Coverage Report

Created: 2025-07-18 06:07

/src/openvswitch/lib/meta-flow.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright (c) 2011-2017 Nicira, Inc.
3
 *
4
 * Licensed under the Apache License, Version 2.0 (the "License");
5
 * you may not use this file except in compliance with the License.
6
 * You may obtain a copy of the License at:
7
 *
8
 *     http://www.apache.org/licenses/LICENSE-2.0
9
 *
10
 * Unless required by applicable law or agreed to in writing, software
11
 * distributed under the License is distributed on an "AS IS" BASIS,
12
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
 * See the License for the specific language governing permissions and
14
 * limitations under the License.
15
 */
16
17
#include <config.h>
18
19
#include "openvswitch/meta-flow.h"
20
21
#include <errno.h>
22
#include <limits.h>
23
#include <netinet/icmp6.h>
24
#include <netinet/ip6.h>
25
26
#include "classifier.h"
27
#include "openvswitch/dynamic-string.h"
28
#include "nx-match.h"
29
#include "ovs-atomic.h"
30
#include "ovs-rcu.h"
31
#include "ovs-thread.h"
32
#include "packets.h"
33
#include "random.h"
34
#include "openvswitch/shash.h"
35
#include "socket-util.h"
36
#include "tun-metadata.h"
37
#include "unaligned.h"
38
#include "util.h"
39
#include "openvswitch/ofp-errors.h"
40
#include "openvswitch/ofp-match.h"
41
#include "openvswitch/ofp-port.h"
42
#include "openvswitch/vlog.h"
43
#include "vl-mff-map.h"
44
#include "openvswitch/nsh.h"
45
46
VLOG_DEFINE_THIS_MODULE(meta_flow);
47
48
#define FLOW_U32OFS(FIELD)                                              \
49
    offsetof(struct flow, FIELD) % 4 ? -1 : offsetof(struct flow, FIELD) / 4
50
51
#define MF_FIELD_SIZES(MEMBER)                  \
52
    sizeof ((union mf_value *)0)->MEMBER,       \
53
    8 * sizeof ((union mf_value *)0)->MEMBER
54
55
extern const struct mf_field mf_fields[MFF_N_IDS]; /* Silence a warning. */
56
57
const struct mf_field mf_fields[MFF_N_IDS] = {
58
#include "meta-flow.inc"
59
};
60
61
/* Maps from an mf_field's 'name' or 'extra_name' to the mf_field. */
62
static struct shash mf_by_name;
63
64
/* Rate limit for parse errors.  These always indicate a bug in an OpenFlow
65
 * controller and so there's not much point in showing a lot of them. */
66
static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 5);
67
68
#define MF_VALUE_EXACT_8 0xff, 0xff, 0xff, 0xff,  0xff, 0xff, 0xff, 0xff
69
#define MF_VALUE_EXACT_16 MF_VALUE_EXACT_8, MF_VALUE_EXACT_8
70
#define MF_VALUE_EXACT_32 MF_VALUE_EXACT_16, MF_VALUE_EXACT_16
71
#define MF_VALUE_EXACT_64 MF_VALUE_EXACT_32, MF_VALUE_EXACT_32
72
#define MF_VALUE_EXACT_128 MF_VALUE_EXACT_64, MF_VALUE_EXACT_64
73
#define MF_VALUE_EXACT_INITIALIZER { .tun_metadata = { MF_VALUE_EXACT_128 } }
74
#define MF_SUBVALUE_EXACT_INITIALIZER { .u8 = { MF_VALUE_EXACT_128 } }
75
76
const union mf_value exact_match_mask = MF_VALUE_EXACT_INITIALIZER;
77
const union mf_subvalue exact_sub_match_mask = MF_SUBVALUE_EXACT_INITIALIZER;
78
79
static void nxm_init(void);
80
81
/* Returns the field with the given 'name', or a null pointer if no field has
82
 * that name. */
83
const struct mf_field *
84
mf_from_name(const char *name)
85
139k
{
86
139k
    nxm_init();
87
139k
    return shash_find_data(&mf_by_name, name);
88
139k
}
89
90
/* Returns the field with the given 'name' (which is 'len' bytes long), or a
91
 * null pointer if no field has that name. */
92
const struct mf_field *
93
mf_from_name_len(const char *name, size_t len)
94
123k
{
95
123k
    nxm_init();
96
97
123k
    struct shash_node *node = shash_find_len(&mf_by_name, name, len);
98
123k
    return node ? node->data : NULL;
99
123k
}
100
101
static void
102
nxm_do_init(void)
103
1
{
104
1
    int i;
105
106
1
    shash_init(&mf_by_name);
107
184
    for (i = 0; i < MFF_N_IDS; i++) {
108
183
        const struct mf_field *mf = &mf_fields[i];
109
110
183
        ovs_assert(mf->id == i); /* Fields must be in the enum order. */
111
112
183
        shash_add_once(&mf_by_name, mf->name, mf);
113
183
        if (mf->extra_name) {
114
17
            shash_add_once(&mf_by_name, mf->extra_name, mf);
115
17
        }
116
183
    }
117
1
}
118
119
static void
120
nxm_init(void)
121
262k
{
122
262k
    static pthread_once_t once = PTHREAD_ONCE_INIT;
123
262k
    pthread_once(&once, nxm_do_init);
124
262k
}
125
126
/* Consider the two value/mask pairs 'a_value/a_mask' and 'b_value/b_mask' as
127
 * restrictions on a field's value.  Then, this function initializes
128
 * 'dst_value/dst_mask' such that it combines the restrictions of both pairs.
129
 * This is not always possible, i.e. if one pair insists on a value of 0 in
130
 * some bit and the other pair insists on a value of 1 in that bit.  This
131
 * function returns false in a case where the combined restriction is
132
 * impossible (in which case 'dst_value/dst_mask' is not fully initialized),
133
 * true otherwise.
134
 *
135
 * (As usually true for value/mask pairs in OVS, any 1-bit in a value must have
136
 * a corresponding 1-bit in its mask.) */
137
bool
138
mf_subvalue_intersect(const union mf_subvalue *a_value,
139
                      const union mf_subvalue *a_mask,
140
                      const union mf_subvalue *b_value,
141
                      const union mf_subvalue *b_mask,
142
                      union mf_subvalue *dst_value,
143
                      union mf_subvalue *dst_mask)
144
0
{
145
0
    for (int i = 0; i < ARRAY_SIZE(a_value->be64); i++) {
146
0
        ovs_be64 av = a_value->be64[i];
147
0
        ovs_be64 am = a_mask->be64[i];
148
0
        ovs_be64 bv = b_value->be64[i];
149
0
        ovs_be64 bm = b_mask->be64[i];
150
0
        ovs_be64 *dv = &dst_value->be64[i];
151
0
        ovs_be64 *dm = &dst_mask->be64[i];
152
153
0
        if ((av ^ bv) & (am & bm)) {
154
0
            return false;
155
0
        }
156
0
        *dv = av | bv;
157
0
        *dm = am | bm;
158
0
    }
159
0
    return true;
160
0
}
161
162
/* Returns the "number of bits" in 'v', e.g. 1 if only the lowest-order bit is
163
 * set, 2 if the second-lowest-order bit is set, and so on. */
164
int
165
mf_subvalue_width(const union mf_subvalue *v)
166
0
{
167
0
    return 1 + bitwise_rscan(v, sizeof *v, true, sizeof *v * 8 - 1, -1);
168
0
}
169
170
/* For positive 'n', shifts the bits in 'value' 'n' bits to the left, and for
171
 * negative 'n', shifts the bits '-n' bits to the right. */
172
void
173
mf_subvalue_shift(union mf_subvalue *value, int n)
174
0
{
175
0
    if (n) {
176
0
        union mf_subvalue tmp;
177
0
        memset(&tmp, 0, sizeof tmp);
178
179
0
        if (n > 0 && n < 8 * sizeof tmp) {
180
0
            bitwise_copy(value, sizeof *value, 0,
181
0
                         &tmp, sizeof tmp, n,
182
0
                         8 * sizeof tmp - n);
183
0
        } else if (n < 0 && n > -8 * sizeof tmp) {
184
0
            bitwise_copy(value, sizeof *value, -n,
185
0
                         &tmp, sizeof tmp, 0,
186
0
                         8 * sizeof tmp + n);
187
0
        }
188
0
        *value = tmp;
189
0
    }
190
0
}
191
192
/* Appends a formatted representation of 'sv' to 's'. */
193
void
194
mf_subvalue_format(const union mf_subvalue *sv, struct ds *s)
195
0
{
196
0
    ds_put_hex(s, sv, sizeof *sv);
197
0
}
198
199
/* Returns true if 'wc' wildcards all the bits in field 'mf', false if 'wc'
200
 * specifies at least one bit in the field.
201
 *
202
 * The caller is responsible for ensuring that 'wc' corresponds to a flow that
203
 * meets 'mf''s prerequisites. */
204
bool
205
mf_is_all_wild(const struct mf_field *mf, const struct flow_wildcards *wc)
206
0
{
207
0
    switch (mf->id) {
208
0
    case MFF_DP_HASH:
209
0
        return !wc->masks.dp_hash;
210
0
    case MFF_RECIRC_ID:
211
0
        return !wc->masks.recirc_id;
212
0
    case MFF_PACKET_TYPE:
213
0
        return !wc->masks.packet_type;
214
0
    case MFF_CONJ_ID:
215
0
        return !wc->masks.conj_id;
216
0
    case MFF_TUN_SRC:
217
0
        return !wc->masks.tunnel.ip_src;
218
0
    case MFF_TUN_DST:
219
0
        return !wc->masks.tunnel.ip_dst;
220
0
    case MFF_TUN_IPV6_SRC:
221
0
        return ipv6_mask_is_any(&wc->masks.tunnel.ipv6_src);
222
0
    case MFF_TUN_IPV6_DST:
223
0
        return ipv6_mask_is_any(&wc->masks.tunnel.ipv6_dst);
224
0
    case MFF_TUN_ID:
225
0
        return !wc->masks.tunnel.tun_id;
226
0
    case MFF_TUN_TOS:
227
0
        return !wc->masks.tunnel.ip_tos;
228
0
    case MFF_TUN_TTL:
229
0
        return !wc->masks.tunnel.ip_ttl;
230
0
    case MFF_TUN_FLAGS:
231
0
        return !(wc->masks.tunnel.flags & FLOW_TNL_PUB_F_MASK);
232
0
    case MFF_TUN_GBP_ID:
233
0
        return !wc->masks.tunnel.gbp_id;
234
0
    case MFF_TUN_GBP_FLAGS:
235
0
        return !wc->masks.tunnel.gbp_flags;
236
0
    case MFF_TUN_ERSPAN_VER:
237
0
        return !wc->masks.tunnel.erspan_ver;
238
0
    case MFF_TUN_ERSPAN_IDX:
239
0
        return !wc->masks.tunnel.erspan_idx;
240
0
    case MFF_TUN_ERSPAN_DIR:
241
0
        return !wc->masks.tunnel.erspan_dir;
242
0
    case MFF_TUN_ERSPAN_HWID:
243
0
        return !wc->masks.tunnel.erspan_hwid;
244
0
    CASE_MFF_TUN_METADATA:
245
0
        return !ULLONG_GET(wc->masks.tunnel.metadata.present.map,
246
0
                           mf->id - MFF_TUN_METADATA0);
247
0
    case MFF_METADATA:
248
0
        return !wc->masks.metadata;
249
0
    case MFF_IN_PORT:
250
0
    case MFF_IN_PORT_OXM:
251
0
        return !wc->masks.in_port.ofp_port;
252
0
    case MFF_SKB_PRIORITY:
253
0
        return !wc->masks.skb_priority;
254
0
    case MFF_PKT_MARK:
255
0
        return !wc->masks.pkt_mark;
256
0
    case MFF_CT_STATE:
257
0
        return !wc->masks.ct_state;
258
0
    case MFF_CT_ZONE:
259
0
        return !wc->masks.ct_zone;
260
0
    case MFF_CT_MARK:
261
0
        return !wc->masks.ct_mark;
262
0
    case MFF_CT_LABEL:
263
0
        return ovs_u128_is_zero(wc->masks.ct_label);
264
0
    case MFF_CT_NW_PROTO:
265
0
        return !wc->masks.ct_nw_proto;
266
0
    case MFF_CT_NW_SRC:
267
0
        return !wc->masks.ct_nw_src;
268
0
    case MFF_CT_NW_DST:
269
0
        return !wc->masks.ct_nw_dst;
270
0
    case MFF_CT_TP_SRC:
271
0
        return !wc->masks.ct_tp_src;
272
0
    case MFF_CT_TP_DST:
273
0
        return !wc->masks.ct_tp_dst;
274
0
    case MFF_CT_IPV6_SRC:
275
0
        return ipv6_mask_is_any(&wc->masks.ct_ipv6_src);
276
0
    case MFF_CT_IPV6_DST:
277
0
        return ipv6_mask_is_any(&wc->masks.ct_ipv6_dst);
278
0
    CASE_MFF_REGS:
279
0
        return !wc->masks.regs[mf->id - MFF_REG0];
280
0
    CASE_MFF_XREGS:
281
0
        return !flow_get_xreg(&wc->masks, mf->id - MFF_XREG0);
282
0
    CASE_MFF_XXREGS: {
283
0
        ovs_u128 value = flow_get_xxreg(&wc->masks, mf->id - MFF_XXREG0);
284
0
        return ovs_u128_is_zero(value);
285
0
    }
286
0
    case MFF_ACTSET_OUTPUT:
287
0
        return !wc->masks.actset_output;
288
289
0
    case MFF_ETH_SRC:
290
0
        return eth_addr_is_zero(wc->masks.dl_src);
291
0
    case MFF_ETH_DST:
292
0
        return eth_addr_is_zero(wc->masks.dl_dst);
293
0
    case MFF_ETH_TYPE:
294
0
        return !wc->masks.dl_type;
295
296
0
    case MFF_ARP_SHA:
297
0
    case MFF_ND_SLL:
298
0
        return eth_addr_is_zero(wc->masks.arp_sha);
299
300
0
    case MFF_ARP_THA:
301
0
    case MFF_ND_TLL:
302
0
        return eth_addr_is_zero(wc->masks.arp_tha);
303
304
0
    case MFF_VLAN_TCI:
305
0
        return !wc->masks.vlans[0].tci;
306
0
    case MFF_DL_VLAN:
307
0
        return !(wc->masks.vlans[0].tci & htons(VLAN_VID_MASK));
308
0
    case MFF_VLAN_VID:
309
0
        return !(wc->masks.vlans[0].tci & htons(VLAN_VID_MASK | VLAN_CFI));
310
0
    case MFF_DL_VLAN_PCP:
311
0
    case MFF_VLAN_PCP:
312
0
        return !(wc->masks.vlans[0].tci & htons(VLAN_PCP_MASK));
313
314
0
    case MFF_MPLS_LABEL:
315
0
        return !(wc->masks.mpls_lse[0] & htonl(MPLS_LABEL_MASK));
316
0
    case MFF_MPLS_TC:
317
0
        return !(wc->masks.mpls_lse[0] & htonl(MPLS_TC_MASK));
318
0
    case MFF_MPLS_BOS:
319
0
        return !(wc->masks.mpls_lse[0] & htonl(MPLS_BOS_MASK));
320
0
    case MFF_MPLS_TTL:
321
0
        return !(wc->masks.mpls_lse[0] & htonl(MPLS_TTL_MASK));
322
323
0
    case MFF_IPV4_SRC:
324
0
        return !wc->masks.nw_src;
325
0
    case MFF_IPV4_DST:
326
0
        return !wc->masks.nw_dst;
327
328
0
    case MFF_IPV6_SRC:
329
0
        return ipv6_mask_is_any(&wc->masks.ipv6_src);
330
0
    case MFF_IPV6_DST:
331
0
        return ipv6_mask_is_any(&wc->masks.ipv6_dst);
332
333
0
    case MFF_IPV6_LABEL:
334
0
        return !wc->masks.ipv6_label;
335
336
0
    case MFF_IP_PROTO:
337
0
        return !wc->masks.nw_proto;
338
0
    case MFF_IP_DSCP:
339
0
    case MFF_IP_DSCP_SHIFTED:
340
0
        return !(wc->masks.nw_tos & IP_DSCP_MASK);
341
0
    case MFF_IP_ECN:
342
0
        return !(wc->masks.nw_tos & IP_ECN_MASK);
343
0
    case MFF_IP_TTL:
344
0
        return !wc->masks.nw_ttl;
345
346
0
    case MFF_ND_TARGET:
347
0
        return ipv6_mask_is_any(&wc->masks.nd_target);
348
349
0
    case MFF_ND_RESERVED:
350
0
        return !wc->masks.igmp_group_ip4;
351
0
    case MFF_ND_OPTIONS_TYPE:
352
0
        return !wc->masks.tcp_flags;
353
354
0
    case MFF_IP_FRAG:
355
0
        return !(wc->masks.nw_frag & FLOW_NW_FRAG_MASK);
356
357
0
    case MFF_ARP_OP:
358
0
        return !wc->masks.nw_proto;
359
0
    case MFF_ARP_SPA:
360
0
        return !wc->masks.nw_src;
361
0
    case MFF_ARP_TPA:
362
0
        return !wc->masks.nw_dst;
363
364
0
    case MFF_TCP_SRC:
365
0
    case MFF_UDP_SRC:
366
0
    case MFF_SCTP_SRC:
367
0
    case MFF_ICMPV4_TYPE:
368
0
    case MFF_ICMPV6_TYPE:
369
0
        return !wc->masks.tp_src;
370
0
    case MFF_TCP_DST:
371
0
    case MFF_UDP_DST:
372
0
    case MFF_SCTP_DST:
373
0
    case MFF_ICMPV4_CODE:
374
0
    case MFF_ICMPV6_CODE:
375
0
        return !wc->masks.tp_dst;
376
0
    case MFF_TCP_FLAGS:
377
0
        return !wc->masks.tcp_flags;
378
379
0
    case MFF_NSH_FLAGS:
380
0
        return !wc->masks.nsh.flags;
381
0
    case MFF_NSH_TTL:
382
0
        return !wc->masks.nsh.ttl;
383
0
    case MFF_NSH_MDTYPE:
384
0
        return !wc->masks.nsh.mdtype;
385
0
    case MFF_NSH_NP:
386
0
        return !wc->masks.nsh.np;
387
0
    case MFF_NSH_SPI:
388
0
        return !(wc->masks.nsh.path_hdr & htonl(NSH_SPI_MASK));
389
0
    case MFF_NSH_SI:
390
0
        return !(wc->masks.nsh.path_hdr & htonl(NSH_SI_MASK));
391
0
    case MFF_NSH_C1:
392
0
    case MFF_NSH_C2:
393
0
    case MFF_NSH_C3:
394
0
    case MFF_NSH_C4:
395
0
        return !wc->masks.nsh.context[mf->id - MFF_NSH_C1];
396
0
    case MFF_TUN_GTPU_FLAGS:
397
0
        return !wc->masks.tunnel.gtpu_flags;
398
0
    case MFF_TUN_GTPU_MSGTYPE:
399
0
        return !wc->masks.tunnel.gtpu_msgtype;
400
401
0
    case MFF_N_IDS:
402
0
    default:
403
0
        OVS_NOT_REACHED();
404
0
    }
405
0
}
406
407
/* Initializes 'mask' with the wildcard bit pattern for field 'mf' within 'wc'.
408
 * Each bit in 'mask' will be set to 1 if the bit is significant for matching
409
 * purposes, or to 0 if it is wildcarded.
