colors.value, colors.end); |
1589 | 0 | } |
1590 | 0 | } else if (dl_type == htons(ETH_TYPE_ARP)) { |
1591 | 0 | ds_put_format(s, "%sarp%s,", colors.value, colors.end); |
1592 | 0 | } else if (dl_type == htons(ETH_TYPE_RARP)) { |
1593 | 0 | ds_put_format(s, "%srarp%s,", colors.value, colors.end); |
1594 | 0 | } else if (dl_type == htons(ETH_TYPE_MPLS)) { |
1595 | 0 | ds_put_format(s, "%smpls%s,", colors.value, colors.end); |
1596 | 0 | } else if (dl_type == htons(ETH_TYPE_MPLS_MCAST)) { |
1597 | 0 | ds_put_format(s, "%smplsm%s,", colors.value, colors.end); |
1598 | 0 | } else { |
1599 | 0 | skip_type = false; |
1600 | 0 | } |
1601 | 0 | } |
1602 | 0 | for (i = 0; i < FLOW_N_REGS; i++) { |
1603 | 0 | #define REGNAME_LEN 20 |
1604 | 0 | char regname[REGNAME_LEN]; |
1605 | 0 | if (snprintf(regname, REGNAME_LEN, "reg%d", i) >= REGNAME_LEN) { |
1606 | 0 | strcpy(regname, "reg?"); |
1607 | 0 | } |
1608 | 0 | format_uint32_masked(s, regname, f->regs[i], wc->masks.regs[i]); |
1609 | 0 | } |
1610 | |
|
1611 | 0 | format_flow_tunnel(s, match); |
1612 | |
|
1613 | 0 | format_be64_masked(s, "metadata", f->metadata, wc->masks.metadata); |
1614 | |
|
1615 | 0 | if (wc->masks.in_port.ofp_port) { |
1616 | 0 | ds_put_format(s, "%sin_port=%s", colors.param, colors.end); |
1617 | 0 | ofputil_format_port(f->in_port.ofp_port, port_map, s); |
1618 | 0 | ds_put_char(s, ','); |
1619 | 0 | } |
1620 | 0 | for (i = 0; i < FLOW_MAX_VLAN_HEADERS; i++) { |
1621 | 0 | char str_i[12]; |
1622 | |
|
1623 | 0 | if (!wc->masks.vlans[i].tci) { |
1624 | 0 | break; |
1625 | 0 | } |
1626 | | |
1627 | | /* Print VLAN tags as dl_vlan, dl_vlan1, dl_vlan2 ... */ |
1628 | 0 | if (i == 0) { |
1629 | 0 | str_i[0] = '\0'; |
1630 | 0 | } else { |
1631 | 0 | snprintf(str_i, sizeof(str_i), "%d", i); |
1632 | 0 | } |
1633 | 0 | ovs_be16 vid_mask = wc->masks.vlans[i].tci & htons(VLAN_VID_MASK); |
1634 | 0 | ovs_be16 pcp_mask = wc->masks.vlans[i].tci & htons(VLAN_PCP_MASK); |
1635 | 0 | ovs_be16 cfi = wc->masks.vlans[i].tci & htons(VLAN_CFI); |
1636 | |
|
1637 | 0 | if (cfi && f->vlans[i].tci & htons(VLAN_CFI) |
1638 | 0 | && (!vid_mask || vid_mask == htons(VLAN_VID_MASK)) |
1639 | 0 | && (!pcp_mask || pcp_mask == htons(VLAN_PCP_MASK)) |
1640 | 0 | && (vid_mask || pcp_mask)) { |
1641 | 0 | if (vid_mask) { |
1642 | 0 | ds_put_format(s, "%sdl_vlan%s=%s%"PRIu16",", |
1643 | 0 | colors.param, str_i, colors.end, |
1644 | 0 | vlan_tci_to_vid(f->vlans[i].tci)); |
1645 | 0 | } |
1646 | 0 | if (pcp_mask) { |
1647 | 0 | ds_put_format(s, "%sdl_vlan_pcp%s=%s%d,", |
1648 | 0 | colors.param, str_i, colors.end, |
1649 | 0 | vlan_tci_to_pcp(f->vlans[i].tci)); |
1650 | 0 | } |
1651 | 0 | } else if (wc->masks.vlans[i].tci == htons(0xffff)) { |
1652 | 0 | ds_put_format(s, "%svlan_tci%s=%s0x%04"PRIx16",", |
1653 | 0 | colors.param, str_i, colors.end, |
1654 | 0 | ntohs(f->vlans[i].tci)); |
1655 | 0 | } else { |