410
 *
411
 * The caller is responsible for ensuring that 'wc' corresponds to a flow that
412
 * meets 'mf''s prerequisites. */
413
void
414
mf_get_mask(const struct mf_field *mf, const struct flow_wildcards *wc,
415
            union mf_value *mask)
416
70.6k
{
417
70.6k
    mf_get_value(mf, &wc->masks, mask);
418
70.6k
}
419
420
/* Tests whether 'mask' is a valid wildcard bit pattern for 'mf'.  Returns true
421
 * if the mask is valid, false otherwise. */
422
bool
423
mf_is_mask_valid(const struct mf_field *mf, const union mf_value *mask)
424
84.0k
{
425
84.0k
    switch (mf->maskable) {
426
15.2k
    case MFM_NONE:
427
15.2k
        return (is_all_zeros(mask, mf->n_bytes) ||
428
15.2k
                is_all_ones(mask, mf->n_bytes));
429
430
68.7k
    case MFM_FULLY:
431
68.7k
        return true;
432
84.0k
    }
433
434
84.0k
    OVS_NOT_REACHED();
435
84.0k
}
436
437
/* Returns true if 'flow' meets the prerequisites for 'mf', false otherwise.
438
 * If a non-NULL 'mask' is passed, zero-valued matches can also be verified.
439
 * Sets inspected bits in 'wc', if non-NULL. */
440
static bool
441
mf_are_prereqs_ok__(const struct mf_field *mf, const struct flow *flow,
442
                    const struct flow_wildcards *mask,
443
                    struct flow_wildcards *wc)
444
64.6k
{
445
64.6k
    ovs_be16 dl_type = get_dl_type(flow);
446
447
64.6k
    switch (mf->prereqs) {
448
52.5k
    case MFP_NONE:
449
52.5k
        return true;
450
3.49k
    case MFP_ETHERNET:
451
3.49k
        return is_ethernet(flow, wc);
452
272
    case MFP_ARP:
453
272
        return (dl_type == htons(ETH_TYPE_ARP) ||
454
272
                dl_type == htons(ETH_TYPE_RARP));
455
419
    case MFP_IPV4:
456
419
        return dl_type == htons(ETH_TYPE_IP);
457
70
    case MFP_IPV6:
458
70
        return dl_type == htons(ETH_TYPE_IPV6);
459
158
    case MFP_VLAN_VID:
460
158
        return is_vlan(flow, wc);
461
302
    case MFP_MPLS:
462
302
        return eth_type_mpls(dl_type);
463
2.34k
    case MFP_IP_ANY:
464
2.34k
        return is_ip_any(flow);
465
797
    case MFP_NSH:
466
797
        return dl_type == htons(ETH_TYPE_NSH);
467
627
    case MFP_CT_VALID:
468
627
        return is_ct_valid(flow, mask, wc);
469
899
    case MFP_TCP:
470
        /* Matching !FRAG_LATER is not enforced (mask is not checked). */
471
899
        return is_tcp(flow, wc) && !(flow->nw_frag & FLOW_NW_FRAG_LATER);
472
873
    case MFP_UDP:
473
873
        return is_udp(flow, wc) && !(flow->nw_frag & FLOW_NW_FRAG_LATER);
474
672
    case MFP_SCTP:
475
672
        return is_sctp(flow, wc) && !(flow->nw_frag & FLOW_NW_FRAG_LATER);
476
310
    case MFP_ICMPV4:
477
310
        return is_icmpv4(flow, wc);
478
213
    case MFP_ICMPV6:
479
213
        return is_icmpv6(flow, wc);
480
275
    case MFP_ND:
481
275
        return is_nd(flow, wc);
482
95
    case MFP_ND_SOLICIT:
483
95
        return is_nd(flow, wc) && flow->tp_src == htons(ND_NEIGHBOR_SOLICIT);
484
290
    case MFP_ND_ADVERT:
485
290
        return is_nd(flow, wc) && flow->tp_src == htons(ND_NEIGHBOR_ADVERT);
486
64.6k
    }
487
488
64.6k
    OVS_NOT_REACHED();
489
64.6k
}
490
491
/* Returns true if 'flow' meets the prerequisites for 'mf', false otherwise.
492
 * Sets inspected bits in 'wc', if non-NULL. */
493
bool
494
mf_are_prereqs_ok(const struct mf_field *mf, const struct flow *flow,
495
                  struct flow_wildcards *wc)
496
22.3k
{
497
22.3k
    return mf_are_prereqs_ok__(mf, flow, NULL, wc);
498
22.3k
}
499
500
/* Returns true if 'match' meets the prerequisites for 'mf', false otherwise.
501
 */
502
bool
503
mf_are_match_prereqs_ok(const struct mf_field *mf, const struct match *match)
504
42.3k
{
505
42.3k
    return mf_are_prereqs_ok__(mf, &match->flow, &match->wc, NULL);
506
42.3k
}
507
508
/* Returns true if 'value' may be a valid value *as part of a masked match*,
509
 * false otherwise.
510
 *
511
 * A value is not rejected just because it is not valid for the field in
512
 * question, but only if it doesn't make sense to test the bits in question at
513
 * all.  For example, the MFF_VLAN_TCI field will never have a nonzero value
514
 * without the VLAN_CFI bit being set, but we can't reject those values because
515
 * it is still legitimate to test just for those bits (see the documentation
516
 * for NXM_OF_VLAN_TCI in meta-flow.h).  On the other hand, there is never a
517
 * reason to set the low bit of MFF_IP_DSCP to 1, so we reject that. */
518
bool
519
mf_is_value_valid(const struct mf_field *mf, const union mf_value *value)
520
36.5k
{
521
36.5k
    switch (mf->id) {
522
0
    case MFF_DP_HASH:
523
0
    case MFF_RECIRC_ID:
524
0
    case MFF_PACKET_TYPE:
525
0
    case MFF_CONJ_ID:
526
186
    case MFF_TUN_ID:
527
380
    case MFF_TUN_SRC:
528
519
    case MFF_TUN_DST:
529
562
    case MFF_TUN_IPV6_SRC:
530
614
    case MFF_TUN_IPV6_DST:
531
614
    case MFF_TUN_TOS:
532
614
    case MFF_TUN_TTL:
533
632
    case MFF_TUN_GBP_ID:
534
813
    case MFF_TUN_GBP_FLAGS:
535
813
    case MFF_TUN_ERSPAN_IDX:
536
813
    case MFF_TUN_ERSPAN_VER:
537
813
    case MFF_TUN_ERSPAN_DIR:
538
813
    case MFF_TUN_ERSPAN_HWID:
539
813
    case MFF_TUN_GTPU_FLAGS:
540
813
    case MFF_TUN_GTPU_MSGTYPE:
541
511k
    CASE_MFF_TUN_METADATA:
542
511k
    case MFF_METADATA:
543
15.2k
    case MFF_IN_PORT:
544
15.2k
    case MFF_SKB_PRIORITY:
545
15.4k
    case MFF_PKT_MARK:
546
15.4k
    case MFF_CT_ZONE:
547
15.9k
    case MFF_CT_MARK:
548
16.0k
    case MFF_CT_LABEL:
549
16.0k
    case MFF_CT_NW_PROTO:
550
16.0k
    case MFF_CT_NW_SRC:
551
16.0k
    case MFF_CT_NW_DST:
552
16.0k
    case MFF_CT_IPV6_SRC:
553
16.0k
    case MFF_CT_IPV6_DST:
554
16.0k
    case MFF_CT_TP_SRC:
555
16.0k
    case MFF_CT_TP_DST:
556
289k
    CASE_MFF_REGS:
557
289k
    CASE_MFF_XREGS:
558
167k
    CASE_MFF_XXREGS:
559
91.0k
    case MFF_ETH_SRC:
560
24.1k
    case MFF_ETH_DST:
561
24.1k
    case MFF_ETH_TYPE:
562
26.1k
    case MFF_VLAN_TCI:
563
26.2k
    case MFF_MPLS_TTL:
564
26.4k
    case MFF_IPV4_SRC:
565
26.6k
    case MFF_IPV4_DST:
566
26.7k
    case MFF_IPV6_SRC:
567
26.7k
    case MFF_IPV6_DST:
568
26.7k
    case MFF_IP_PROTO:
569
26.9k
    case MFF_IP_TTL:
570
27.1k
    case MFF_ARP_SPA:
571
27.3k
    case MFF_ARP_TPA:
572
27.4k
    case MFF_ARP_SHA:
573
27.5k
    case MFF_ARP_THA:
574
27.7k
    case MFF_TCP_SRC:
575
28.0k
    case MFF_TCP_DST:
576
28.6k
    case MFF_UDP_SRC:
577
28.8k
    case MFF_UDP_DST:
578
29.2k
    case MFF_SCTP_SRC:
579
29.5k
    case MFF_SCTP_DST:
580
29.7k
    case MFF_ICMPV4_TYPE:
581
29.9k
    case MFF_ICMPV4_CODE:
582
30.0k
    case MFF_ICMPV6_TYPE:
583
30.2k
    case MFF_ICMPV6_CODE:
584
30.2k
    case MFF_ND_TARGET:
585
30.3k
    case MFF_ND_SLL:
586
30.7k
    case MFF_ND_TLL:
587
30.7k
    case MFF_ND_RESERVED:
588
30.7k
    case MFF_ND_OPTIONS_TYPE:
589
30.7k
        return true;
590
591
0
    case MFF_IN_PORT_OXM:
592
0
    case MFF_ACTSET_OUTPUT: {
593
0
        ofp_port_t port;
594
0
        return !ofputil_port_from_ofp11(value->be32, &port);
595
0
    }
596
597
204
    case MFF_IP_DSCP:
598
204
        return !(value->u8 & ~IP_DSCP_MASK);
599
187
    case MFF_IP_DSCP_SHIFTED:
600
187
        return !(value->u8 & (~IP_DSCP_MASK >> 2));
601
1.99k
    case MFF_IP_ECN:
602
1.99k
        return !(value->u8 & ~IP_ECN_MASK);
603
0
    case MFF_IP_FRAG:
604
0
        return !(value->u8 & ~FLOW_NW_FRAG_MASK);
605
0
    case MFF_TCP_FLAGS:
606
0
        return !(value->be16 & ~htons(0x0fff));
607
608
34
    case MFF_ARP_OP:
609
34
        return !(value->be16 & htons(0xff00));
610
611
85
    case MFF_DL_VLAN:
612
85
        return !(value->be16 & htons(VLAN_CFI | VLAN_PCP_MASK));
613
330
    case MFF_VLAN_VID:
614
330
        return !(value->be16 & htons(VLAN_PCP_MASK));
615
616
253
    case MFF_DL_VLAN_PCP:
617
392
    case MFF_VLAN_PCP:
618
392
        return !(value->u8 & ~(VLAN_PCP_MASK >> VLAN_PCP_SHIFT));
619
620
42
    case MFF_IPV6_LABEL:
621
42
        return !(value->be32 & ~htonl(IPV6_LABEL_MASK));
622
623
69
    case MFF_MPLS_LABEL:
624
69
        return !(value->be32 & ~htonl(MPLS_LABEL_MASK >> MPLS_LABEL_SHIFT));
625
626
216
    case MFF_MPLS_TC:
627
216
        return !(value->u8 & ~(MPLS_TC_MASK >> MPLS_TC_SHIFT));
628
629
0
    case MFF_MPLS_BOS:
630
0
        return !(value->u8 & ~(MPLS_BOS_MASK >> MPLS_BOS_SHIFT));
631
632
327
    case MFF_TUN_FLAGS:
633
327
        return !(value->be16 & ~htons(FLOW_TNL_PUB_F_MASK));
634
635
0
    case MFF_CT_STATE:
636
0
        return !(value->be32 & ~htonl(CS_SUPPORTED_MASK));
637
638
34
    case MFF_NSH_FLAGS:
639
34
        return true;
640
194
    case MFF_NSH_TTL:
641
194
        return (value->u8 <= 63);
642
0
    case MFF_NSH_MDTYPE:
643
0
        return (value->u8 == 1 || value->u8 == 2);
644
0
    case MFF_NSH_NP:
645
0
        return true;
646
227
    case MFF_NSH_SPI:
647
227
        return !(value->be32 & htonl(0xFF000000));
648
57
    case MFF_NSH_SI:
649
517
    case MFF_NSH_C1:
650
770
    case MFF_NSH_C2:
651
1.17k
    case MFF_NSH_C3:
652
1.48k
    case MFF_NSH_C4:
653
1.48k
        return true;
654
655
0
    case MFF_N_IDS:
656
0
    default:
657
0
        OVS_NOT_REACHED();
658
36.5k
    }
659
36.5k
}
660
661
/* Copies the value of field 'mf' from 'flow' into 'value'.  The caller is
662
 * responsible for ensuring that 'flow' meets 'mf''s prerequisites. */
663
void
664
mf_get_value(const struct mf_field *mf, const struct flow *flow,
665
             union mf_value *value)
666
141k
{
667
141k
    switch (mf->id) {
668
794
    case MFF_DP_HASH:
669
794
        value->be32 = htonl(flow->dp_hash);
670
794
        break;
671
3.02k
    case MFF_RECIRC_ID:
672
3.02k
        value->be32 = htonl(flow->recirc_id);
673
3.02k
        break;
674
2.22k
    case MFF_PACKET_TYPE:
675
2.22k
        value->be32 = flow->packet_type;
676
2.22k
        break;
677
190
    case MFF_CONJ_ID:
678
190
        value->be32 = htonl(flow->conj_id);
679
190
        break;
680
1.13k
    case MFF_TUN_ID:
681
1.13k
        value->be64 = flow->tunnel.tun_id;
682
1.13k
        break;
683
636
    case MFF_TUN_SRC:
684
636
        value->be32 = flow->tunnel.ip_src;
685
636
        break;
686
518
    case MFF_TUN_DST:
687
518
        value->be32 = flow->tunnel.ip_dst;
688
518
        break;
689
124
    case MFF_TUN_IPV6_SRC:
690
124
        value->ipv6 = flow->tunnel.ipv6_src;
691
124
        break;
692
104
    case MFF_TUN_IPV6_DST:
693
104
        value->ipv6 = flow->tunnel.ipv6_dst;
694
104
        break;
695
452
    case MFF_TUN_FLAGS:
696
452
        value->be16 = htons(flow->tunnel.flags & FLOW_TNL_PUB_F_MASK);
697
452
        break;
698
952
    case MFF_TUN_GBP_ID:
699
952
        value->be16 = flow->tunnel.gbp_id;
700
952
        break;
701
1.20k
    case MFF_TUN_GBP_FLAGS:
702
1.20k
        value->u8 = flow->tunnel.gbp_flags;
703
1.20k
        break;
704
1.10k
    case MFF_TUN_TTL:
705
1.10k
        value->u8 = flow->tunnel.ip_ttl;
706
1.10k
        break;
707
470
    case MFF_TUN_TOS:
708
470
        value->u8 = flow->tunnel.ip_tos;
709
470
        break;
710
256
    case MFF_TUN_ERSPAN_VER:
711
256
        value->u8 = flow->tunnel.erspan_ver;
712
256
        break;
713
518
    case MFF_TUN_ERSPAN_IDX:
714
518
        value->be32 = htonl(flow->tunnel.erspan_idx);
715
518
        break;
716
36
    case MFF_TUN_ERSPAN_DIR:
717
36
        value->u8 = flow->tunnel.erspan_dir;
718
36
        break;
719
0
    case MFF_TUN_ERSPAN_HWID:
720
0
        value->u8 = flow->tunnel.erspan_hwid;
721
0
        break;
722
816
    case MFF_TUN_GTPU_FLAGS:
723
816
        value->u8 = flow->tunnel.gtpu_flags;
724
816
        break;
725
0
    case MFF_TUN_GTPU_MSGTYPE:
726
0
        value->u8 = flow->tunnel.gtpu_msgtype;
727
0
        break;
728
60.9k
    CASE_MFF_TUN_METADATA:
729
60.9k
        tun_metadata_read(&flow->tunnel, mf, value);
730
60.9k
        break;
731
732
790
    case MFF_METADATA:
733
790
        value->be64 = flow->metadata;
734
790
        break;
735
736
608
    case MFF_IN_PORT:
737
608
        value->be16 = htons(ofp_to_u16(flow->in_port.ofp_port));
738
608
        break;
739
1.19k
    case MFF_IN_PORT_OXM:
740
1.19k
        value->be32 = ofputil_port_to_ofp11(flow->in_port.ofp_port);
741
1.19k
        break;
742
630
    case MFF_ACTSET_OUTPUT:
743
630
        value->be32 = ofputil_port_to_ofp11(flow->actset_output);
744
630
        break;
745
746
0
    case MFF_SKB_PRIORITY:
747
0
        value->be32 = htonl(flow->skb_priority);
748
0
        break;
749
750
442
    case MFF_PKT_MARK:
751
442
        value->be32 = htonl(flow->pkt_mark);
752
442
        break;
753
754
298
    case MFF_CT_STATE:
755
298
        value->be32 = htonl(flow->ct_state);
756
298
        break;
757
758
600
    case MFF_CT_ZONE:
759
600
        value->be16 = htons(flow->ct_zone);
760
600
        break;
761
762
72
    case MFF_CT_MARK:
763
72
        value->be32 = htonl(flow->ct_mark);
764
72
        break;
765
766
300
    case MFF_CT_LABEL:
767
300
        value->be128 = hton128(flow->ct_label);
768
300
        break;
769
770
890
    case MFF_CT_NW_PROTO:
771
890
        value->u8 = flow->ct_nw_proto;
772
890
        break;
773
774
1.70k
    case MFF_CT_NW_SRC:
775
1.70k
        value->be32 = flow->ct_nw_src;
776
1.70k
        break;
777
778
878
    case MFF_CT_NW_DST:
779
878
        value->be32 = flow->ct_nw_dst;
780
878
        break;
781
782
574
    case MFF_CT_IPV6_SRC:
783
574
        value->ipv6 = flow->ct_ipv6_src;
784
574
        break;
785
786
294
    case MFF_CT_IPV6_DST:
787
294
        value->ipv6 = flow->ct_ipv6_dst;
788
294
        break;
789
790
1.58k
    case MFF_CT_TP_SRC:
791
1.58k
        value->be16 = flow->ct_tp_src;
792
1.58k
        break;
793
794
824
    case MFF_CT_TP_DST:
795
824
        value->be16 = flow->ct_tp_dst;
796
824
        break;
797
798
11.3k
    CASE_MFF_REGS:
799
11.3k
        value->be32 = htonl(flow->regs[mf->id - MFF_REG0]);
800
11.3k
        break;
801
802
4.84k
    CASE_MFF_XREGS:
803
4.84k
        value->be64 = htonll(flow_get_xreg(flow, mf->id - MFF_XREG0));
804
4.84k
        break;
805
806
2.12k
    CASE_MFF_XXREGS:
807
2.12k
        value->be128 = hton128(flow_get_xxreg(flow, mf->id - MFF_XXREG0));
808
2.12k
        break;
809
810
748
    case MFF_ETH_SRC:
811
748
        value->mac = flow->dl_src;
812
748
        break;
813
814
610
    case MFF_ETH_DST:
815
610
        value->mac = flow->dl_dst;
816
610
        break;
817
818
812
    case MFF_ETH_TYPE:
819
812
        value->be16 = flow->dl_type;
820
812
        break;
821
822
1.13k
    case MFF_VLAN_TCI:
823
1.13k
        value->be16 = flow->vlans[0].tci;
824
1.13k
        break;
825
826
268
    case MFF_DL_VLAN:
827
268
        value->be16 = flow->vlans[0].tci & htons(VLAN_VID_MASK);
828
268
        break;
829
236
    case MFF_VLAN_VID:
830
236
        value->be16 = flow->vlans[0].tci & htons(VLAN_VID_MASK | VLAN_CFI);
831
236
        break;
832
833
444
    case MFF_DL_VLAN_PCP:
834
938
    case MFF_VLAN_PCP:
835
938
        value->u8 = vlan_tci_to_pcp(flow->vlans[0].tci);
836
938
        break;
837
838
448
    case MFF_MPLS_LABEL:
839
448
        value->be32 = htonl(mpls_lse_to_label(flow->mpls_lse[0]));
840
448
        break;
841
842
396
    case MFF_MPLS_TC:
843
396
        value->u8 = mpls_lse_to_tc(flow->mpls_lse[0]);
844
396
        break;
845
846
210
    case MFF_MPLS_BOS:
847
210
        value->u8 = mpls_lse_to_bos(flow->mpls_lse[0]);
848
210
        break;
849
850
572
    case MFF_MPLS_TTL:
851
572
        value->u8 = mpls_lse_to_ttl(flow->mpls_lse[0]);
852
572
        break;
853