1656 | 0 | ds_put_format(s, "%svlan_tci%s=%s0x%04"PRIx16"/0x%04"PRIx16",", |
1657 | 0 | colors.param, str_i, colors.end, |
1658 | 0 | ntohs(f->vlans[i].tci), |
1659 | 0 | ntohs(wc->masks.vlans[i].tci)); |
1660 | 0 | } |
1661 | 0 | } |
1662 | |
|
1663 | 0 | format_eth_masked(s, "dl_src", f->dl_src, wc->masks.dl_src); |
1664 | 0 | format_eth_masked(s, "dl_dst", f->dl_dst, wc->masks.dl_dst); |
1665 | |
|
1666 | 0 | if (!skip_type && wc->masks.dl_type) { |
1667 | 0 | ds_put_format(s, "%sdl_type=%s0x%04"PRIx16",", |
1668 | 0 | colors.param, colors.end, ntohs(dl_type)); |
1669 | 0 | } |
1670 | 0 | if (dl_type == htons(ETH_TYPE_IPV6)) { |
1671 | 0 | format_ipv6_netmask(s, "ipv6_src", &f->ipv6_src, &wc->masks.ipv6_src); |
1672 | 0 | format_ipv6_netmask(s, "ipv6_dst", &f->ipv6_dst, &wc->masks.ipv6_dst); |
1673 | 0 | if (wc->masks.ipv6_label) { |
1674 | 0 | if (wc->masks.ipv6_label == OVS_BE32_MAX) { |
1675 | 0 | ds_put_format(s, "%sipv6_label=%s0x%05"PRIx32",", |
1676 | 0 | colors.param, colors.end, |
1677 | 0 | ntohl(f->ipv6_label)); |
1678 | 0 | } else { |
1679 | 0 | ds_put_format(s, "%sipv6_label=%s0x%05"PRIx32"/0x%05"PRIx32",", |
1680 | 0 | colors.param, colors.end, ntohl(f->ipv6_label), |
1681 | 0 | ntohl(wc->masks.ipv6_label)); |
1682 | 0 | } |
1683 | 0 | } |
1684 | 0 | } else if (dl_type == htons(ETH_TYPE_ARP) || |
1685 | 0 | dl_type == htons(ETH_TYPE_RARP)) { |
1686 | 0 | format_ip_netmask(s, "arp_spa", f->nw_src, wc->masks.nw_src); |
1687 | 0 | format_ip_netmask(s, "arp_tpa", f->nw_dst, wc->masks.nw_dst); |
1688 | 0 | } else if (dl_type == htons(ETH_TYPE_NSH)) { |
1689 | 0 | format_nsh_masked(s, f, &wc->masks); |
1690 | 0 | } else { |
1691 | 0 | format_ip_netmask(s, "nw_src", f->nw_src, wc->masks.nw_src); |
1692 | 0 | format_ip_netmask(s, "nw_dst", f->nw_dst, wc->masks.nw_dst); |
1693 | 0 | } |
1694 | 0 | if (!skip_proto && wc->masks.nw_proto) { |
1695 | 0 | if (dl_type == htons(ETH_TYPE_ARP) || |
1696 | 0 | dl_type == htons(ETH_TYPE_RARP)) { |
1697 | 0 | ds_put_format(s, "%sarp_op=%s%"PRIu8",", |
1698 | 0 | colors.param, colors.end, f->nw_proto); |
1699 | 0 | } else { |
1700 | 0 | ds_put_format(s, "%snw_proto=%s%"PRIu8",", |
1701 | 0 | colors.param, colors.end, f->nw_proto); |
1702 | 0 | } |
1703 | 0 | } |
1704 | 0 | if (dl_type == htons(ETH_TYPE_ARP) || |
1705 | 0 | dl_type == htons(ETH_TYPE_RARP)) { |
1706 | 0 | format_eth_masked(s, "arp_sha", f->arp_sha, wc->masks.arp_sha); |
1707 | 0 | format_eth_masked(s, "arp_tha", f->arp_tha, wc->masks.arp_tha); |
1708 | 0 | } |
1709 | 0 | if (wc->masks.nw_tos & IP_DSCP_MASK) { |
1710 | 0 | ds_put_format(s, "%snw_tos=%s%d,", |
1711 | 0 | colors.param, colors.end, f->nw_tos & IP_DSCP_MASK); |
1712 | 0 | } |
1713 | 0 | if (wc->masks.nw_tos & IP_ECN_MASK) { |
1714 | 0 | ds_put_format(s, "%snw_ecn=%s%d,", |
1715 | 0 | colors.param, colors.end, f->nw_tos & IP_ECN_MASK); |
1716 | 0 | } |
1717 | 0 | if (wc->masks.nw_ttl) { |