854
680
    case MFF_IPV4_SRC:
855
680
        value->be32 = flow->nw_src;
856
680
        break;
857
858
744
    case MFF_IPV4_DST:
859
744
        value->be32 = flow->nw_dst;
860
744
        break;
861
862
544
    case MFF_IPV6_SRC:
863
544
        value->ipv6 = flow->ipv6_src;
864
544
        break;
865
866
348
    case MFF_IPV6_DST:
867
348
        value->ipv6 = flow->ipv6_dst;
868
348
        break;
869
870
1.27k
    case MFF_IPV6_LABEL:
871
1.27k
        value->be32 = flow->ipv6_label;
872
1.27k
        break;
873
874
1.34k
    case MFF_IP_PROTO:
875
1.34k
        value->u8 = flow->nw_proto;
876
1.34k
        break;
877
878
858
    case MFF_IP_DSCP:
879
858
        value->u8 = flow->nw_tos & IP_DSCP_MASK;
880
858
        break;
881
882
76
    case MFF_IP_DSCP_SHIFTED:
883
76
        value->u8 = flow->nw_tos >> 2;
884
76
        break;
885
886
388
    case MFF_IP_ECN:
887
388
        value->u8 = flow->nw_tos & IP_ECN_MASK;
888
388
        break;
889
890
202
    case MFF_IP_TTL:
891
202
        value->u8 = flow->nw_ttl;
892
202
        break;
893
894
510
    case MFF_IP_FRAG:
895
510
        value->u8 = flow->nw_frag;
896
510
        break;
897
898
464
    case MFF_ARP_OP:
899
464
        value->be16 = htons(flow->nw_proto);
900
464
        break;
901
902
764
    case MFF_ARP_SPA:
903
764
        value->be32 = flow->nw_src;
904
764
        break;
905
906
1.31k
    case MFF_ARP_TPA:
907
1.31k
        value->be32 = flow->nw_dst;
908
1.31k
        break;
909
910
742
    case MFF_ARP_SHA:
911
1.18k
    case MFF_ND_SLL:
912
1.18k
        value->mac = flow->arp_sha;
913
1.18k
        break;
914
915
596
    case MFF_ARP_THA:
916
1.23k
    case MFF_ND_TLL:
917
1.23k
        value->mac = flow->arp_tha;
918
1.23k
        break;
919
920
242
    case MFF_TCP_SRC:
921
1.60k
    case MFF_UDP_SRC:
922
2.08k
    case MFF_SCTP_SRC:
923
2.08k
        value->be16 = flow->tp_src;
924
2.08k
        break;
925
926
524
    case MFF_TCP_DST:
927
928
    case MFF_UDP_DST:
928
1.37k
    case MFF_SCTP_DST:
929
1.37k
        value->be16 = flow->tp_dst;
930
1.37k
        break;
931
932
294
    case MFF_TCP_FLAGS:
933
294
    case MFF_ND_OPTIONS_TYPE:
934
294
        value->be16 = flow->tcp_flags;
935
294
        break;
936
937
0
    case MFF_ND_RESERVED:
938
0
        value->be32 = flow->igmp_group_ip4;
939
0
        break;
940
941
828
    case MFF_ICMPV4_TYPE:
942
1.09k
    case MFF_ICMPV6_TYPE:
943
1.09k
        value->u8 = ntohs(flow->tp_src);
944
1.09k
        break;
945
946
656
    case MFF_ICMPV4_CODE:
947
1.28k
    case MFF_ICMPV6_CODE:
948
1.28k
        value->u8 = ntohs(flow->tp_dst);
949
1.28k
        break;
950
951
360
    case MFF_ND_TARGET:
952
360
        value->ipv6 = flow->nd_target;
953
360
        break;
954
955
2.26k
    case MFF_NSH_FLAGS:
956
2.26k
        value->u8 = flow->nsh.flags;
957
2.26k
        break;
958
730
    case MFF_NSH_TTL:
959
730
        value->u8 = flow->nsh.ttl;
960
730
        break;
961
34
    case MFF_NSH_MDTYPE:
962
34
        value->u8 = flow->nsh.mdtype;
963
34
        break;
964
804
    case MFF_NSH_NP:
965
804
        value->u8 = flow->nsh.np;
966
804
        break;
967
1.83k
    case MFF_NSH_SPI:
968
1.83k
        value->be32 = nsh_path_hdr_to_spi(flow->nsh.path_hdr);
969
1.83k
        if (value->be32 == htonl(NSH_SPI_MASK >> NSH_SPI_SHIFT)) {
970
308
            value->be32 = OVS_BE32_MAX;
971
308
        }
972
1.83k
        break;
973
848
    case MFF_NSH_SI:
974
848
        value->u8 = nsh_path_hdr_to_si(flow->nsh.path_hdr);
975
848
        break;
976
646
    case MFF_NSH_C1:
977
1.89k
    case MFF_NSH_C2:
978
2.77k
    case MFF_NSH_C3:
979
4.48k
    case MFF_NSH_C4:
980
4.48k
        value->be32 = flow->nsh.context[mf->id - MFF_NSH_C1];
981
4.48k
        break;
982
983
0
    case MFF_N_IDS:
984
0
    default:
985
0
        OVS_NOT_REACHED();
986
141k
    }
987
141k
}
988
989
/* Makes 'match' match field 'mf' exactly, with the value matched taken from
990
 * 'value'.  The caller is responsible for ensuring that 'match' meets 'mf''s
991
 * prerequisites.
992
 *
993
 * If non-NULL, 'err_str' returns a malloc'ed string describing any errors
994
 * with the request or NULL if there is no error. The caller is reponsible
995
 * for freeing the string. */
996
void
997
mf_set_value(const struct mf_field *mf,
998
             const union mf_value *value, struct match *match, char **err_str)
999
53.0k
{
1000
53.0k
    if (err_str) {
1001
31.0k
        *err_str = NULL;
1002
31.0k
    }
1003
1004
53.0k
    switch (mf->id) {
1005
215
    case MFF_DP_HASH:
1006
215
        match_set_dp_hash(match, ntohl(value->be32));
1007
215
        break;
1008
321
    case MFF_RECIRC_ID:
1009
321
        match_set_recirc_id(match, ntohl(value->be32));
1010
321
        break;
1011
1.20k
    case MFF_PACKET_TYPE:
1012
1.20k
        match_set_packet_type(match, value->be32);
1013
1.20k
        break;
1014
72
    case MFF_CONJ_ID:
1015
72
        match_set_conj_id(match, ntohl(value->be32));
1016
72
        break;
1017
434
    case MFF_TUN_ID:
1018
434
        match_set_tun_id(match, value->be64);
1019
434
        break;
1020
67
    case MFF_TUN_SRC:
1021
67
        match_set_tun_src(match, value->be32);
1022
67
        break;
1023
91
    case MFF_TUN_DST:
1024
91
        match_set_tun_dst(match, value->be32);
1025
91
        break;
1026
225
    case MFF_TUN_IPV6_SRC:
1027
225
        match_set_tun_ipv6_src(match, &value->ipv6);
1028
225
        break;
1029
18
    case MFF_TUN_IPV6_DST:
1030
18
        match_set_tun_ipv6_dst(match, &value->ipv6);
1031
18
        break;
1032
357
    case MFF_TUN_FLAGS:
1033
357
        match_set_tun_flags(match, ntohs(value->be16));
1034
357
        break;
1035
319
    case MFF_TUN_GBP_ID:
1036
319
         match_set_tun_gbp_id(match, value->be16);
1037
319
         break;
1038
20
    case MFF_TUN_GBP_FLAGS:
1039
20
         match_set_tun_gbp_flags(match, value->u8);
1040
20
         break;
1041
182
    case MFF_TUN_TOS:
1042
182
        match_set_tun_tos(match, value->u8);
1043
182
        break;
1044
94
    case MFF_TUN_TTL:
1045
94
        match_set_tun_ttl(match, value->u8);
1046
94
        break;
1047
0
    case MFF_TUN_ERSPAN_VER:
1048
0
        match_set_tun_erspan_ver(match, value->u8);
1049
0
        break;
1050
0
    case MFF_TUN_ERSPAN_IDX:
1051
0
        match_set_tun_erspan_idx(match, ntohl(value->be32));
1052
0
        break;
1053
0
    case MFF_TUN_ERSPAN_DIR:
1054
0
        match_set_tun_erspan_dir(match, value->u8);
1055
0
        break;
1056
0
    case MFF_TUN_ERSPAN_HWID:
1057
0
        match_set_tun_erspan_hwid(match, value->u8);
1058
0
        break;
1059
45
    case MFF_TUN_GTPU_FLAGS:
1060
45
        match_set_tun_gtpu_flags(match, value->u8);
1061
45
        break;
1062
0
    case MFF_TUN_GTPU_MSGTYPE:
1063
0
        match_set_tun_gtpu_msgtype(match, value->u8);
1064
0
        break;
1065
17.6k
    CASE_MFF_TUN_METADATA:
1066
17.6k
        tun_metadata_set_match(mf, value, NULL, match, err_str);
1067
17.6k
        break;
1068
1069
200
    case MFF_METADATA:
1070
200
        match_set_metadata(match, value->be64);
1071
200
        break;
1072
1073
137
    case MFF_IN_PORT:
1074
137
        match_set_in_port(match, u16_to_ofp(ntohs(value->be16)));
1075
137
        break;
1076
1077
338
    case MFF_IN_PORT_OXM: {
1078
338
        ofp_port_t port;
1079
338
        ofputil_port_from_ofp11(value->be32, &port);
1080
338
        match_set_in_port(match, port);
1081
338
        break;
1082
605k
    }
1083
416
    case MFF_ACTSET_OUTPUT: {
1084
416
        ofp_port_t port;
1085
416
        ofputil_port_from_ofp11(value->be32, &port);
1086
416
        match_set_actset_output(match, port);
1087
416
        break;
1088
605k
    }
1089
1090
0
    case MFF_SKB_PRIORITY:
1091
0
        match_set_skb_priority(match, ntohl(value->be32));
1092
0
        break;
1093
1094
401
    case MFF_PKT_MARK:
1095
401
        match_set_pkt_mark(match, ntohl(value->be32));
1096
401
        break;
1097
1098
549
    case MFF_CT_STATE:
1099
549
        match_set_ct_state(match, ntohl(value->be32));
1100
549
        break;
1101
1102
124
    case MFF_CT_ZONE:
1103
124
        match_set_ct_zone(match, ntohs(value->be16));
1104
124
        break;
1105
1106
79
    case MFF_CT_MARK:
1107
79
        match_set_ct_mark(match, ntohl(value->be32));
1108
79
        break;
1109
1110
210
    case MFF_CT_LABEL:
1111
210
        match_set_ct_label(match, ntoh128(value->be128));
1112
210
        break;
1113
1114
276
    case MFF_CT_NW_PROTO:
1115
276
        match_set_ct_nw_proto(match, value->u8);
1116
276
        break;
1117
1118
701
    case MFF_CT_NW_SRC:
1119
701
        match_set_ct_nw_src(match, value->be32);
1120
701
        break;
1121
1122
243
    case MFF_CT_NW_DST:
1123
243
        match_set_ct_nw_dst(match, value->be32);
1124
243
        break;
1125
1126
295
    case MFF_CT_IPV6_SRC:
1127
295
        match_set_ct_ipv6_src(match, &value->ipv6);
1128
295
        break;
1129
1130
272
    case MFF_CT_IPV6_DST:
1131
272
        match_set_ct_ipv6_dst(match, &value->ipv6);
1132
272
        break;
1133
1134
638
    case MFF_CT_TP_SRC:
1135
638
        match_set_ct_tp_src(match, value->be16);
1136
638
        break;
1137
1138
377
    case MFF_CT_TP_DST:
1139
377
        match_set_ct_tp_dst(match, value->be16);
1140
377
        break;
1141
1142
5.53k
    CASE_MFF_REGS:
1143
5.53k
        match_set_reg(match, mf->id - MFF_REG0, ntohl(value->be32));
1144
5.53k
        break;
1145
1146
3.63k
    CASE_MFF_XREGS:
1147
3.63k
        match_set_xreg(match, mf->id - MFF_XREG0, ntohll(value->be64));
1148
3.63k
        break;
1149
1150
1.49k
    CASE_MFF_XXREGS:
1151
1.49k
        match_set_xxreg(match, mf->id - MFF_XXREG0, ntoh128(value->be128));
1152
1.49k
        break;
1153
1154
274
    case MFF_ETH_SRC:
1155
274
        match_set_dl_src(match, value->mac);
1156
274
        break;
1157
1158
68
    case MFF_ETH_DST:
1159
68
        match_set_dl_dst(match, value->mac);
1160
68
        break;
1161
1162
394
    case MFF_ETH_TYPE:
1163
394
        match_set_dl_type(match, value->be16);
1164
394
        break;
1165
1166
212
    case MFF_VLAN_TCI:
1167
212
        match_set_dl_tci(match, value->be16);
1168
212
        break;
1169
1170
391
    case MFF_DL_VLAN:
1171
391
        match_set_dl_vlan(match, value->be16, 0);
1172
391
        break;
1173
184
    case MFF_VLAN_VID:
1174
184
        match_set_vlan_vid(match, value->be16);
1175
184
        break;
1176
1177
384
    case MFF_DL_VLAN_PCP:
1178
807
    case MFF_VLAN_PCP:
1179
807
        match_set_dl_vlan_pcp(match, value->u8, 0);
1180
807
        break;
1181
1182
133
    case MFF_MPLS_LABEL:
1183
133
        match_set_mpls_label(match, 0, value->be32);
1184
133
        break;
1185
1186
260
    case MFF_MPLS_TC:
1187
260
        match_set_mpls_tc(match, 0, value->u8);
1188
260
        break;
1189
1190
252
    case MFF_MPLS_BOS:
1191
252
        match_set_mpls_bos(match, 0, value->u8);
1192
252
        break;
1193
1194
402
    case MFF_MPLS_TTL:
1195
402
        match_set_mpls_ttl(match, 0, value->u8);
1196
402
        break;
1197
1198
321
    case MFF_IPV4_SRC:
1199
321
        match_set_nw_src(match, value->be32);
1200
321
        break;
1201
1202
224
    case MFF_IPV4_DST:
1203
224
        match_set_nw_dst(match, value->be32);
1204
224
        break;
1205
1206
335
    case MFF_IPV6_SRC:
1207
335
        match_set_ipv6_src(match, &value->ipv6);
1208
335
        break;
1209
1210
183
    case MFF_IPV6_DST:
1211
183
        match_set_ipv6_dst(match, &value->ipv6);
1212
183
        break;
1213
1214
499
    case MFF_IPV6_LABEL:
1215
499
        match_set_ipv6_label(match, value->be32);
1216
499
        break;
1217
1218
456
    case MFF_IP_PROTO:
1219
456
        match_set_nw_proto(match, value->u8);
1220
456
        break;
1221
1222
291
    case MFF_IP_DSCP:
1223
291
        match_set_nw_dscp(match, value->u8);
1224
291
        break;
1225
1226
18
    case MFF_IP_DSCP_SHIFTED:
1227
18
        match_set_nw_dscp(match, value->u8 << 2);
1228
18
        break;
1229
1230
186
    case MFF_IP_ECN:
1231
186
        match_set_nw_ecn(match, value->u8);
1232
186
        break;
1233
1234
234
    case MFF_IP_TTL:
1235
234
        match_set_nw_ttl(match, value->u8);
1236
234
        break;
1237
1238
261
    case MFF_IP_FRAG:
1239
261
        match_set_nw_frag(match, value->u8);
1240
261
        break;
1241
1242
120
    case MFF_ARP_OP:
1243
120
        match_set_nw_proto(match, ntohs(value->be16));
1244
120
        break;
1245
1246
101
    case MFF_ARP_SPA:
1247
101
        match_set_nw_src(match, value->be32);
1248
101
        break;
1249
1250
394
    case MFF_ARP_TPA:
1251
394
        match_set_nw_dst(match, value->be32);
1252
394
        break;
1253
1254
147
    case MFF_ARP_SHA:
1255
335
    case MFF_ND_SLL:
1256
335
        match_set_arp_sha(match, value->mac);
1257
335
        break;
1258
1259
253
    case MFF_ARP_THA:
1260
437
    case MFF_ND_TLL:
1261
437
        match_set_arp_tha(match, value->mac);
1262
437
        break;
1263
1264
304
    case MFF_TCP_SRC:
1265
581
    case MFF_UDP_SRC:
1266
794
    case MFF_SCTP_SRC:
1267
794
        match_set_tp_src(match, value->be16);
1268
794
        break;
1269
1270
462
    case MFF_TCP_DST:
1271
794
    case MFF_UDP_DST:
1272
1.12k
    case MFF_SCTP_DST:
1273
1.12k
        match_set_tp_dst(match, value->be16);
1274
1.12k
        break;
1275
1276
677
    case MFF_TCP_FLAGS:
1277
677
        match_set_tcp_flags(match, value->be16);
1278
677
        break;
1279
1280
284
    case MFF_ICMPV4_TYPE:
1281
388
    case MFF_ICMPV6_TYPE:
1282
388
        match_set_icmp_type(match, value->u8);
1283
388
        break;
1284
1285
200
    case MFF_ICMPV4_CODE:
1286
268
    case MFF_ICMPV6_CODE:
1287
268
        match_set_icmp_code(match, value->u8);
1288
268
        break;
1289
1290
125
    case MFF_ND_TARGET:
1291
125
        match_set_nd_target(match, &value->ipv6);
1292
125
        break;
1293
1294
0
    case MFF_ND_RESERVED:
1295
0
        match_set_nd_reserved(match, value->be32);
1296
0
        break;
1297
1298
0
    case MFF_ND_OPTIONS_TYPE:
1299
0
        match_set_nd_options_type(match, value->u8);
1300
0
        break;
1301
1302
480
    case MFF_NSH_FLAGS:
1303
480
        MATCH_SET_FIELD_UINT8(match, nsh.flags, value->u8);
1304
480
        break;
1305
176
    case MFF_NSH_TTL:
1306
176
        MATCH_SET_FIELD_UINT8(match, nsh.ttl, value->u8);
1307
176
        break;
1308
42
    case MFF_NSH_MDTYPE:
1309
42
        MATCH_SET_FIELD_UINT8(match, nsh.mdtype, value->u8);
1310
42
        break;
1311
610
    case MFF_NSH_NP:
1312
610
        MATCH_SET_FIELD_UINT8(match, nsh.np, value->u8);
1313
610
        break;
1314
997
    case MFF_NSH_SPI:
1315
997
        match->wc.masks.nsh.path_hdr |= htonl(NSH_SPI_MASK);
1316
997
        nsh_path_hdr_set_spi(&match->flow.nsh.path_hdr, value->be32);
1317
997
        break;
1318
365
    case MFF_NSH_SI:
1319
365
        match->wc.masks.nsh.path_hdr |= htonl(NSH_SI_MASK);
1320
365
        nsh_path_hdr_set_si(&match->flow.nsh.path_hdr, value->u8);
1321
365
        break;
1322
281
    case MFF_NSH_C1:
1323
899
    case MFF_NSH_C2:
1324
1.35k
    case MFF_NSH_C3:
1325
2.04k
    case MFF_NSH_C4:
1326
2.04k
        MATCH_SET_FIELD_BE32(match, nsh.context[mf->id - MFF_NSH_C1],
1327
2.04k
                             value->be32);
1328
2.04k
        break;
1329
1330
0
    case MFF_N_IDS:
1331
0
    default:
1332
0
        OVS_NOT_REACHED();
1333
53.0k
    }
1334
53.0k
}
1335
1336
/* Unwildcard the bits in 'mask' of the 'wc' member field described by 'mf'.