1718 | 0 | ds_put_format(s, "%snw_ttl=%s%d,", |
1719 | 0 | colors.param, colors.end, f->nw_ttl); |
1720 | 0 | } |
1721 | 0 | if (wc->masks.mpls_lse[0] & htonl(MPLS_LABEL_MASK)) { |
1722 | 0 | ds_put_format(s, "%smpls_label=%s%"PRIu32",", colors.param, |
1723 | 0 | colors.end, mpls_lse_to_label(f->mpls_lse[0])); |
1724 | 0 | } |
1725 | 0 | if (wc->masks.mpls_lse[0] & htonl(MPLS_TC_MASK)) { |
1726 | 0 | ds_put_format(s, "%smpls_tc=%s%"PRIu8",", colors.param, colors.end, |
1727 | 0 | mpls_lse_to_tc(f->mpls_lse[0])); |
1728 | 0 | } |
1729 | 0 | if (wc->masks.mpls_lse[0] & htonl(MPLS_TTL_MASK)) { |
1730 | 0 | ds_put_format(s, "%smpls_ttl=%s%"PRIu8",", colors.param, colors.end, |
1731 | 0 | mpls_lse_to_ttl(f->mpls_lse[0])); |
1732 | 0 | } |
1733 | 0 | if (wc->masks.mpls_lse[0] & htonl(MPLS_BOS_MASK)) { |
1734 | 0 | ds_put_format(s, "%smpls_bos=%s%"PRIu8",", colors.param, colors.end, |
1735 | 0 | mpls_lse_to_bos(f->mpls_lse[0])); |
1736 | 0 | } |
1737 | 0 | format_be32_masked(s, "mpls_lse1", f->mpls_lse[1], wc->masks.mpls_lse[1]); |
1738 | 0 | format_be32_masked(s, "mpls_lse2", f->mpls_lse[2], wc->masks.mpls_lse[2]); |
1739 | |
|
1740 | 0 | switch (wc->masks.nw_frag & FLOW_NW_FRAG_MASK) { |
1741 | 0 | case FLOW_NW_FRAG_ANY | FLOW_NW_FRAG_LATER: |
1742 | 0 | ds_put_format(s, "%snw_frag=%s%s,", colors.param, colors.end, |
1743 | 0 | f->nw_frag & FLOW_NW_FRAG_ANY |
1744 | 0 | ? (f->nw_frag & FLOW_NW_FRAG_LATER ? "later" : "first") |
1745 | 0 | : (f->nw_frag & FLOW_NW_FRAG_LATER ? "<error>" : "no")); |
1746 | 0 | break; |
1747 | | |
1748 | 0 | case FLOW_NW_FRAG_ANY: |
1749 | 0 | ds_put_format(s, "%snw_frag=%s%s,", colors.param, colors.end, |
1750 | 0 | f->nw_frag & FLOW_NW_FRAG_ANY ? "yes" : "no"); |
1751 | 0 | break; |
1752 | | |
1753 | 0 | case FLOW_NW_FRAG_LATER: |
1754 | 0 | ds_put_format(s, "%snw_frag=%s%s,", colors.param, colors.end, |
1755 | 0 | f->nw_frag & FLOW_NW_FRAG_LATER ? "later" : "not_later"); |
1756 | 0 | break; |
1757 | 0 | } |
1758 | 0 | if (dl_type == htons(ETH_TYPE_IP) && |
1759 | 0 | f->nw_proto == IPPROTO_ICMP) { |
1760 | 0 | format_be16_masked(s, "icmp_type", f->tp_src, wc->masks.tp_src); |
1761 | 0 | format_be16_masked(s, "icmp_code", f->tp_dst, wc->masks.tp_dst); |
1762 | 0 | } else if (dl_type == htons(ETH_TYPE_IPV6) && |
1763 | 0 | f->nw_proto == IPPROTO_ICMPV6) { |
1764 | 0 | format_be16_masked(s, "icmp_type", f->tp_src, wc->masks.tp_src); |
1765 | 0 | format_be16_masked(s, "icmp_code", f->tp_dst, wc->masks.tp_dst); |
1766 | 0 | format_ipv6_netmask(s, "nd_target", &f->nd_target, |
1767 | 0 | &wc->masks.nd_target); |
1768 | 0 | format_eth_masked(s, "nd_sll", f->arp_sha, wc->masks.arp_sha); |
1769 | 0 | format_eth_masked(s, "nd_tll", f->arp_tha, wc->masks.arp_tha); |
1770 | 0 | if (wc->masks.igmp_group_ip4) { |
1771 | 0 | format_be32_masked(s,"nd_reserved", f->igmp_group_ip4, |
1772 | 0 | wc->masks.igmp_group_ip4); |
1773 | 0 | } |
1774 | 0 | if (wc->masks.tcp_flags) { |
1775 | 0 | format_be16_masked(s,"nd_options_type", f->tcp_flags, |
1776 | 0 | wc->masks.tcp_flags); |
1777 | 0 | } |
1778 | 0 | } else { |
1779 | 0 | format_be16_masked(s, "tp_src", f->tp_src, wc->masks.tp_src); |
1780 | 0 | format_be16_masked(s, "tp_dst", f->tp_dst, wc->masks.tp_dst); |
1781 | 0 | } |
1782 | 0 | if (is_ip_any(f) && f->nw_proto == IPPROTO_TCP && wc->masks.tcp_flags) { |
1783 | 0 | format_flags_masked(s, "tcp_flags", packet_tcp_flag_to_string, |
1784 | 0 | ntohs(f->tcp_flags), TCP_FLAGS(wc->masks.tcp_flags), |
1785 | 0 | TCP_FLAGS(OVS_BE16_MAX)); |
1786 | 0 | } |
1787 | |
|
1788 | 0 | if (s->length > start_len) { |
1789 | 0 | ds_chomp(s, ','); |
1790 | 0 | } |
1791 | 0 | } |
1792 | | |
1793 | | /* Converts 'match' to a string and returns the string. If 'priority' is |
1794 | | * different from OFP_DEFAULT_PRIORITY, includes it in the string. If |
1795 | | * 'port_map' is nonnull, uses it to translate port numbers to names in |
1796 | | * output. The caller must free the string (with free()). */ |
1797 | | char * |
1798 | | match_to_string(const struct match *match, |
1799 | | const struct ofputil_port_map *port_map, int priority) |
1800 | 0 | { |
1801 | 0 | struct ds s = DS_EMPTY_INITIALIZER; |
1802 | 0 | match_format(match, port_map, &s, priority); |
1803 | 0 | return ds_steal_cstr(&s); |
1804 | 0 | } |
1805 | | |
1806 | | void |
1807 | | match_print(const struct match *match, |
1808 | | const struct ofputil_port_map *port_map) |
1809 | 0 | { |
1810 | 0 | char *s = match_to_string(match, port_map, OFP_DEFAULT_PRIORITY); |
1811 | 0 | puts(s); |
1812 | 0 | free(s); |
1813 | 0 | } |
1814 | | |
1815 | | /* Initializes 'dst' as a copy of 'src'. The caller must eventually free 'dst' |
1816 | | * with minimatch_destroy(). */ |
1817 | | void |
1818 | | minimatch_init(struct minimatch *dst, const struct match *src) |
1819 | 0 | { |
1820 | 0 | struct miniflow tmp; |
1821 | |
|
1822 | 0 | miniflow_map_init(&tmp, &src->wc.masks); |
1823 | | /* Allocate two consecutive miniflows. */ |
1824 | 0 | miniflow_alloc(dst->flows, 2, &tmp); |
1825 | 0 | miniflow_init(dst->flow, &src->flow); |
1826 | 0 | minimask_init(dst->mask, &src->wc); |
1827 | |
|
1828 | 0 | dst->tun_md = tun_metadata_allocation_clone(&src->tun_md); |
1829 | 0 | } |
1830 | | |
1831 | | /* Initializes 'match' as a "catch-all" match that matches every packet. */ |
1832 | | void |
1833 | | minimatch_init_catchall(struct minimatch *match) |
1834 | 0 | { |
1835 | 0 | match->flows[0] = xcalloc(2, sizeof *match->flow); |
1836 | 0 | match->flows[1] = match->flows[0] + 1; |
1837 | 0 | match->tun_md = NULL; |
1838 | 0 | } |
1839 | | |
1840 | | /* Initializes 'dst' as a copy of 'src'. The caller must eventually free 'dst' |
1841 | | * with minimatch_destroy(). */ |
1842 | | void |
1843 | | minimatch_clone(struct minimatch *dst, const struct minimatch *src) |