1337
 * The caller is responsible for ensuring that 'wc' meets 'mf''s
1338
 * prerequisites. */
1339
void
1340
mf_mask_field_masked(const struct mf_field *mf, const union mf_value *mask,
1341
                     struct flow_wildcards *wc)
1342
0
{
1343
0
    union mf_value temp_mask;
1344
    /* For MFF_DL_VLAN, we cannot send a all 1's to flow_set_dl_vlan() as that
1345
     * will be considered as OFP10_VLAN_NONE. So make sure the mask only has
1346
     * valid bits in this case. */
1347
0
    if (mf->id == MFF_DL_VLAN) {
1348
0
        temp_mask.be16 = htons(VLAN_VID_MASK) & mask->be16;
1349
0
        mask = &temp_mask;
1350
0
    }
1351
1352
0
    union mf_value mask_value;
1353
1354
0
    mf_get_value(mf, &wc->masks, &mask_value);
1355
0
    for (size_t i = 0; i < mf->n_bytes; i++) {
1356
0
        mask_value.b[i] |= mask->b[i];
1357
0
    }
1358
0
    mf_set_flow_value(mf, &mask_value, &wc->masks);
1359
0
}
1360
1361
/* Unwildcard 'wc' member field described by 'mf'.  The caller is
1362
 * responsible for ensuring that 'mask' meets 'mf''s prerequisites. */
1363
void
1364
mf_mask_field(const struct mf_field *mf, struct flow_wildcards *wc)
1365
0
{
1366
0
    mf_mask_field_masked(mf, &exact_match_mask, wc);
1367
0
}
1368
1369
static int
1370
field_len(const struct mf_field *mf, const union mf_value *value_)
1371
64.4k
{
1372
64.4k
    const uint8_t *value = &value_->u8;
1373
64.4k
    int i;
1374
1375
64.4k
    if (!mf->variable_len) {
1376
6.77k
        return mf->n_bytes;
1377
6.77k
    }
1378
1379
57.6k
    if (!value) {
1380
0
        return 0;
1381
0
    }
1382
1383
7.10M
    for (i = 0; i < mf->n_bytes; i++) {
1384
7.07M
        if (value[i] != 0) {
1385
29.8k
            break;
1386
29.8k
        }
1387
7.07M
    }
1388
1389
57.6k
    return mf->n_bytes - i;
1390
57.6k
}
1391
1392
/* Returns the effective length of the field. For fixed length fields,
1393
 * this is just the defined length. For variable length fields, it is
1394
 * the minimum size encoding that retains the same meaning (i.e.
1395
 * discarding leading zeros).
1396
 *
1397
 * 'is_masked' returns (if non-NULL) whether the original contained
1398
 * a mask. Otherwise, a mask that is the same length as the value
1399
 * might be misinterpreted as an exact match. */
1400
int
1401
mf_field_len(const struct mf_field *mf, const union mf_value *value,
1402
             const union mf_value *mask, bool *is_masked_)
1403
43.5k
{
1404
43.5k
    int len, mask_len;
1405
43.5k
    bool is_masked = mask && !is_all_ones(mask, mf->n_bytes);
1406
1407
43.5k
    len = field_len(mf, value);
1408
43.5k
    if (is_masked) {
1409
20.8k
        mask_len = field_len(mf, mask);
1410
20.8k
        len = MAX(len, mask_len);
1411
20.8k
    }
1412
1413
43.5k
    if (is_masked_) {
1414
43.5k
        *is_masked_ = is_masked;
1415
43.5k
    }
1416
1417
43.5k
    return len;
1418
43.5k
}
1419
1420
/* Sets 'flow' member field described by 'mf' to 'value'.  The caller is
1421
 * responsible for ensuring that 'flow' meets 'mf''s prerequisites.*/
1422
void
1423
mf_set_flow_value(const struct mf_field *mf,
1424
                  const union mf_value *value, struct flow *flow)
1425
0
{
1426
0
    switch (mf->id) {
1427
0
    case MFF_DP_HASH:
1428
0
        flow->dp_hash = ntohl(value->be32);
1429
0
        break;
1430
0
    case MFF_RECIRC_ID:
1431
0
        flow->recirc_id = ntohl(value->be32);
1432
0
        break;
1433
0
    case MFF_PACKET_TYPE:
1434
0
        flow->packet_type = value->be32;
1435
0
        break;
1436
0
    case MFF_CONJ_ID:
1437
0
        flow->conj_id = ntohl(value->be32);
1438
0
        break;
1439
0
    case MFF_TUN_ID:
1440
0
        flow->tunnel.tun_id = value->be64;
1441
0
        break;
1442
0
    case MFF_TUN_SRC:
1443
0
        flow->tunnel.ip_src = value->be32;
1444
0
        break;
1445
0
    case MFF_TUN_DST:
1446
0
        flow->tunnel.ip_dst = value->be32;
1447
0
        break;
1448
0
    case MFF_TUN_IPV6_SRC:
1449
0
        flow->tunnel.ipv6_src = value->ipv6;
1450
0
        break;
1451
0
    case MFF_TUN_IPV6_DST:
1452
0
        flow->tunnel.ipv6_dst = value->ipv6;
1453
0
        break;
1454
0
    case MFF_TUN_FLAGS:
1455
0
        flow->tunnel.flags = (flow->tunnel.flags & ~FLOW_TNL_PUB_F_MASK) |
1456
0
                             ntohs(value->be16);
1457
0
        break;
1458
0
    case MFF_TUN_GBP_ID:
1459
0
        flow->tunnel.gbp_id = value->be16;
1460
0
        break;
1461
0
    case MFF_TUN_GBP_FLAGS:
1462
0
        flow->tunnel.gbp_flags = value->u8;
1463
0
        break;
1464
0
    case MFF_TUN_TOS:
1465
0
        flow->tunnel.ip_tos = value->u8;
1466
0
        break;
1467
0
    case MFF_TUN_TTL:
1468
0
        flow->tunnel.ip_ttl = value->u8;
1469
0
        break;
1470
0
    case MFF_TUN_ERSPAN_VER:
1471
0
        flow->tunnel.erspan_ver = value->u8;
1472
0
        break;
1473
0
    case MFF_TUN_ERSPAN_IDX:
1474
0
        flow->tunnel.erspan_idx = ntohl(value->be32);
1475
0
        break;
1476
0
    case MFF_TUN_ERSPAN_DIR:
1477
0
        flow->tunnel.erspan_dir = value->u8;
1478
0
        break;
1479
0
    case MFF_TUN_ERSPAN_HWID:
1480
0
        flow->tunnel.erspan_hwid = value->u8;
1481
0
        break;
1482
0
    case MFF_TUN_GTPU_FLAGS:
1483
0
        flow->tunnel.gtpu_flags = value->u8;
1484
0
        break;
1485
0
    case MFF_TUN_GTPU_MSGTYPE:
1486
0
        flow->tunnel.gtpu_msgtype = value->u8;
1487
0
        break;
1488
0
    CASE_MFF_TUN_METADATA:
1489
0
        tun_metadata_write(&flow->tunnel, mf, value);
1490
0
        break;
1491
0
    case MFF_METADATA:
1492
0
        flow->metadata = value->be64;
1493
0
        break;
1494
1495
0
    case MFF_IN_PORT:
1496
0
        flow->in_port.ofp_port = u16_to_ofp(ntohs(value->be16));
1497
0
        break;
1498
0
    case MFF_IN_PORT_OXM:
1499
0
        ofputil_port_from_ofp11(value->be32, &flow->in_port.ofp_port);
1500
0
        break;
1501
0
    case MFF_ACTSET_OUTPUT:
1502
0
        ofputil_port_from_ofp11(value->be32, &flow->actset_output);
1503
0
        break;
1504
1505
0
    case MFF_SKB_PRIORITY:
1506
0
        flow->skb_priority = ntohl(value->be32);
1507
0
        break;
1508
1509
0
    case MFF_PKT_MARK:
1510
0
        flow->pkt_mark = ntohl(value->be32);
1511
0
        break;
1512
1513
0
    case MFF_CT_STATE:
1514
0
        flow->ct_state = ntohl(value->be32);
1515
0
        break;
1516
1517
0
    case MFF_CT_ZONE:
1518
0
        flow->ct_zone = ntohs(value->be16);
1519
0
        break;
1520
1521
0
    case MFF_CT_MARK:
1522
0
        flow->ct_mark = ntohl(value->be32);
1523
0
        break;
1524
1525
0
    case MFF_CT_LABEL:
1526
0
        flow->ct_label = ntoh128(value->be128);
1527
0
        break;
1528
1529
0
    case MFF_CT_NW_PROTO:
1530
0
        flow->ct_nw_proto = value->u8;
1531
0
        break;
1532
1533
0
    case MFF_CT_NW_SRC:
1534
0
        flow->ct_nw_src = value->be32;
1535
0
        break;
1536
1537
0
    case MFF_CT_NW_DST:
1538
0
        flow->ct_nw_dst = value->be32;
1539
0
        break;
1540
1541
0
    case MFF_CT_IPV6_SRC:
1542
0
        flow->ct_ipv6_src = value->ipv6;
1543
0
        break;
1544
1545
0
    case MFF_CT_IPV6_DST:
1546
0
        flow->ct_ipv6_dst = value->ipv6;
1547
0
        break;
1548
1549
0
    case MFF_CT_TP_SRC:
1550
0
        flow->ct_tp_src = value->be16;
1551
0
        break;
1552
1553
0
    case MFF_CT_TP_DST:
1554
0
        flow->ct_tp_dst = value->be16;
1555
0
        break;
1556
1557
0
    CASE_MFF_REGS:
1558
0
        flow->regs[mf->id - MFF_REG0] = ntohl(value->be32);
1559
0
        break;
1560
1561
0
    CASE_MFF_XREGS:
1562
0
        flow_set_xreg(flow, mf->id - MFF_XREG0, ntohll(value->be64));
1563
0
        break;
1564
1565
0
    CASE_MFF_XXREGS:
1566
0
        flow_set_xxreg(flow, mf->id - MFF_XXREG0, ntoh128(value->be128));
1567
0
        break;
1568
1569
0
    case MFF_ETH_SRC:
1570
0
        flow->dl_src = value->mac;
1571
0
        break;
1572
1573
0
    case MFF_ETH_DST:
1574
0
        flow->dl_dst = value->mac;
1575
0
        break;
1576
1577
0
    case MFF_ETH_TYPE:
1578
0
        flow->dl_type = value->be16;
1579
0
        break;
1580
1581
0
    case MFF_VLAN_TCI:
1582
0
        flow->vlans[0].tci = value->be16;
1583
0
        flow_fix_vlan_tpid(flow);
1584
0
        break;
1585
1586
0
    case MFF_DL_VLAN:
1587
0
        flow_set_dl_vlan(flow, value->be16, 0);
1588
0
        flow_fix_vlan_tpid(flow);
1589
0
        break;
1590
1591
0
    case MFF_VLAN_VID:
1592
0
        flow_set_vlan_vid(flow, value->be16);
1593
0
        flow_fix_vlan_tpid(flow);
1594
0
        break;
1595
1596
0
    case MFF_DL_VLAN_PCP:
1597
0
    case MFF_VLAN_PCP:
1598
0
        flow_set_vlan_pcp(flow, value->u8, 0);
1599
0
        flow_fix_vlan_tpid(flow);
1600
0
        break;
1601
1602
0
    case MFF_MPLS_LABEL:
1603
0
        flow_set_mpls_label(flow, 0, value->be32);
1604
0
        break;
1605
1606
0
    case MFF_MPLS_TC:
1607
0
        flow_set_mpls_tc(flow, 0, value->u8);
1608
0
        break;
1609
1610
0
    case MFF_MPLS_BOS:
1611
0
        flow_set_mpls_bos(flow, 0, value->u8);
1612
0
        break;
1613
1614
0
    case MFF_MPLS_TTL:
1615
0
        flow_set_mpls_ttl(flow, 0, value->u8);
1616
0
        break;
1617
1618
0
    case MFF_IPV4_SRC:
1619
0
        flow->nw_src = value->be32;
1620
0
        break;
1621
1622
0
    case MFF_IPV4_DST:
1623
0
        flow->nw_dst = value->be32;
1624
0
        break;
1625
1626
0
    case MFF_IPV6_SRC:
1627
0
        flow->ipv6_src = value->ipv6;
1628
0
        break;
1629
1630
0
    case MFF_IPV6_DST:
1631
0
        flow->ipv6_dst = value->ipv6;
1632
0
        break;
1633
1634
0
    case MFF_IPV6_LABEL:
1635
0
        flow->ipv6_label = value->be32 & htonl(IPV6_LABEL_MASK);
1636
0
        break;
1637
1638
0
    case MFF_IP_PROTO:
1639
0
        flow->nw_proto = value->u8;
1640
0
        break;
1641
1642
0
    case MFF_IP_DSCP:
1643
0
        flow->nw_tos &= ~IP_DSCP_MASK;
1644
0
        flow->nw_tos |= value->u8 & IP_DSCP_MASK;
1645
0
        break;
1646
1647
0
    case MFF_IP_DSCP_SHIFTED:
1648
0
        flow->nw_tos &= ~IP_DSCP_MASK;
1649
0
        flow->nw_tos |= value->u8 << 2;
1650
0
        break;
1651
1652
0
    case MFF_IP_ECN:
1653
0
        flow->nw_tos &= ~IP_ECN_MASK;
1654
0
        flow->nw_tos |= value->u8 & IP_ECN_MASK;
1655
0
        break;
1656
1657
0
    case MFF_IP_TTL:
1658
0
        flow->nw_ttl = value->u8;
1659
0
        break;
1660
1661
0
    case MFF_IP_FRAG:
1662
0
        flow->nw_frag = value->u8 & FLOW_NW_FRAG_MASK;
1663
0
        break;
1664
1665
0
    case MFF_ARP_OP:
1666
0
        flow->nw_proto = ntohs(value->be16);
1667
0
        break;
1668
1669
0
    case MFF_ARP_SPA:
1670
0
        flow->nw_src = value->be32;
1671
0
        break;
1672
1673
0
    case MFF_ARP_TPA:
1674
0
        flow->nw_dst = value->be32;
1675
0
        break;
1676
1677
0
    case MFF_ARP_SHA:
1678
0
    case MFF_ND_SLL:
1679
0
        flow->arp_sha = value->mac;
1680
0
        break;
1681
1682
0
    case MFF_ARP_THA:
1683
0
    case MFF_ND_TLL:
1684
0
        flow->arp_tha = value->mac;
1685
0
        break;
1686
1687
0
    case MFF_TCP_SRC:
1688
0
    case MFF_UDP_SRC:
1689
0
    case MFF_SCTP_SRC:
1690
0
        flow->tp_src = value->be16;
1691
0
        break;
1692
1693
0
    case MFF_TCP_DST:
1694
0
    case MFF_UDP_DST:
1695
0
    case MFF_SCTP_DST:
1696
0
        flow->tp_dst = value->be16;
1697
0
        break;
1698
1699
0
    case MFF_TCP_FLAGS:
1700
0
        flow->tcp_flags = value->be16;
1701
0
        break;
1702
1703
0
    case MFF_ICMPV4_TYPE:
1704
0
    case MFF_ICMPV6_TYPE:
1705
0
        flow->tp_src = htons(value->u8);
1706
0
        break;
1707
1708
0
    case MFF_ICMPV4_CODE:
1709
0
    case MFF_ICMPV6_CODE:
1710
0
        flow->tp_dst = htons(value->u8);
1711
0
        break;
1712
1713
0
    case MFF_ND_TARGET:
1714
0
        flow->nd_target = value->ipv6;
1715
0
        break;
1716
1717
0
    case MFF_ND_RESERVED:
1718
0
        flow->igmp_group_ip4 = value->be32;
1719
0
        break;
1720
1721
0
    case MFF_ND_OPTIONS_TYPE:
1722
0
        flow->tcp_flags = htons(value->u8);
1723
0
        break;
1724
1725
0
    case MFF_NSH_FLAGS:
1726
0
        flow->nsh.flags = value->u8;
1727
0
        break;
1728
0
    case MFF_NSH_TTL:
1729
0
        flow->nsh.ttl = value->u8;
1730
0
        break;
1731
0
    case MFF_NSH_MDTYPE:
1732
0
        flow->nsh.mdtype = value->u8;
1733
0
        break;
1734
0
    case MFF_NSH_NP:
1735
0
        flow->nsh.np = value->u8;
1736
0
        break;
1737
0
    case MFF_NSH_SPI:
1738
0
        nsh_path_hdr_set_spi(&flow->nsh.path_hdr, value->be32);
1739
0
        break;
1740
0
    case MFF_NSH_SI:
1741
0
        nsh_path_hdr_set_si(&flow->nsh.path_hdr, value->u8);
1742
0
        break;
1743
0
    case MFF_NSH_C1:
1744
0
    case MFF_NSH_C2:
1745
0
    case MFF_NSH_C3:
1746
0
    case MFF_NSH_C4:
1747
0
        flow->nsh.context[mf->id - MFF_NSH_C1] = value->be32;
1748
0
        break;
1749
1750
0
    case MFF_N_IDS:
1751
0
    default:
1752
0
        OVS_NOT_REACHED();
1753
0
    }
1754
0
}
1755
1756
/* Consider each of 'src', 'mask', and 'dst' as if they were arrays of 8*n
1757
 * bits.  Then, for each 0 <= i < 8 * n such that mask[i] == 1, sets dst[i] =
1758
 * src[i].  */
1759
static void
1760
apply_mask(const uint8_t *src, const uint8_t *mask, uint8_t *dst, size_t n)
1761
0
{
1762
0
    size_t i;
1763
1764
0
    for (i = 0; i < n; i++) {
1765
0
        dst[i] = (src[i] & mask[i]) | (dst[i] & ~mask[i]);
1766
0
    }
1767
0
}
1768
1769
/* Sets 'flow' member field described by 'field' to 'value', except that bits
1770
 * for which 'mask' has a 0-bit keep their existing values.  The caller is
1771
 * responsible for ensuring that 'flow' meets 'field''s prerequisites.*/
1772
void
1773
mf_set_flow_value_masked(const struct mf_field *field,
1774
                         const union mf_value *value,
1775
                         const union mf_value *mask,
1776
                         struct flow *flow)
1777
0
{
1778
0
    union mf_value tmp;
1779
1780
0
    mf_get_value(field, flow, &tmp);
1781
0
    apply_mask((const uint8_t *) value, (const uint8_t *) mask,
1782
0
               (uint8_t *) &tmp, field->n_bytes);
1783
0
    mf_set_flow_value(field, &tmp, flow);
1784
0
}
1785
1786
bool
1787
mf_is_tun_metadata(const struct mf_field *mf)
1788
29.6k
{
1789
29.6k
    return mf->id >= MFF_TUN_METADATA0 &&
1790
29.6k
           mf->id < MFF_TUN_METADATA0 + TUN_METADATA_NUM_OPTS;
1791
29.6k
}
1792
1793
bool
1794
mf_is_any_metadata(const struct mf_field *mf)
1795
0
{
1796
0
    switch (mf->id) {
1797
0
    case MFF_DP_HASH:
1798
0
    case MFF_RECIRC_ID:
1799
0
    case MFF_PACKET_TYPE:
1800
0
    case MFF_CONJ_ID:
1801
0
    case MFF_TUN_ERSPAN_DIR:
1802
0
    CASE_MFF_TUN_METADATA:
1803
0
    case MFF_METADATA:
1804
0
    case MFF_IN_PORT:
1805
0
    case MFF_IN_PORT_OXM:
1806
0
    case MFF_ACTSET_OUTPUT:
1807
0
    case MFF_SKB_PRIORITY:
1808
0
    case MFF_PKT_MARK:
1809
0
    case MFF_CT_STATE:
1810
0
    case MFF_CT_ZONE:
1811
0
    case MFF_CT_MARK:
1812
0
    case MFF_CT_LABEL:
1813
0
    case MFF_CT_NW_PROTO:
1814
0
    case MFF_CT_NW_SRC:
1815
0
    case MFF_CT_NW_DST:
1816
0
    case MFF_CT_IPV6_SRC:
1817
0
    case MFF_CT_IPV6_DST:
1818
0
    case MFF_CT_TP_SRC:
1819
0
    case MFF_CT_TP_DST:
1820
0
    CASE_MFF_REGS:
1821
0
    CASE_MFF_XREGS:
1822
0
    CASE_MFF_XXREGS:
1823
0
        return true;
1824
1825
0
    case MFF_TUN_ID:
1826
0
    case MFF_TUN_SRC:
1827
0
    case MFF_TUN_DST:
1828
0
    case MFF_TUN_IPV6_SRC:
1829
0
    case MFF_TUN_IPV6_DST:
1830
0
    case MFF_TUN_FLAGS:
1831
0
    case MFF_TUN_TTL:
1832
0
    case MFF_TUN_TOS:
1833
0
    case MFF_TUN_GBP_ID:
1834
0
    case MFF_TUN_GBP_FLAGS:
1835
0
    case MFF_TUN_ERSPAN_IDX:
1836
0
    case MFF_TUN_ERSPAN_VER:
1837
0
    case MFF_TUN_ERSPAN_HWID:
1838
0
    case MFF_TUN_GTPU_FLAGS:
1839
0
    case MFF_TUN_GTPU_MSGTYPE:
1840
0
    case MFF_ETH_SRC:
1841
0
    case MFF_ETH_DST:
1842
0
    case MFF_ETH_TYPE:
1843
0
    case MFF_VLAN_TCI:
1844
0
    case MFF_DL_VLAN:
1845
0
    case MFF_VLAN_VID:
1846
0
    case MFF_DL_VLAN_PCP:
1847
0
    case MFF_VLAN_PCP:
1848
0
    case MFF_MPLS_LABEL:
1849
0
    case MFF_MPLS_TC:
1850
0
    case MFF_MPLS_BOS:
1851
0
    case MFF_MPLS_TTL:
1852
0
    case MFF_IPV4_SRC:
1853
0
    case MFF_IPV4_DST:
1854
0
    case MFF_IPV6_SRC:
1855
0
    case MFF_IPV6_DST:
1856
0
    case MFF_IPV6_LABEL:
1857
0
    case MFF_IP_PROTO:
1858
0
    case MFF_IP_DSCP:
1859
0
    case MFF_IP_DSCP_SHIFTED:
1860
0
    case MFF_IP_ECN:
1861
0
    case MFF_IP_TTL:
1862
0
    case MFF_IP_FRAG:
1863
0
    case MFF_ARP_OP:
1864
0
    case MFF_ARP_SPA:
1865
0
    case MFF_ARP_TPA:
1866
0
    case MFF_ARP_SHA:
1867
0
    case MFF_ARP_THA:
1868
0
    case MFF_TCP_SRC:
1869
0
    case MFF_TCP_DST:
1870
0
    case MFF_TCP_FLAGS:
1871
0
    case MFF_UDP_SRC:
1872
0
    case MFF_UDP_DST:
1873
0
    case MFF_SCTP_SRC:
1874
0
    case MFF_SCTP_DST:
1875
0
    case MFF_ICMPV4_TYPE:
1876
0
    case MFF_ICMPV4_CODE:
1877
0
    case MFF_ICMPV6_TYPE:
1878
0
    case MFF_ICMPV6_CODE:
1879
0
    case MFF_ND_TARGET:
1880
0
    case MFF_ND_SLL:
1881
0
    case MFF_ND_TLL:
1882
0
    case MFF_ND_RESERVED:
1883
0
    case MFF_ND_OPTIONS_TYPE:
1884
0
    case MFF_NSH_FLAGS:
1885
0
    case MFF_NSH_MDTYPE:
1886
0
    case MFF_NSH_NP:
1887
0
    case MFF_NSH_SPI:
1888
0
    case MFF_NSH_SI:
1889
0
    case MFF_NSH_C1:
1890
0
    case MFF_NSH_C2:
1891
0
    case MFF_NSH_C3:
1892
0
    case MFF_NSH_C4:
1893
0
    case MFF_NSH_TTL:
1894
0
        return false;
1895
1896
0
    case MFF_N_IDS:
1897
0
    default:
1898
0
        OVS_NOT_REACHED();
1899
0
    }
1900
0
}
1901
1902
bool
1903
mf_is_frozen_metadata(const struct mf_field *mf)
1904
0
{
1905
0
    if (mf->id >= MFF_TUN_ID && mf->id <= MFF_IN_PORT_OXM) {
1906
0
        return true;
1907
0
    }
1908
1909
0
    if (mf->id >= MFF_REG0 && mf->id < MFF_ETH_SRC) {
1910
0
        return true;
1911
0
    }
1912
0
    return false;
1913
0
}
1914
1915
bool
1916
mf_is_pipeline_field(const struct mf_field *mf)
1917
0
{
1918
0
    switch (mf->id) {
1919
0
    case MFF_TUN_ID:
1920
0
    case MFF_TUN_SRC:
1921
0
    case MFF_TUN_DST:
1922
0
    case MFF_TUN_IPV6_SRC:
1923
0
    case MFF_TUN_IPV6_DST:
1924
0
    case MFF_TUN_FLAGS:
1925
0
    case MFF_TUN_GBP_ID:
1926
0
    case MFF_TUN_GBP_FLAGS:
1927
0
    case MFF_TUN_ERSPAN_VER:
1928
0
    case MFF_TUN_ERSPAN_IDX:
1929
0
    case MFF_TUN_ERSPAN_DIR:
1930
0
    case MFF_TUN_ERSPAN_HWID:
1931
0
    case MFF_TUN_GTPU_FLAGS:
1932
0
    case MFF_TUN_GTPU_MSGTYPE:
1933
0
    CASE_MFF_TUN_METADATA:
1934
0
    case MFF_METADATA:
1935
0
    case MFF_IN_PORT:
1936
0
    case MFF_IN_PORT_OXM:
1937
0
    CASE_MFF_REGS:
1938
0
    CASE_MFF_XREGS:
1939
0
    CASE_MFF_XXREGS:
1940
0
    case MFF_PACKET_TYPE:
1941
0
        return true;
1942
1943
0
    case MFF_DP_HASH:
1944
0
    case MFF_RECIRC_ID:
1945
0
    case MFF_CONJ_ID:
1946
0
    case MFF_TUN_TTL:
1947
0
    case MFF_TUN_TOS:
1948
0
    case MFF_ACTSET_OUTPUT:
1949
0
    case MFF_SKB_PRIORITY:
1950
0
    case MFF_PKT_MARK:
1951
0
    case MFF_CT_STATE:
1952
0
    case MFF_CT_ZONE:
1953
0
    case MFF_CT_MARK:
1954
0
    case MFF_CT_LABEL:
1955
0
    case MFF_CT_NW_PROTO:
1956
0
    case MFF_CT_NW_SRC:
1957
0
    case MFF_CT_NW_DST:
1958
0
    case MFF_CT_IPV6_SRC:
1959
0
    case MFF_CT_IPV6_DST:
1960
0
    case MFF_CT_TP_SRC:
1961
0
    case MFF_CT_TP_DST:
1962
0
    case MFF_ETH_SRC:
1963
0
    case MFF_ETH_DST:
1964
0
    case MFF_ETH_TYPE:
1965
0
    case MFF_VLAN_TCI:
1966
0
    case MFF_DL_VLAN:
1967
0
    case MFF_VLAN_VID:
1968
0
    case MFF_DL_VLAN_PCP:
1969
0
    case MFF_VLAN_PCP:
1970
0
    case MFF_MPLS_LABEL:
1971
0
    case MFF_MPLS_TC:
1972
0
    case MFF_MPLS_BOS:
1973
0
    case MFF_MPLS_TTL:
1974
0
    case MFF_IPV4_SRC:
1975
0
    case MFF_IPV4_DST:
1976
0
    case MFF_IPV6_SRC:
1977
0
    case MFF_IPV6_DST:
1978
0
    case MFF_IPV6_LABEL:
1979
0
    case MFF_IP_PROTO:
1980
0
    case MFF_IP_DSCP:
1981
0
    case MFF_IP_DSCP_SHIFTED:
1982
0
    case MFF_IP_ECN:
1983
0
    case MFF_IP_TTL:
1984
0
    case MFF_IP_FRAG:
1985
0
    case MFF_ARP_OP:
1986
0
    case MFF_ARP_SPA:
1987
0
    case MFF_ARP_TPA:
1988
0
    case MFF_ARP_SHA:
1989
0
    case MFF_ARP_THA:
1990
0
    case MFF_TCP_SRC:
1991
0
    case MFF_TCP_DST:
1992
0
    case MFF_TCP_FLAGS:
1993
0
    case MFF_UDP_SRC:
1994
0
    case MFF_UDP_DST:
1995
0
    case MFF_SCTP_SRC:
1996
0
    case MFF_SCTP_DST:
1997
0
    case MFF_ICMPV4_TYPE:
1998
0
    case MFF_ICMPV4_CODE:
1999
0
    case MFF_ICMPV6_TYPE:
2000
0
    case MFF_ICMPV6_CODE:
2001
0
    case MFF_ND_TARGET:
2002
0
    case MFF_ND_SLL:
2003
0
    case MFF_ND_TLL:
2004
0
    case MFF_ND_RESERVED:
2005
0
    case MFF_ND_OPTIONS_TYPE:
2006
0
    case MFF_NSH_FLAGS:
2007
0
    case MFF_NSH_TTL:
2008
0
    case MFF_NSH_MDTYPE:
2009
0
    case MFF_NSH_NP:
2010
0
    case MFF_NSH_SPI:
2011
0
    case MFF_NSH_SI:
2012
0
    case MFF_NSH_C1:
2013
0
    case MFF_NSH_C2:
2014
0
    case MFF_NSH_C3:
2015
0
    case MFF_NSH_C4:
2016
0
        return false;
2017
2018
0
    case MFF_N_IDS:
2019
0
    default:
2020
0
        OVS_NOT_REACHED();
2021
0
    }
2022
0
}
2023
2024
/* Returns true if 'mf' has previously been set in 'flow', false if
2025
 * it contains a non-default value.
2026
 *
2027
 * The caller is responsible for ensuring that 'flow' meets 'mf''s
2028
 * prerequisites. */
2029
bool
2030
mf_is_set(const struct mf_field *mf, const struct flow *flow)
2031
0
{
2032
0
    if (!mf_is_tun_metadata(mf)) {
2033
0
        union mf_value value;
2034
2035
0
        mf_get_value(mf, flow, &value);
2036
0
        return !is_all_zeros(&value, mf->n_bytes);
2037
0
    } else {
2038
0
        return ULLONG_GET(flow->tunnel.metadata.present.map,
2039
0
                          mf->id - MFF_TUN_METADATA0);
2040
0
    }
2041
0
}
2042
2043
/* Makes 'match' wildcard field 'mf'.
2044
 *
2045
 * The caller is responsible for ensuring that 'match' meets 'mf''s
2046
 * prerequisites.
2047
 *
2048
 * If non-NULL, 'err_str' returns a malloc'ed string describing any errors
2049
 * with the request or NULL if there is no error. The caller is reponsible
2050
 * for freeing the string. */
2051
void
2052
mf_set_wild(const struct mf_field *mf, struct match *match, char **err_str)
2053
29.4k
{
2054
29.4k
    if (err_str) {
2055
29.4k
        *err_str = NULL;
2056
29.4k
    }
2057
2058
29.4k
    switch (mf->id) {
2059
176
    case MFF_DP_HASH:
2060
176
        match->flow.dp_hash = 0;
2061
176
        match->wc.masks.dp_hash = 0;
2062
176
        break;
2063
423
    case MFF_RECIRC_ID:
2064
423
        match->flow.recirc_id = 0;
2065
423
        match->wc.masks.recirc_id = 0;
2066
423
        break;
2067
211
    case MFF_PACKET_TYPE:
2068
211
        match->flow.packet_type = 0;
2069
211
        match->wc.masks.packet_type = 0;
2070
211
        break;
2071
18
    case MFF_CONJ_ID:
2072
18
        match->flow.conj_id = 0;
2073
18
        match->wc.masks.conj_id = 0;
2074
18
        break;
2075
304
    case MFF_TUN_ID:
2076
304
        match_set_tun_id_masked(match, htonll(0), htonll(0));
2077
304
        break;
2078
247
    case MFF_TUN_SRC:
2079
247
        match_set_tun_src_masked(match, htonl(0), htonl(0));
2080
247
        break;
2081
375
    case MFF_TUN_DST:
2082
375
        match_set_tun_dst_masked(match, htonl(0), htonl(0));
2083
375
        break;
2084
162
    case MFF_TUN_IPV6_SRC:
2085
162
        memset(&match->wc.masks.tunnel.ipv6_src, 0,
2086
162
               sizeof match->wc.masks.tunnel.ipv6_src);
2087
162
        memset(&match->flow.tunnel.ipv6_src, 0,
2088
162
               sizeof match->flow.tunnel.ipv6_src);
2089
162
        break;
2090
87
    case MFF_TUN_IPV6_DST:
2091
87
        memset(&match->wc.masks.tunnel.ipv6_dst, 0,
2092
87
               sizeof match->wc.masks.tunnel.ipv6_dst);
2093
87
        memset(&match->flow.tunnel.ipv6_dst, 0,
2094
87
               sizeof match->flow.tunnel.ipv6_dst);
2095
87
        break;
2096
250
    case MFF_TUN_FLAGS:
2097
250
        match_set_tun_flags_masked(match, 0, 0);
2098
250
        break;
2099
367
    case MFF_TUN_GBP_ID:
2100
367
        match_set_tun_gbp_id_masked(match, 0, 0);
2101
367
        break;
2102
45
    case MFF_TUN_GBP_FLAGS:
2103
45
        match_set_tun_gbp_flags_masked(match, 0, 0);
2104
45
        break;
2105
189
    case MFF_TUN_TOS:
2106
189
        match_set_tun_tos_masked(match, 0, 0);
2107
189
        break;
2108
454
    case MFF_TUN_TTL:
2109
454
        match_set_tun_ttl_masked(match, 0, 0);
2110
454
        break;
2111
0
    case MFF_TUN_ERSPAN_VER:
2112
0
        match_set_tun_erspan_ver_masked(match, 0, 0);
2113
0
        break;
2114
0
    case MFF_TUN_ERSPAN_IDX:
2115
0
        match_set_tun_erspan_idx_masked(match, 0, 0);
2116
0
        break;
2117
0
    case MFF_TUN_ERSPAN_DIR:
2118
0
        match_set_tun_erspan_dir_masked(match, 0, 0);
2119
0
        break;
2120
0
    case MFF_TUN_ERSPAN_HWID:
2121
0
        match_set_tun_erspan_hwid_masked(match, 0, 0);
2122
0
        break;
2123
190
    case MFF_TUN_GTPU_FLAGS:
2124
190
        match_set_tun_gtpu_flags_masked(match, 0, 0);
2125
190
        break;
2126
0
    case MFF_TUN_GTPU_MSGTYPE:
2127
0
        match_set_tun_gtpu_msgtype_masked(match, 0, 0);
2128
0
        break;
2129
0
    CASE_MFF_TUN_METADATA:
2130
0
        tun_metadata_set_match(mf, NULL, NULL, match, err_str);
2131
0
        break;
2132
2133
228
    case MFF_METADATA:
2134
228
        match_set_metadata_masked(match, htonll(0), htonll(0));
2135
228
        break;
2136
2137
66
    case MFF_IN_PORT:
2138
66
    case MFF_IN_PORT_OXM:
2139
66
        match->flow.in_port.ofp_port = 0;
2140
66
        match->wc.masks.in_port.ofp_port = 0;
2141
66
        break;
2142
192
    case MFF_ACTSET_OUTPUT:
2143
192
        match->flow.actset_output = 0;
2144
192
        match->wc.masks.actset_output = 0;
2145
192
        break;
2146
2147
0
    case MFF_SKB_PRIORITY:
2148
0
        match->flow.skb_priority = 0;
2149
0
        match->wc.masks.skb_priority = 0;
2150
0
        break;
2151
2152
180
    case MFF_PKT_MARK:
2153
180
        match->flow.pkt_mark = 0;
2154
180
        match->wc.masks.pkt_mark = 0;
2155
180
        break;
2156
2157
390
    case MFF_CT_STATE:
2158
390
        match->flow.ct_state = 0;
2159
390
        match->wc.masks.ct_state = 0;
2160
390
        break;
2161
2162
250
    case MFF_CT_ZONE:
2163
250
        match->flow.ct_zone = 0;
2164
250
        match->wc.masks.ct_zone = 0;
2165
250
        break;
2166
2167
194
    case MFF_CT_MARK:
2168
194
        match->flow.ct_mark = 0;
2169
194
        match->wc.masks.ct_mark = 0;
2170
194
        break;
2171
2172
75
    case MFF_CT_LABEL:
2173
75
        memset(&match->flow.ct_label, 0, sizeof(match->flow.ct_label));
2174
75
        memset(&match->wc.masks.ct_label, 0, sizeof(match->wc.masks.ct_label));
2175
75
        break;
2176
2177
379
    case MFF_CT_NW_PROTO:
2178
379
        match->flow.ct_nw_proto = 0;
2179
379
        match->wc.masks.ct_nw_proto = 0;
2180
379
        break;
2181
2182
1.69k
    case MFF_CT_NW_SRC:
2183
1.69k
        match->flow.ct_nw_src = 0;
2184
1.69k
        match->wc.masks.ct_nw_src = 0;
2185
1.69k
        break;
2186
2187
193
    case MFF_CT_NW_DST:
2188
193
        match->flow.ct_nw_dst = 0;
2189
193
        match->wc.masks.ct_nw_dst = 0;
2190
193
        break;
2191
2192
268
    case MFF_CT_IPV6_SRC:
2193
268
        memset(&match->flow.ct_ipv6_src, 0, sizeof(match->flow.ct_ipv6_src));
2194
268
        WC_UNMASK_FIELD(&match->wc, ct_ipv6_src);
2195
268
        break;
2196
2197
187
    case MFF_CT_IPV6_DST:
2198
187
        memset(&match->flow.ct_ipv6_dst, 0, sizeof(match->flow.ct_ipv6_dst));
2199
187
        WC_UNMASK_FIELD(&match->wc, ct_ipv6_dst);
2200
187
        break;
2201
2202
34
    case MFF_CT_TP_SRC:
2203
34
        match->flow.ct_tp_src = 0;
2204
34
        match->wc.masks.ct_tp_src = 0;
2205
34
        break;
2206
2207
61
    case MFF_CT_TP_DST:
2208
61
        match->flow.ct_tp_dst = 0;
2209
61
        match->wc.masks.ct_tp_dst = 0;
2210
61
        break;
2211
2212
6.57k
    CASE_MFF_REGS:
2213
6.57k
        match_set_reg_masked(match, mf->id - MFF_REG0, 0, 0);
2214
6.57k
        break;
2215
2216
2.05k
    CASE_MFF_XREGS:
2217
2.05k
        match_set_xreg_masked(match, mf->id - MFF_XREG0, 0, 0);
2218
2.05k
        break;
2219
2220
1.23k
    CASE_MFF_XXREGS: {
2221
1.23k
        match_set_xxreg_masked(match, mf->id - MFF_XXREG0, OVS_U128_ZERO,
2222
1.23k
                               OVS_U128_ZERO);
2223
1.23k
        break;
2224
2.25k
    }
2225
2226
50
    case MFF_ETH_SRC:
2227
50
        match->flow.dl_src = eth_addr_zero;
2228
50
        match->wc.masks.dl_src = eth_addr_zero;
2229
50
        break;
2230
2231
32
    case MFF_ETH_DST:
2232
32
        match->flow.dl_dst = eth_addr_zero;
2233
32
        match->wc.masks.dl_dst = eth_addr_zero;
2234
32
        break;
2235
2236
274
    case MFF_ETH_TYPE:
2237
274
        match->flow.dl_type = htons(0);
2238
274
        match->wc.masks.dl_type = htons(0);
2239
274
        break;
2240
2241
442
    case MFF_VLAN_TCI:
2242
442
        match_set_dl_tci_masked(match, htons(0), htons(0));
2243
442
        break;
2244
2245
867
    case MFF_DL_VLAN:
2246
935
    case MFF_VLAN_VID:
2247
935
        match_set_any_vid(match);
2248
935
        break;
2249
2250
541
    case MFF_DL_VLAN_PCP:
2251
1.10k
    case MFF_VLAN_PCP:
2252
1.10k
        match_set_any_pcp(match);
2253
1.10k
        break;
2254
2255
361
    case MFF_MPLS_LABEL:
2256
361
        match_set_any_mpls_label(match, 0);
2257
361
        break;
2258
2259
202
    case MFF_MPLS_TC:
2260
202
        match_set_any_mpls_tc(match, 0);
2261
202
        break;
2262
2263
110
    case MFF_MPLS_BOS:
2264
110
        match_set_any_mpls_bos(match, 0);
2265
110
        break;
2266
2267
57