1844 | 0 | { |
1845 | | /* Allocate two consecutive miniflows. */ |
1846 | 0 | size_t data_size = miniflow_alloc(dst->flows, 2, &src->mask->masks); |
1847 | |
|
1848 | 0 | memcpy(miniflow_values(dst->flow), |
1849 | 0 | miniflow_get_values(src->flow), data_size); |
1850 | 0 | memcpy(miniflow_values(&dst->mask->masks), |
1851 | 0 | miniflow_get_values(&src->mask->masks), data_size); |
1852 | 0 | dst->tun_md = tun_metadata_allocation_clone(src->tun_md); |
1853 | 0 | } |
1854 | | |
1855 | | /* Initializes 'dst' with the data in 'src', destroying 'src'. The caller must |
1856 | | * eventually free 'dst' with minimatch_destroy(). */ |
1857 | | void |
1858 | | minimatch_move(struct minimatch *dst, struct minimatch *src) |
1859 | 0 | { |
1860 | 0 | dst->flow = src->flow; |
1861 | 0 | dst->mask = src->mask; |
1862 | 0 | dst->tun_md = src->tun_md; |
1863 | 0 | } |
1864 | | |
1865 | | /* Frees any memory owned by 'match'. Does not free the storage in which |
1866 | | * 'match' itself resides; the caller is responsible for that. */ |
1867 | | void |
1868 | | minimatch_destroy(struct minimatch *match) |
1869 | 0 | { |
1870 | 0 | free(match->flow); |
1871 | 0 | free(match->tun_md); |
1872 | 0 | } |
1873 | | |
1874 | | /* Initializes 'dst' as a copy of 'src'. */ |
1875 | | void |
1876 | | minimatch_expand(const struct minimatch *src, struct match *dst) |
1877 | 0 | { |
1878 | 0 | miniflow_expand(src->flow, &dst->flow); |
1879 | 0 | minimask_expand(src->mask, &dst->wc); |
1880 | 0 | tun_metadata_allocation_copy(&dst->tun_md, src->tun_md); |
1881 | 0 | } |
1882 | | |
1883 | | /* Returns true if 'a' and 'b' match the same packets, false otherwise. */ |
1884 | | bool |
1885 | | minimatch_equal(const struct minimatch *a, const struct minimatch *b) |
1886 | 0 | { |
1887 | 0 | return minimask_equal(a->mask, b->mask) |
1888 | 0 | && miniflow_equal(a->flow, b->flow); |
1889 | 0 | } |
1890 | | |
1891 | | /* Returns a hash value for the flow and wildcards in 'match', starting from |
1892 | | * 'basis'. */ |
1893 | | uint32_t |
1894 | | minimatch_hash(const struct minimatch *match, uint32_t basis) |
1895 | 0 | { |
1896 | 0 | size_t n_values = miniflow_n_values(match->flow); |
1897 | 0 | size_t flow_size = sizeof *match->flow + MINIFLOW_VALUES_SIZE(n_values); |
1898 | 0 | return hash_bytes(match->flow, 2 * flow_size, basis); |
1899 | 0 | } |
1900 | | |
1901 | | /* Returns true if 'target' satisifies 'match', that is, if each bit for which |
1902 | | * 'match' specifies a particular value has the correct value in 'target'. |
1903 | | * |
1904 | | * This function is equivalent to miniflow_equal_flow_in_minimask(&match->flow, |
1905 | | * target, &match->mask) but it is faster because of the invariant that |
1906 | | * match->flow.map and match->mask.map are the same. */ |
1907 | | bool |
1908 | | minimatch_matches_flow(const struct minimatch *match, |
1909 | | const struct flow *target) |