    case MFF_MPLS_TTL:
2268
57
        match_set_any_mpls_ttl(match, 0);
2269
57
        break;
2270
2271
219
    case MFF_IPV4_SRC:
2272
285
    case MFF_ARP_SPA:
2273
285
        match_set_nw_src_masked(match, htonl(0), htonl(0));
2274
285
        break;
2275
2276
204
    case MFF_IPV4_DST:
2277
270
    case MFF_ARP_TPA:
2278
270
        match_set_nw_dst_masked(match, htonl(0), htonl(0));
2279
270
        break;
2280
2281
214
    case MFF_IPV6_SRC:
2282
214
        memset(&match->wc.masks.ipv6_src, 0, sizeof match->wc.masks.ipv6_src);
2283
214
        memset(&match->flow.ipv6_src, 0, sizeof match->flow.ipv6_src);
2284
214
        break;
2285
2286
161
    case MFF_IPV6_DST:
2287
161
        memset(&match->wc.masks.ipv6_dst, 0, sizeof match->wc.masks.ipv6_dst);
2288
161
        memset(&match->flow.ipv6_dst, 0, sizeof match->flow.ipv6_dst);
2289
161
        break;
2290
2291
197
    case MFF_IPV6_LABEL:
2292
197
        match->wc.masks.ipv6_label = htonl(0);
2293
197
        match->flow.ipv6_label = htonl(0);
2294
197
        break;
2295
2296
235
    case MFF_IP_PROTO:
2297
235
        match->wc.masks.nw_proto = 0;
2298
235
        match->flow.nw_proto = 0;
2299
235
        break;
2300
2301
205
    case MFF_IP_DSCP:
2302
394
    case MFF_IP_DSCP_SHIFTED:
2303
394
        match->wc.masks.nw_tos &= ~IP_DSCP_MASK;
2304
394
        match->flow.nw_tos &= ~IP_DSCP_MASK;
2305
394
        break;
2306
2307
265
    case MFF_IP_ECN:
2308
265
        match->wc.masks.nw_tos &= ~IP_ECN_MASK;
2309
265
        match->flow.nw_tos &= ~IP_ECN_MASK;
2310
265
        break;
2311
2312
371
    case MFF_IP_TTL:
2313
371
        match->wc.masks.nw_ttl = 0;
2314
371
        match->flow.nw_ttl = 0;
2315
371
        break;
2316
2317
64
    case MFF_IP_FRAG:
2318
64
        match->wc.masks.nw_frag &= ~FLOW_NW_FRAG_MASK;
2319
64
        match->flow.nw_frag &= ~FLOW_NW_FRAG_MASK;
2320
64
        break;
2321
2322
73
    case MFF_ARP_OP:
2323
73
        match->wc.masks.nw_proto = 0;
2324
73
        match->flow.nw_proto = 0;
2325
73
        break;
2326
2327
58
    case MFF_ARP_SHA:
2328
200
    case MFF_ND_SLL:
2329
200
        match->flow.arp_sha = eth_addr_zero;
2330
200
        match->wc.masks.arp_sha = eth_addr_zero;
2331
200
        break;
2332
2333
66
    case MFF_ARP_THA:
2334
97
    case MFF_ND_TLL:
2335
97
        match->flow.arp_tha = eth_addr_zero;
2336
97
        match->wc.masks.arp_tha = eth_addr_zero;
2337
97
        break;
2338
2339
0
    case MFF_ND_RESERVED:
2340
0
        match->wc.masks.igmp_group_ip4 = htonl(0);
2341
0
        match->flow.igmp_group_ip4 = htonl(0);
2342
0
        break;
2343
2344
236
    case MFF_TCP_SRC:
2345
376
    case MFF_UDP_SRC:
2346
555
    case MFF_SCTP_SRC:
2347
757
    case MFF_ICMPV4_TYPE:
2348
823
    case MFF_ICMPV6_TYPE:
2349
823
        match->wc.masks.tp_src = htons(0);
2350
823
        match->flow.tp_src = htons(0);
2351
823
        break;
2352
2353
327
    case MFF_TCP_DST:
2354
543
    case MFF_UDP_DST:
2355
639
    case MFF_SCTP_DST:
2356
693
    case MFF_ICMPV4_CODE:
2357
887
    case MFF_ICMPV6_CODE:
2358
887
        match->wc.masks.tp_dst = htons(0);
2359
887
        match->flow.tp_dst = htons(0);
2360
887
        break;
2361
2362
284
    case MFF_TCP_FLAGS:
2363
284
    case MFF_ND_OPTIONS_TYPE:
2364
284
        match->wc.masks.tcp_flags = htons(0);
2365
284
        match->flow.tcp_flags = htons(0);
2366
284
        break;
2367
2368
0
    case MFF_ND_TARGET:
2369
0
        memset(&match->wc.masks.nd_target, 0,
2370
0
               sizeof match->wc.masks.nd_target);
2371
0
        memset(&match->flow.nd_target, 0, sizeof match->flow.nd_target);
2372
0
        break;
2373
2374
285
    case MFF_NSH_FLAGS:
2375
285
        MATCH_SET_FIELD_MASKED(match, nsh.flags, 0, 0);
2376
285
        break;
2377
200
    case MFF_NSH_TTL:
2378
200
        MATCH_SET_FIELD_MASKED(match, nsh.ttl, 0, 0);
2379
200
        break;
2380
18
    case MFF_NSH_MDTYPE:
2381
18
        MATCH_SET_FIELD_MASKED(match, nsh.mdtype, 0, 0);
2382
18
        break;
2383
179
    case MFF_NSH_NP:
2384
179
        MATCH_SET_FIELD_MASKED(match, nsh.np, 0, 0);
2385
179
        break;
2386
973
    case MFF_NSH_SPI:
2387
973
        match->wc.masks.nsh.path_hdr &= ~htonl(NSH_SPI_MASK);
2388
973
        nsh_path_hdr_set_spi(&match->flow.nsh.path_hdr, htonl(0));
2389
973
        break;
2390
432
    case MFF_NSH_SI:
2391
432
        match->wc.masks.nsh.path_hdr &= ~htonl(NSH_SI_MASK);
2392
432
        nsh_path_hdr_set_si(&match->flow.nsh.path_hdr, 0);
2393
432
        break;
2394
255
    case MFF_NSH_C1:
2395
549
    case MFF_NSH_C2:
2396
806
    case MFF_NSH_C3:
2397
1.17k
    case MFF_NSH_C4:
2398
1.17k
        MATCH_SET_FIELD_MASKED(match, nsh.context[mf->id - MFF_NSH_C1],
2399
1.17k
                               htonl(0), htonl(0));
2400
1.17k
        break;
2401
2402
0
    case MFF_N_IDS:
2403
0
    default:
2404
0
        OVS_NOT_REACHED();
2405
29.4k
    }
2406
29.4k
}
2407
2408
/* Makes 'match' match field 'mf' with the specified 'value' and 'mask'.
2409
 * 'value' specifies a value to match and 'mask' specifies a wildcard pattern,
2410
 * with a 1-bit indicating that the corresponding value bit must match and a
2411
 * 0-bit indicating a don't-care.
2412
 *
2413
 * If 'mask' is NULL or points to all-1-bits, then this call is equivalent to
2414
 * mf_set_value(mf, value, match).  If 'mask' points to all-0-bits, then this
2415
 * call is equivalent to mf_set_wild(mf, match).
2416
 *
2417
 * 'mask' must be a valid mask for 'mf' (see mf_is_mask_valid()).  The caller
2418
 * is responsible for ensuring that 'match' meets 'mf''s prerequisites.
2419
 *
2420
 * If non-NULL, 'err_str' returns a malloc'ed string describing any errors
2421
 * with the request or NULL if there is no error. The caller is reponsible
2422
 * for freeing the string.
2423
 *
2424
 * Return a set of enum ofputil_protocol bits (as an uint32_t to avoid circular
2425
 * dependency on enum ofputil_protocol definition) indicating which OpenFlow
2426
 * protocol versions can support this functionality. */
2427
uint32_t
2428
mf_set(const struct mf_field *mf,
2429
       const union mf_value *value, const union mf_value *mask,
2430
       struct match *match, char **err_str)
2431
124k
{
2432
124k
    if (!mask || is_all_ones(mask, mf->n_bytes)) {
2433
52.8k
        mf_set_value(mf, value, match, err_str);
2434
52.8k
        return mf->usable_protocols_exact;
2435
71.8k
    } else if (is_all_zeros(mask, mf->n_bytes) && !mf_is_tun_metadata(mf)) {
2436
        /* Tunnel metadata matches on the existence of the field itself, so
2437
         * it still needs to be encoded even if the value is wildcarded. */
2438
29.4k
        mf_set_wild(mf, match, err_str);
2439
29.4k
        return OFPUTIL_P_ANY;
2440
29.4k
    }
2441
2442
42.4k
    if (err_str) {
2443
28.8k
        *err_str = NULL;
2444
28.8k
    }
2445
2446
    /* The cases where 'mask' is all-1-bits or all-0-bits were already handled
2447
     * above[*], so the code below only needs to work for the remaining cases
2448
     * of a nontrivial mask.
2449
     *
2450
     * [*] Except where the field is a tunnel metadata field and 'mask' is
2451
     *     all-0-bits; see above. */
2452
42.4k
    switch (mf->id) {
2453
213
    case MFF_CT_ZONE:
2454
411
    case MFF_CT_NW_PROTO:
2455
1.77k
    case MFF_RECIRC_ID:
2456
1.84k
    case MFF_PACKET_TYPE:
2457
1.90k
    case MFF_CONJ_ID:
2458
2.08k
    case MFF_IN_PORT:
2459
2.34k
    case MFF_IN_PORT_OXM:
2460
2.54k
    case MFF_ACTSET_OUTPUT:
2461
2.54k
    case MFF_SKB_PRIORITY:
2462
2.94k
    case MFF_ETH_TYPE:
2463
3.08k
    case MFF_DL_VLAN:
2464
3.30k
    case MFF_DL_VLAN_PCP:
2465
3.55k
    case MFF_VLAN_PCP:
2466
3.77k
    case MFF_MPLS_LABEL:
2467
3.97k
    case MFF_MPLS_TC:
2468
4.07k
    case MFF_MPLS_BOS:
2469
4.32k
    case MFF_MPLS_TTL:
2470
4.83k
    case MFF_IP_PROTO:
2471
4.89k
    case MFF_IP_TTL:
2472
5.22k
    case MFF_IP_DSCP:
2473
5.25k
    case MFF_IP_DSCP_SHIFTED:
2474
5.45k
    case MFF_IP_ECN:
2475
5.67k
    case MFF_ARP_OP:
2476
5.87k
    case MFF_ICMPV4_TYPE:
2477
6.04k
    case MFF_ICMPV4_CODE:
2478
6.09k
    case MFF_ICMPV6_TYPE:
2479
6.35k
    case MFF_ICMPV6_CODE:
2480
6.35k
    case MFF_ND_RESERVED:
2481
6.35k
    case MFF_ND_OPTIONS_TYPE:
2482
6.35k
        return OFPUTIL_P_NONE;
2483
2484
207
    case MFF_DP_HASH:
2485
207
        match_set_dp_hash_masked(match, ntohl(value->be32), ntohl(mask->be32));
2486
207
        break;
2487
196
    case MFF_TUN_ID:
2488
196
        match_set_tun_id_masked(match, value->be64, mask->be64);
2489
196
        break;
2490
251
    case MFF_TUN_SRC:
2491
251
        match_set_tun_src_masked(match, value->be32, mask->be32);
2492
251
        break;
2493
183
    case MFF_TUN_DST:
2494
183
        match_set_tun_dst_masked(match, value->be32, mask->be32);
2495
183
        break;
2496
197
    case MFF_TUN_IPV6_SRC:
2497
197
        match_set_tun_ipv6_src_masked(match, &value->ipv6, &mask->ipv6);
2498
197
        break;
2499
178
    case MFF_TUN_IPV6_DST:
2500
178
        match_set_tun_ipv6_dst_masked(match, &value->ipv6, &mask->ipv6);
2501
178
        break;
2502
316
    case MFF_TUN_FLAGS:
2503
316
        match_set_tun_flags_masked(match, ntohs(value->be16), ntohs(mask->be16));
2504
316
        break;
2505
204
    case MFF_TUN_GBP_ID:
2506
204
        match_set_tun_gbp_id_masked(match, value->be16, mask->be16);
2507
204
        break;
2508
594
    case MFF_TUN_GBP_FLAGS:
2509
594
        match_set_tun_gbp_flags_masked(match, value->u8, mask->u8);
2510
594
        break;
2511
533
    case MFF_TUN_TTL:
2512
533
        match_set_tun_ttl_masked(match, value->u8, mask->u8);
2513
533
        break;
2514
75
    case MFF_TUN_TOS:
2515
75
        match_set_tun_tos_masked(match, value->u8, mask->u8);
2516
75
        break;
2517
128
    case MFF_TUN_ERSPAN_VER:
2518
128
        match_set_tun_erspan_ver_masked(match, value->u8, mask->u8);
2519
128
        break;
2520
259
    case MFF_TUN_ERSPAN_IDX:
2521
259
        match_set_tun_erspan_idx_masked(match, ntohl(value->be32),
2522
259
                                        ntohl(mask->be32));
2523
259
        break;
2524
18
    case MFF_TUN_ERSPAN_DIR:
2525
18
        match_set_tun_erspan_dir_masked(match, value->u8, mask->u8);
2526
18
        break;
2527
0
    case MFF_TUN_ERSPAN_HWID:
2528
0
        match_set_tun_erspan_hwid_masked(match, value->u8, mask->u8);
2529
0
        break;
2530
435
    case MFF_TUN_GTPU_FLAGS:
2531
435
        match_set_tun_gtpu_flags_masked(match, value->u8, mask->u8);
2532
435
        break;
2533
0
    case MFF_TUN_GTPU_MSGTYPE:
2534
0
        match_set_tun_gtpu_msgtype_masked(match, value->u8, mask->u8);
2535
0
        break;
2536
13.3k
    CASE_MFF_TUN_METADATA:
2537
13.3k
        tun_metadata_set_match(mf, value, mask, match, err_str);
2538
13.3k
        break;
2539
2540
253
    case MFF_METADATA:
2541
253
        match_set_metadata_masked(match, value->be64, mask->be64);
2542
253
        break;
2543
2544
4.00k
    CASE_MFF_REGS:
2545
4.00k
        match_set_reg_masked(match, mf->id - MFF_REG0,
2546
4.00k
                             ntohl(value->be32), ntohl(mask->be32));
2547
4.00k
        break;
2548
2549
1.74k
    CASE_MFF_XREGS:
2550
1.74k
        match_set_xreg_masked(match, mf->id - MFF_XREG0,
2551
1.74k
                              ntohll(value->be64), ntohll(mask->be64));
2552
1.74k
        break;
2553
2554
927
    CASE_MFF_XXREGS: {
2555
927
        match_set_xxreg_masked(match, mf->id - MFF_XXREG0,
2556
927
                ntoh128(value->be128), ntoh128(mask->be128));
2557
927
        break;
2558
1.36k
    }
2559
2560
66
    case MFF_PKT_MARK:
2561
66
        match_set_pkt_mark_masked(match, ntohl(value->be32),
2562
66
                                  ntohl(mask->be32));
2563
66
        break;
2564
2565
573
    case MFF_CT_STATE:
2566
573
        match_set_ct_state_masked(match, ntohl(value->be32), ntohl(mask->be32));
2567
573
        break;
2568
2569
34
    case MFF_CT_MARK:
2570
34
        match_set_ct_mark_masked(match, ntohl(value->be32), ntohl(mask->be32));
2571
34
        break;
2572
2573
12
    case MFF_CT_LABEL:
2574
12
        match_set_ct_label_masked(match, ntoh128(value->be128),
2575
12
                                  ntoh128(mask->be128));
2576
12
        break;
2577
2578
169
    case MFF_CT_NW_SRC:
2579
169
        match_set_ct_nw_src_masked(match, value->be32, mask->be32);
2580
169
        break;
2581
2582
212
    case MFF_CT_NW_DST:
2583
212
        match_set_ct_nw_dst_masked(match, value->be32, mask->be32);
2584
212
        break;
2585
2586
46
    case MFF_CT_IPV6_SRC:
2587
46
        match_set_ct_ipv6_src_masked(match, &value->ipv6, &mask->ipv6);
2588
46
        break;
2589
2590
728
    case MFF_CT_IPV6_DST:
2591
728
        match_set_ct_ipv6_dst_masked(match, &value->ipv6, &mask->ipv6);
2592
728
        break;
2593
2594
173
    case MFF_CT_TP_SRC:
2595
173
        match_set_ct_tp_src_masked(match, value->be16, mask->be16);
2596
173
        break;
2597
2598
71
    case MFF_CT_TP_DST:
2599
71
        match_set_ct_tp_dst_masked(match, value->be16, mask->be16);
2600
71
        break;
2601
2602
241
    case MFF_ETH_DST:
2603
241
        match_set_dl_dst_masked(match, value->mac, mask->mac);
2604
241
        break;
2605
2606
397
    case MFF_ETH_SRC:
2607
397
        match_set_dl_src_masked(match, value->mac, mask->mac);
2608
397
        break;
2609
2610
224
    case MFF_ARP_SHA:
2611
259
    case MFF_ND_SLL:
2612
259
        match_set_arp_sha_masked(match, value->mac, mask->mac);
2613
259
        break;
2614
2615
45
    case MFF_ARP_THA:
2616
178
    case MFF_ND_TLL:
2617
178
        match_set_arp_tha_masked(match, value->mac, mask->mac);
2618
178
        break;
2619
2620
391
    case MFF_VLAN_TCI:
2621
391
        match_set_dl_tci_masked(match, value->be16, mask->be16);
2622
391
        break;
2623
2624
293
    case MFF_VLAN_VID:
2625
293
        match_set_vlan_vid_masked(match, value->be16, mask->be16);
2626
293
        break;
2627
2628
272
    case MFF_IPV4_SRC:
2629
272
        match_set_nw_src_masked(match, value->be32, mask->be32);
2630
272
        break;
2631
2632
524
    case MFF_IPV4_DST:
2633
524
        match_set_nw_dst_masked(match, value->be32, mask->be32);
2634
524
        break;
2635
2636
423
    case MFF_IPV6_SRC:
2637
423
        match_set_ipv6_src_masked(match, &value->ipv6, &mask->ipv6);
2638
423
        break;
2639
2640
392
    case MFF_IPV6_DST:
2641
392
        match_set_ipv6_dst_masked(match, &value->ipv6, &mask->ipv6);
2642
392
        break;
2643
2644
396
    case MFF_IPV6_LABEL:
2645
396
        if ((mask->be32 & htonl(IPV6_LABEL_MASK)) == htonl(IPV6_LABEL_MASK)) {
2646
179
            mf_set_value(mf, value, match, err_str);
2647
217
        } else {
2648
217
            match_set_ipv6_label_masked(match, value->be32, mask->be32);
2649
217
        }
2650
396
        break;
2651
2652
55
    case MFF_ND_TARGET:
2653
55
        match_set_nd_target_masked(match, &value->ipv6, &mask->ipv6);
2654
55
        break;
2655
2656
338
    case MFF_IP_FRAG:
2657
338
        match_set_nw_frag_masked(match, value->u8,
2658
338
                                 mask->u8 & FLOW_NW_FRAG_MASK);
2659
338
        break;
2660
2661
317
    case MFF_ARP_SPA:
2662
317
        match_set_nw_src_masked(match, value->be32, mask->be32);
2663
317
        break;
2664
2665
264
    case MFF_ARP_TPA:
2666
264
        match_set_nw_dst_masked(match, value->be32, mask->be32);
2667
264
        break;
2668
2669
383
    case MFF_TCP_SRC:
2670
942
    case MFF_UDP_SRC:
2671
1.13k
    case MFF_SCTP_SRC:
2672
1.13k
        match_set_tp_src_masked(match, value->be16, mask->be16);
2673
1.13k
        break;
2674
2675
203
    case MFF_TCP_DST:
2676
301
    case MFF_UDP_DST:
2677
523
    case MFF_SCTP_DST:
2678
523
        match_set_tp_dst_masked(match, value->be16, mask->be16);
2679
523
        break;
2680
2681
527
    case MFF_TCP_FLAGS:
2682
527
        match_set_tcp_flags_masked(match, value->be16, mask->be16);
2683
527
        break;
2684
2685
676
    case MFF_NSH_FLAGS:
2686
676
        MATCH_SET_FIELD_MASKED(match, nsh.flags, value->u8, mask->u8);
2687
676
        break;
2688
334
    case MFF_NSH_TTL:
2689
334
        MATCH_SET_FIELD_MASKED(match, nsh.ttl, value->u8, mask->u8);
2690
334
        break;
2691
10
    case MFF_NSH_MDTYPE:
2692
10
        MATCH_SET_FIELD_MASKED(match, nsh.mdtype, value->u8, mask->u8);
2693
10
        break;
2694
170
    case MFF_NSH_NP:
2695
170
        MATCH_SET_FIELD_MASKED(match, nsh.np, value->u8, mask->u8);
2696
170
        break;
2697
609
    case MFF_NSH_SPI:
2698
609
        match->wc.masks.nsh.path_hdr |= mask->be32;
2699
609
        nsh_path_hdr_set_spi(&match->flow.nsh.path_hdr,
2700
609
                             value->be32 & mask->be32);
2701
609
        break;
2702
229
    case MFF_NSH_SI:
2703
229
        match->wc.masks.nsh.path_hdr |= htonl(mask->u8);
2704
229
        nsh_path_hdr_set_si(&match->flow.nsh.path_hdr,
2705
229
                             value->u8 & mask->u8);
2706
229
        break;
2707
150
    case MFF_NSH_C1:
2708
395
    case MFF_NSH_C2:
2709
620
    case MFF_NSH_C3:
2710
979
    case MFF_NSH_C4:
2711
979
        MATCH_SET_FIELD_MASKED(match, nsh.context[mf->id - MFF_NSH_C1],
2712
979
                               value->be32, mask->be32);
2713
979
        break;
2714
2715
0
    case MFF_N_IDS:
2716
0
    default:
2717
0
        OVS_NOT_REACHED();
2718
42.4k
    }
2719
2720
36.0k
    return ((mf->usable_protocols_bitwise == mf->usable_protocols_cidr
2721
36.0k
             || ip_is_cidr(mask->be32))
2722
36.0k
            ? mf->usable_protocols_cidr
2723
36.0k
            : mf->usable_protocols_bitwise);
2724
42.4k
}
2725
2726
static enum ofperr
2727
mf_check__(const struct mf_subfield *sf, const struct match *match,
2728
           const char *type)
2729
42.3k
{
2730
42.3k
    if (!sf->field) {
2731
0
        VLOG_WARN_RL(&rl, "unknown %s field", type);
2732
0
        return OFPERR_OFPBAC_BAD_SET_TYPE;
2733
42.3k
    } else if (!sf->n_bits) {
2734
0
        VLOG_WARN_RL(&rl, "zero bit %s field %s", type, sf->field->name);
2735
0
        return OFPERR_OFPBAC_BAD_SET_LEN;
2736
42.3k
    } else if (sf->ofs >= sf->field->n_bits) {
2737
0
        VLOG_WARN_RL(&rl, "bit offset %d exceeds %d-bit width of %s field %s",
2738
0
                     sf->ofs, sf->field->n_bits, type, sf->field->name);
2739
0
        return OFPERR_OFPBAC_BAD_SET_LEN;
2740
42.3k
    } else if (sf->ofs + sf->n_bits > sf->field->n_bits) {
2741
0
        VLOG_WARN_RL(&rl, "bit offset %d and width %d exceeds %d-bit width "
2742
0
                     "of %s field %s", sf->ofs, sf->n_bits,
2743
0
                     sf->field->n_bits, type, sf->field->name);
2744
0
        return OFPERR_OFPBAC_BAD_SET_LEN;
2745
42.3k
    } else if (match && !mf_are_match_prereqs_ok(sf->field, match)) {
2746
254
        VLOG_WARN_RL(&rl, "%s field %s lacks correct prerequisites",
2747
254
                     type, sf->field->name);
2748
254
        return OFPERR_OFPBAC_MATCH_INCONSISTENT;
2749
42.1k
    } else {
2750
42.1k
        return 0;
2751
42.1k
    }
2752
42.3k
}
2753
2754
/* Sets all the bits in 'sf' to 1 within 'wc', if 'wc' is nonnull. */
2755
static void
2756
unwildcard_subfield(const struct mf_subfield *sf, struct flow_wildcards *wc)
2757
0
{
2758
0
    if (wc) {
2759
0
        union mf_value mask;
2760
2761
0
        memset(&mask, 0, sizeof mask);
2762
0
        bitwise_one(&mask, sf->field->n_bytes, sf->ofs, sf->n_bits);
2763
0
        mf_mask_field_masked(sf->field, &mask, wc);
2764
0
    }
2765
0
}
2766
2767
/* Copies 'src' into 'dst' within 'flow', and sets all the bits in 'src' and
2768
 * 'dst' to 1s in 'wc', if 'wc' is nonnull.
2769
 *
2770
 * 'src' and 'dst' may overlap. */
2771
void
2772
mf_subfield_copy(const struct mf_subfield *src,
2773
                 const struct mf_subfield *dst,
2774
                 struct flow *flow, struct flow_wildcards *wc)
2775
0
{
2776
0
    ovs_assert(src->n_bits == dst->n_bits);
2777
0
    if (mf_are_prereqs_ok(dst->field, flow, wc)
2778
0
        && mf_are_prereqs_ok(src->field, flow, wc)) {
2779
0
        unwildcard_subfield(src, wc);
2780
0
        unwildcard_subfield(dst, wc);
2781
2782
0
        union mf_value src_value;
2783
0
        union mf_value dst_value;
2784
0
        mf_get_value(dst->field, flow, &dst_value);
2785
0
        mf_get_value(src->field, flow, &src_value);
2786
0
        bitwise_copy(&src_value, src->field->n_bytes, src->ofs,
2787
0
                     &dst_value, dst->field->n_bytes, dst->ofs,
2788
0
                     src->n_bits);
2789
0
        mf_set_flow_value(dst->field, &dst_value, flow);
2790
0
    }
2791
0
}
2792
2793
/* Swaps the bits in 'src' and 'dst' within 'flow', and sets all the bits in
2794
 * 'src' and 'dst' to 1s in 'wc', if 'wc' is nonnull.
2795
 *
2796
 * 'src' and 'dst' may overlap. */
2797
void
2798
mf_subfield_swap(const struct mf_subfield *a,
2799
                 const struct mf_subfield *b,
2800
                 struct flow *flow, struct flow_wildcards *wc)
2801
0
{
2802
0
    ovs_assert(a->n_bits == b->n_bits);
2803
0
    if (mf_are_prereqs_ok(a->field, flow, wc)
2804
0
        && mf_are_prereqs_ok(b->field, flow, wc)) {
2805
0
        unwildcard_subfield(a, wc);
2806
0
        unwildcard_subfield(b, wc);
2807
2808
0
        union mf_value a_value;
2809
0
        union mf_value b_value;
2810
0
        mf_get_value(a->field, flow, &a_value);
2811
0
        mf_get_value(b->field, flow, &b_value);
2812
0
        union mf_value b2_value = b_value;
2813
2814
        /* Copy 'a' into 'b'. */
2815
0
        bitwise_copy(&a_value, a->field->n_bytes, a->ofs,
2816
0
                     &b_value, b->field->n_bytes, b->ofs,
2817
0
                     a->n_bits);
2818
0
        mf_set_flow_value(b->field, &b_value, flow);
2819
2820
        /* Copy original 'b' into 'a'. */
2821
0
        bitwise_copy(&b2_value, b->field->n_bytes, b->ofs,
2822
0
                     &a_value, a->field->n_bytes, a->ofs,
2823
0
                     b->n_bits);
2824
0
        mf_set_flow_value(a->field, &a_value, flow);
2825
0
    }
2826
0
}
2827
2828
/* Checks whether 'sf' is valid for reading a subfield out of 'flow'.  Returns
2829
 * 0 if so, otherwise an OpenFlow error code (e.g. as returned by
2830
 * ofp_mkerr()).  */
2831
enum ofperr
2832
mf_check_src(const struct mf_subfield *sf, const struct match *match)
2833
40.5k
{
2834
40.5k
    return mf_check__(sf, match, "source");
2835
40.5k
}
2836
2837
/* Checks whether 'sf' is valid for writing a subfield into 'flow'.  Returns 0
2838
 * if so, otherwise an OpenFlow error code (e.g. as returned by
2839
 * ofp_mkerr()). */
2840
enum ofperr
2841
mf_check_dst(const struct mf_subfield *sf, const struct match *match)
2842
1.82k
{
2843
1.82k
    int error = mf_check__(sf, match, "destination");
2844
1.82k
    if (!error && !sf->field->writable) {
2845
1
        VLOG_WARN_RL(&rl, "destination field %s is not writable",
2846
1
                     sf->field->name);
2847
1
        return OFPERR_OFPBAC_BAD_SET_ARGUMENT;
2848
1
    }
2849
1.82k
    return error;
2850
1.82k
}
2851
2852
/* Copies the value and wildcard bit pattern for 'mf' from 'match' into the
2853
 * 'value' and 'mask', respectively. */
2854
void
2855
mf_get(const struct mf_field *mf, const struct match *match,
2856
       union mf_value *value, union mf_value *mask)
2857
70.6k
{
2858
70.6k
    mf_get_value(mf, &match->flow, value);
2859
70.6k
    mf_get_mask(mf, &match->wc, mask);
2860
70.6k
}
2861
2862
static char *
2863
mf_from_integer_string(const struct mf_field *mf, const char *s,
2864
                       uint8_t *valuep, uint8_t *maskp)
2865
74.0k
{
2866
74.0k
    const char *err_str;
2867
74.0k
    char *tail;
2868
74.0k
    int err;
2869
2870
74.0k
    err = parse_int_string(s, valuep, mf->n_bytes, &tail);
2871
74.0k
    if (err || (*tail != '\0' && *tail != '/')) {
2872
93
        err_str = "value";
2873
93
        goto syntax_error;
2874
93
    }
2875
2876
73.9k
    if (*tail == '/') {
2877
30.9k
        err = parse_int_string(tail + 1, maskp, mf->n_bytes, &tail);
2878
30.9k
        if (err || *tail != '\0') {
2879
9
            err_str = "mask";
2880
9
            goto syntax_error;
2881
9
        }
2882
43.0k
    } else {
2883
43.0k
        memset(maskp, 0xff, mf->n_bytes);
2884
43.0k
    }
2885
2886
73.9k
    return NULL;
2887
2888
102
syntax_error:
2889
102
    if (err == ERANGE) {
2890
49
        return xasprintf("%s: %s too large for %u-byte field %s",
2891
49
                         s, err_str, mf->n_bytes, mf->name);
2892
53
    } else {
2893
53
        return xasprintf("%s: bad syntax for %s %s", s, mf->name, err_str);
2894
53
    }
2895
102
}
2896
2897
static char *
2898
mf_from_packet_type_string(const char *s, ovs_be32 *packet_type)
2899
486
{
2900
486
    const char *err_str;
2901
486
    char *tail;
2902
486
    int err;
2903
2904
486
    if (*s != '(') {
2905
4
        err_str = "missing '('";
2906
4
        goto syntax_error;
2907
4
    }
2908
482
    s++;
2909
482
    err = parse_int_string(s, (uint8_t *)packet_type, 2, &tail);
2910
482
    if (err) {
2911
2
        err_str = "ns";
2912
2
        goto syntax_error;
2913
2
    }
2914
480
    if (*tail != ',') {
2915
5
        err_str = "missing ','";
2916
5
        goto syntax_error;
2917
5
    }
2918
475
    s = tail + 1;
2919
475
    err = parse_int_string(s, ((uint8_t *)packet_type) + 2, 2, &tail);
2920
475
    if (err) {
2921
1
        err_str = "ns_type";
2922
1
        goto syntax_error;
2923
1
    }
2924
474
    if (*tail != ')') {
2925
7
        err_str = "missing ')'";
2926
7
        goto syntax_error;
2927
7
    }
2928
2929
467
    return NULL;
2930
2931
19
syntax_error:
2932
19
    return xasprintf("%s: bad syntax for packet type %s", s, err_str);
2933
474
}
2934
2935
static char *
2936
mf_from_ethernet_string(const struct mf_field *mf, const char *s,
2937
                        struct eth_addr *mac, struct eth_addr *mask)
2938
517
{
2939
517
    int n;
2940
2941
517
    ovs_assert(mf->n_bytes == ETH_ADDR_LEN);
2942
2943
517
    n = -1;
2944
517
    if (ovs_scan(s, ETH_ADDR_SCAN_FMT"%n", ETH_ADDR_SCAN_ARGS(*mac), &n)
2945
517
        && n == strlen(s)) {
2946
240
        *mask = eth_addr_exact;
2947
240
        return NULL;
2948
240
    }
2949
2950
277
    n = -1;
2951
277
    if (ovs_scan(s, ETH_ADDR_SCAN_FMT"/"ETH_ADDR_SCAN_FMT"%n",
2952
277
                 ETH_ADDR_SCAN_ARGS(*mac), ETH_ADDR_SCAN_ARGS(*mask), &n)
2953
277
        && n == strlen(s)) {
2954
208
        return NULL;
2955
208
    }
2956
2957
69
    return xasprintf("%s: invalid Ethernet address", s);
2958
277
}
2959
2960
static char *
2961
mf_from_ipv4_string(const struct mf_field *mf, const char *s,
2962
                    ovs_be32 *ip, ovs_be32 *mask)
2963
940
{
2964
940
    ovs_assert(mf->n_bytes == sizeof *ip);
2965
940
    return ip_parse_masked(s, ip, mask);
2966
940
}
2967
2968
static char *
2969
mf_from_ipv6_string(const struct mf_field *mf, const char *s,
2970
                    struct in6_addr *ipv6, struct in6_addr *mask)
2971
3.47k
{
2972
3.47k
    ovs_assert(mf->n_bytes == sizeof *ipv6);
2973
3.47k
    return ipv6_parse_masked(s, ipv6, mask);
2974
3.47k
}
2975
2976
static char *
2977
mf_from_ofp_port_string(const struct mf_field *mf, const char *s,
2978
                        const struct ofputil_port_map *port_map,
2979
                        ovs_be16 *valuep, ovs_be16 *maskp)
2980
145
{
2981
145
    ofp_port_t port;
2982
2983
145
    ovs_assert(mf->n_bytes == sizeof(ovs_be16));
2984
2985
145
    if (ofputil_port_from_string(s, port_map, &port)) {
2986
143
        *valuep = htons(ofp_to_u16(port));
2987
143
        *maskp = OVS_BE16_MAX;
2988
143
        return NULL;
2989
143
    }
2990
2
    return xasprintf("%s: invalid or unknown port for %s", s, mf->name);
2991
145
}
2992
2993
static char *
2994
mf_from_ofp_port_string32(const struct mf_field *mf, const char *s,
2995
                          const struct ofputil_port_map *port_map,
2996
                          ovs_be32 *valuep, ovs_be32 *maskp)
2997
301
{
2998
301
    ofp_port_t port;
2999
3000
301
    ovs_assert(mf->n_bytes == sizeof(ovs_be32));
3001
301
    if (ofputil_port_from_string(s, port_map, &port)) {
3002
299
        *valuep = ofputil_port_to_ofp11(port);
3003
299
        *maskp = OVS_BE32_MAX;
3004
299
        return NULL;
3005
299
    }
3006
2
    return xasprintf("%s: port value out of range for %s", s, mf->name);
3007
301
}
3008
3009
struct frag_handling {
3010
    const char *name;
3011
    uint8_t mask;
3012
    uint8_t value;
3013
};
3014
3015
static const struct frag_handling all_frags[] = {
3016
#define A FLOW_NW_FRAG_ANY
3017
#define L FLOW_NW_FRAG_LATER
3018
    /* name               mask  value */
3019
3020
    { "no",               A|L,  0     },
3021
    { "first",            A|L,  A     },
3022
    { "later",            A|L,  A|L   },
3023
3024
    { "no",               A,    0     },
3025
    { "yes",              A,    A     },
3026
3027
    { "not_later",        L,    0     },
3028
    { "later",            L,    L     },
3029
#undef A
3030
#undef L
3031
};
3032
3033
static char *
3034
mf_from_frag_string(const char *s, uint8_t *valuep, uint8_t *maskp)
3035
402
{
3036
402
    const struct frag_handling *h;
3037
3038
1.64k
    for (h = all_frags; h < &all_frags[ARRAY_SIZE(all_frags)]; h++) {
3039
1.58k
        if (!strcasecmp(s, h->name)) {
3040
            /* We force the upper bits of the mask on to make mf_parse_value()
3041
             * happy (otherwise it will never think it's an exact match.) */
3042
344
            *maskp = h->mask | ~FLOW_NW_FRAG_MASK;
3043
344
            *valuep = h->value;
3044
344
            return NULL;
3045
344
        }
3046
1.58k
    }
3047
3048
58
    return xasprintf("%s: unknown fragment type (valid types are \"no\", "