1910 | 0 | { |
1911 | 0 | const uint64_t *flowp = miniflow_get_values(match->flow); |
1912 | 0 | const uint64_t *maskp = miniflow_get_values(&match->mask->masks); |
1913 | 0 | size_t idx; |
1914 | |
|
1915 | 0 | FLOWMAP_FOR_EACH_INDEX(idx, match->flow->map) { |
1916 | 0 | if ((*flowp++ ^ flow_u64_value(target, idx)) & *maskp++) { |
1917 | 0 | return false; |
1918 | 0 | } |
1919 | 0 | } |
1920 | | |
1921 | 0 | return true; |
1922 | 0 | } |
1923 | | |
1924 | | /* Appends a string representation of 'match' to 's'. If 'priority' is |
1925 | | * different from OFP_DEFAULT_PRIORITY, includes it in 's'. If 'port_map' is |
1926 | | * nonnull, uses it to translate port numbers to names in output. */ |
1927 | | void |
1928 | | minimatch_format(const struct minimatch *match, |
1929 | | const struct tun_table *tun_table, |
1930 | | const struct ofputil_port_map *port_map, |
1931 | | struct ds *s, int priority) |
1932 | 0 | { |
1933 | 0 | struct match megamatch; |
1934 | |
|
1935 | 0 | minimatch_expand(match, &megamatch); |
1936 | 0 | megamatch.flow.tunnel.metadata.tab = tun_table; |
1937 | |
|
1938 | 0 | match_format(&megamatch, port_map, s, priority); |
1939 | 0 | } |
1940 | | |
1941 | | /* Converts 'match' to a string and returns the string. If 'priority' is |
1942 | | * different from OFP_DEFAULT_PRIORITY, includes it in the string. The caller |
1943 | | * must free the string (with free()). If 'port_map' is nonnull, uses it to |
1944 | | * translate port numbers to names in output. */ |
1945 | | char * |
1946 | | minimatch_to_string(const struct minimatch *match, |
1947 | | const struct ofputil_port_map *port_map, int priority) |
1948 | 0 | { |
1949 | 0 | struct match megamatch; |
1950 | |
|
1951 | 0 | minimatch_expand(match, &megamatch); |
1952 | 0 | return match_to_string(&megamatch, port_map, priority); |
1953 | 0 | } |
1954 | | |
1955 | | static bool |
1956 | | minimatch_has_default_recirc_id(const struct minimatch *m) |
1957 | 0 | { |
1958 | 0 | uint32_t flow_recirc_id = miniflow_get_recirc_id(m->flow); |
1959 | 0 | uint32_t mask_recirc_id = miniflow_get_recirc_id(&m->mask->masks); |
1960 | 0 | return flow_recirc_id == 0 && (mask_recirc_id == UINT32_MAX || |
1961 | 0 | mask_recirc_id == 0); |
1962 | 0 | } |
1963 | | |
1964 | | static bool |
1965 | | minimatch_has_default_dp_hash(const struct minimatch *m) |
1966 | 0 | { |
1967 | 0 | return (!miniflow_get_dp_hash(m->flow) |
1968 | 0 | && !miniflow_get_dp_hash(&m->mask->masks)); |
1969 | 0 | } |
1970 | | |
1971 | | /* Return true if the hidden fields of the match are set to the default values. |
1972 | | * The default values equals to those set up by match_init_hidden_fields(). */ |
1973 | | bool |
1974 | | minimatch_has_default_hidden_fields(const struct minimatch *m) |
1975 | 0 | { |
1976 | 0 | return (minimatch_has_default_recirc_id(m) |
1977 | 0 | && minimatch_has_default_dp_hash(m)); |
1978 | 0 | } |