3049
58
                     "\"yes\", \"first\", \"later\", \"not_later\"", s);
3050
402
}
3051
3052
static char *
3053
parse_mf_flags(const char *s, const char *(*bit_to_string)(uint32_t),
3054
               const char *field_name, ovs_be16 *flagsp, ovs_be16 allowed,
3055
               ovs_be16 *maskp)
3056
2.68k
{
3057
2.68k
    int err;
3058
2.68k
    char *err_str;
3059
2.68k
    uint32_t flags, mask;
3060
3061
2.68k
    err = parse_flags(s, bit_to_string, '\0', field_name, &err_str,
3062
2.68k
                      &flags, ntohs(allowed), maskp ? &mask : NULL);
3063
2.68k
    if (err < 0) {
3064
96
        return err_str;
3065
96
    }
3066
3067
2.59k
    *flagsp = htons(flags);
3068
2.59k
    if (maskp) {
3069
2.59k
        *maskp = htons(mask);
3070
2.59k
    }
3071
3072
2.59k
    return NULL;
3073
2.68k
}
3074
3075
static char *
3076
mf_from_tcp_flags_string(const char *s, ovs_be16 *flagsp, ovs_be16 *maskp)
3077
1.40k
{
3078
1.40k
    return parse_mf_flags(s, packet_tcp_flag_to_string, "TCP", flagsp,
3079
1.40k
                          TCP_FLAGS_BE16(OVS_BE16_MAX), maskp);
3080
1.40k
}
3081
3082
static char *
3083
mf_from_tun_flags_string(const char *s, ovs_be16 *flagsp, ovs_be16 *maskp)
3084
1.28k
{
3085
1.28k
    return parse_mf_flags(s, flow_tun_flag_to_string, "tunnel", flagsp,
3086
1.28k
                          htons(FLOW_TNL_PUB_F_MASK), maskp);
3087
1.28k
}
3088
3089
static char *
3090
mf_from_ct_state_string(const char *s, ovs_be32 *flagsp, ovs_be32 *maskp)
3091
1.62k
{
3092
1.62k
    int err;
3093
1.62k
    char *err_str;
3094
1.62k
    uint32_t flags, mask;
3095
3096
1.62k
    err = parse_flags(s, ct_state_to_string, '\0', "ct_state", &err_str,
3097
1.62k
                      &flags, CS_SUPPORTED_MASK, maskp ? &mask : NULL);
3098
1.62k
    if (err < 0) {
3099
134
        return err_str;
3100
134
    }
3101
3102
1.48k
    *flagsp = htonl(flags);
3103
1.48k
    if (maskp) {
3104
1.48k
        *maskp = htonl(mask);
3105
1.48k
    }
3106
3107
1.48k
    return NULL;
3108
1.62k
}
3109
3110
/* Parses 's', a string value for field 'mf', into 'value' and 'mask'.  Returns
3111
 * NULL if successful, otherwise a malloc()'d string describing the error. */
3112
char *
3113
mf_parse(const struct mf_field *mf, const char *s,
3114
         const struct ofputil_port_map *port_map,
3115
         union mf_value *value, union mf_value *mask)
3116
115k
{
3117
115k
    char *error;
3118
3119
115k
    if (!strcmp(s, "*")) {
3120
30.6k
        memset(value, 0, mf->n_bytes);
3121
30.6k
        memset(mask, 0, mf->n_bytes);
3122
30.6k
        return NULL;
3123
30.6k
    }
3124
3125
84.6k
    switch (mf->string) {
3126
17.0k
    case MFS_DECIMAL:
3127
74.0k
    case MFS_HEXADECIMAL:
3128
74.0k
        error = mf_from_integer_string(mf, s,
3129
74.0k
                                       (uint8_t *) value, (uint8_t *) mask);
3130
74.0k
        break;
3131
3132
1.62k
    case MFS_CT_STATE:
3133
1.62k
        ovs_assert(mf->n_bytes == sizeof(ovs_be32));
3134
1.62k
        error = mf_from_ct_state_string(s, &value->be32, &mask->be32);
3135
1.62k
        break;
3136
3137
517
    case MFS_ETHERNET:
3138
517
        error = mf_from_ethernet_string(mf, s, &value->mac, &mask->mac);
3139
517
        break;
3140
3141
940
    case MFS_IPV4:
3142
940
        error = mf_from_ipv4_string(mf, s, &value->be32, &mask->be32);
3143
940
        break;
3144
3145
3.47k
    case MFS_IPV6:
3146
3.47k
        error = mf_from_ipv6_string(mf, s, &value->ipv6, &mask->ipv6);
3147
3.47k
        break;
3148
3149
145
    case MFS_OFP_PORT:
3150
145
        error = mf_from_ofp_port_string(mf, s, port_map,
3151
145
                                        &value->be16, &mask->be16);
3152
145
        break;
3153
3154
301
    case MFS_OFP_PORT_OXM:
3155
301
        error = mf_from_ofp_port_string32(mf, s, port_map,
3156
301
                                          &value->be32, &mask->be32);
3157
301
        break;
3158
3159
402
    case MFS_FRAG:
3160
402
        error = mf_from_frag_string(s, &value->u8, &mask->u8);
3161
402
        break;
3162
3163
1.28k
    case MFS_TNL_FLAGS:
3164
1.28k
        ovs_assert(mf->n_bytes == sizeof(ovs_be16));
3165
1.28k
        error = mf_from_tun_flags_string(s, &value->be16, &mask->be16);
3166
1.28k
        break;
3167
3168
1.40k
    case MFS_TCP_FLAGS:
3169
1.40k
        ovs_assert(mf->n_bytes == sizeof(ovs_be16));
3170
1.40k
        error = mf_from_tcp_flags_string(s, &value->be16, &mask->be16);
3171
1.40k
        break;
3172
3173
486
    case MFS_PACKET_TYPE:
3174
486
        ovs_assert(mf->n_bytes == sizeof(ovs_be32));
3175
486
        error = mf_from_packet_type_string(s, &value->be32);
3176
486
        mask->be32 = OVS_BE32_MAX;
3177
486
        break;
3178
3179
0
    default:
3180
0
        OVS_NOT_REACHED();
3181
84.6k
    }
3182
3183
84.6k
    if (!error && !mf_is_mask_valid(mf, mask)) {
3184
3
        error = xasprintf("%s: invalid mask for field %s", s, mf->name);
3185
3
    }
3186
84.6k
    return error;
3187
84.6k
}
3188
3189
/* Parses 's', a string value for field 'mf', into 'value'.  Returns NULL if
3190
 * successful, otherwise a malloc()'d string describing the error. */
3191
char *
3192
mf_parse_value(const struct mf_field *mf, const char *s,
3193
               const struct ofputil_port_map *port_map, union mf_value *value)
3194
23.9k
{
3195
23.9k
    union mf_value mask;
3196
23.9k
    char *error;
3197
3198
23.9k
    error = mf_parse(mf, s, port_map, value, &mask);
3199
23.9k
    if (error) {
3200
16
        return error;
3201
16
    }
3202
3203
23.9k
    if (!is_all_ones((const uint8_t *) &mask, mf->n_bytes)) {
3204
1
        return xasprintf("%s: wildcards not allowed here", s);
3205
1
    }
3206
23.9k
    return NULL;
3207
23.9k
}
3208
3209
static void
3210
mf_format_integer_string(const struct mf_field *mf, const uint8_t *valuep,
3211
                         const uint8_t *maskp, struct ds *s)
3212
35
{
3213
35
    if (mf->string == MFS_HEXADECIMAL) {
3214
32
        ds_put_hex(s, valuep, mf->n_bytes);
3215
32
    } else {
3216
3
        unsigned long long int integer = 0;
3217
3
        int i;
3218
3219
3
        ovs_assert(mf->n_bytes <= 8);
3220
10
        for (i = 0; i < mf->n_bytes; i++) {
3221
7
            integer = (integer << 8) | valuep[i];
3222
7
        }
3223
3
        ds_put_format(s, "%lld", integer);
3224
3
    }
3225
3226
35
    if (maskp) {
3227
        /* I guess we could write the mask in decimal for MFS_DECIMAL but I'm
3228
         * not sure that that a bit-mask written in decimal is ever easier to
3229
         * understand than the same bit-mask written in hexadecimal. */
3230
0
        ds_put_char(s, '/');
3231
0
        ds_put_hex(s, maskp, mf->n_bytes);
3232
0
    }
3233
35
}
3234
3235
static void
3236
mf_format_frag_string(uint8_t value, uint8_t mask, struct ds *s)
3237
3
{
3238
3
    const struct frag_handling *h;
3239
3240
3
    mask &= FLOW_NW_FRAG_MASK;
3241
3
    value &= mask;
3242
3243
13
    for (h = all_frags; h < &all_frags[ARRAY_SIZE(all_frags)]; h++) {
3244
12
        if (value == h->value && mask == h->mask) {
3245
2
            ds_put_cstr(s, h->name);
3246
2
            return;
3247
2
        }
3248
12
    }
3249
1
    ds_put_cstr(s, "<error>");
3250
1
}
3251
3252
static void
3253
mf_format_tnl_flags_string(ovs_be16 value, ovs_be16 mask, struct ds *s)
3254
14
{
3255
14
    format_flags_masked(s, NULL, flow_tun_flag_to_string, ntohs(value),
3256
14
                        ntohs(mask) & FLOW_TNL_PUB_F_MASK, FLOW_TNL_PUB_F_MASK);
3257
14
}
3258
3259
static void
3260
mf_format_tcp_flags_string(ovs_be16 value, ovs_be16 mask, struct ds *s)
3261
7
{
3262
7
    format_flags_masked(s, NULL, packet_tcp_flag_to_string, ntohs(value),
3263
7
                        TCP_FLAGS(mask), TCP_FLAGS(OVS_BE16_MAX));
3264
7
}
3265
3266
static void
3267
mf_format_ct_state_string(ovs_be32 value, ovs_be32 mask, struct ds *s)
3268
1
{
3269
1
    format_flags_masked(s, NULL, ct_state_to_string, ntohl(value),
3270
1
                        ntohl(mask), UINT16_MAX);
3271
1
}
3272
3273
static void
3274
mf_format_packet_type_string(ovs_be32 value, ovs_be32 mask, struct ds *s)
3275
36
{
3276
36
    format_packet_type_masked(s, value, mask);
3277
36
}
3278
3279
/* Appends to 's' a string representation of field 'mf' whose value is in
3280
 * 'value' and 'mask'.  'mask' may be NULL to indicate an exact match. */
3281
void
3282
mf_format(const struct mf_field *mf,
3283
          const union mf_value *value, const union mf_value *mask,
3284
          const struct ofputil_port_map *port_map,
3285
          struct ds *s)
3286
120
{
3287
120
    if (mask) {
3288
0
        if (is_all_zeros(mask, mf->n_bytes)) {
3289
0
            ds_put_cstr(s, "ANY");
3290
0
            return;
3291
0
        } else if (is_all_ones(mask, mf->n_bytes)) {
3292
0
            mask = NULL;
3293
0
        }
3294
0
    }
3295
3296
120
    switch (mf->string) {
3297
2
    case MFS_OFP_PORT_OXM:
3298
2
        if (!mask) {
3299
2
            ofp_port_t port;
3300
2
            ofputil_port_from_ofp11(value->be32, &port);
3301
2
            ofputil_format_port(port, port_map, s);
3302
2
            break;
3303
2
        }
3304
        /* fall through */
3305
18
    case MFS_OFP_PORT:
3306
18
        if (!mask) {
3307
18
            ofputil_format_port(u16_to_ofp(ntohs(value->be16)), port_map, s);
3308
18
            break;
3309
18
        }
3310
        /* fall through */
3311
3
    case MFS_DECIMAL:
3312
35
    case MFS_HEXADECIMAL:
3313
35
        mf_format_integer_string(mf, (uint8_t *) value, (uint8_t *) mask, s);
3314
35
        break;
3315
3316
1
    case MFS_CT_STATE:
3317
1
        mf_format_ct_state_string(value->be32,
3318
1
                                  mask ? mask->be32 : OVS_BE32_MAX, s);
3319
1
        break;
3320
3321
1
    case MFS_ETHERNET:
3322
1
        eth_format_masked(value->mac, mask ? &mask->mac : NULL, s);
3323
1
        break;
3324
3325
2
    case MFS_IPV4:
3326
2
        ip_format_masked(value->be32, mask ? mask->be32 : OVS_BE32_MAX, s);
3327
2
        break;
3328
3329
1
    case MFS_IPV6:
3330
1
        ipv6_format_masked(&value->ipv6, mask ? &mask->ipv6 : NULL, s);
3331
1
        break;
3332
3333
3
    case MFS_FRAG:
3334
3
        mf_format_frag_string(value->u8, mask ? mask->u8 : UINT8_MAX, s);
3335
3
        break;
3336
3337
14
    case MFS_TNL_FLAGS:
3338
14
        mf_format_tnl_flags_string(value->be16,
3339
14
                                   mask ? mask->be16 : OVS_BE16_MAX, s);
3340
14
        break;
3341
3342
7
    case MFS_TCP_FLAGS:
3343
7
        mf_format_tcp_flags_string(value->be16,
3344
7
                                   mask ? mask->be16 : OVS_BE16_MAX, s);
3345
7
        break;
3346
3347
36
    case MFS_PACKET_TYPE:
3348
36
        mf_format_packet_type_string(value->be32,
3349
36
                                     mask ? mask->be32 : OVS_BE32_MAX, s);
3350
36
        break;
3351
3352
0
    default:
3353
0
        OVS_NOT_REACHED();
3354
120
    }
3355
120
}
3356

3357
/* Makes subfield 'sf' within 'flow' exactly match the 'sf->n_bits'
3358
 * least-significant bits in 'x'.
3359
 */
3360
void
3361
mf_write_subfield_flow(const struct mf_subfield *sf,
3362
                       const union mf_subvalue *x, struct flow *flow)
3363
0
{
3364
0
    const struct mf_field *field = sf->field;
3365
0
    union mf_value value;
3366
3367
0
    mf_get_value(field, flow, &value);
3368
0
    bitwise_copy(x, sizeof *x, 0, &value, field->n_bytes,
3369
0
                 sf->ofs, sf->n_bits);
3370
0
    mf_set_flow_value(field, &value, flow);
3371
0
}
3372
3373
/* Makes subfield 'sf' within 'match' exactly match the 'sf->n_bits'
3374
 * least-significant bits in 'x'.
3375
 */
3376
void
3377
mf_write_subfield(const struct mf_subfield *sf, const union mf_subvalue *x,
3378
                  struct match *match)
3379
0
{
3380
0
    const struct mf_field *field = sf->field;
3381
0
    union mf_value value, mask;
3382
3383
0
    mf_get(field, match, &value, &mask);
3384
0
    bitwise_copy(x, sizeof *x, 0, &value, field->n_bytes, sf->ofs, sf->n_bits);
3385
0
    bitwise_one (                 &mask,  field->n_bytes, sf->ofs, sf->n_bits);
3386
0
    mf_set(field, &value, &mask, match, NULL);
3387
0
}
3388
3389
void
3390
mf_write_subfield_value(const struct mf_subfield *sf, const void *src,
3391
                        struct match *match)
3392
35.6k
{
3393
35.6k
    const struct mf_field *field = sf->field;
3394
35.6k
    union mf_value value, mask;
3395
35.6k
    unsigned int size = DIV_ROUND_UP(sf->n_bits, 8);
3396
3397
35.6k
    mf_get(field, match, &value, &mask);
3398
35.6k
    bitwise_copy(src, size, 0, &value, field->n_bytes, sf->ofs, sf->n_bits);
3399
35.6k
    bitwise_one (              &mask,  field->n_bytes, sf->ofs, sf->n_bits);
3400
35.6k
    mf_set(field, &value, &mask, match, NULL);
3401
35.6k
}
3402
3403
/* 'v' and 'm' correspond to values of 'field'.  This function copies them into
3404
 * 'match' in the correspond positions. */
3405
void
3406
mf_mask_subfield(const struct mf_field *field,
3407
                 const union mf_subvalue *v,
3408
                 const union mf_subvalue *m,
3409
                 struct match *match)
3410
0
{
3411
0
    union mf_value value, mask;
3412
3413
0
    mf_get(field, match, &value, &mask);
3414
0
    bitwise_copy(v, sizeof *v, 0, &value, field->n_bytes, 0, field->n_bits);
3415
0
    bitwise_copy(m, sizeof *m, 0, &mask,  field->n_bytes, 0, field->n_bits);
3416
0
    mf_set(field, &value, &mask, match, NULL);
3417
0
}
3418
3419
/* Initializes 'x' to the value of 'sf' within 'flow'.  'sf' must be valid for
3420
 * reading 'flow', e.g. as checked by mf_check_src(). */
3421
void
3422
mf_read_subfield(const struct mf_subfield *sf, const struct flow *flow,
3423
                 union mf_subvalue *x)
3424
0
{
3425
0
    union mf_value value;
3426
3427
0
    mf_get_value(sf->field, flow, &value);
3428
3429
0
    memset(x, 0, sizeof *x);
3430
0
    bitwise_copy(&value, sf->field->n_bytes, sf->ofs,
3431
0
                 x, sizeof *x, 0,
3432
0
                 sf->n_bits);
3433
0
}
3434
3435
/* Returns the value of 'sf' within 'flow'.  'sf' must be valid for reading
3436
 * 'flow', e.g. as checked by mf_check_src() and sf->n_bits must be 64 or
3437
 * less. */
3438
uint64_t
3439
mf_get_subfield(const struct mf_subfield *sf, const struct flow *flow)
3440
0
{
3441
0
    union mf_value value;
3442
3443
0
    mf_get_value(sf->field, flow, &value);
3444
0
    return bitwise_get(&value, sf->field->n_bytes, sf->ofs, sf->n_bits);
3445
0
}
3446
3447
void
3448
mf_format_subvalue(const union mf_subvalue *subvalue, struct ds *s)
3449
0
{
3450
0
    ds_put_hex(s, subvalue->u8, sizeof subvalue->u8);
3451
0
}
3452
3453
void
3454
field_array_set(enum mf_field_id id, const union mf_value *value,
3455
                struct field_array *fa)
3456
0
{
3457
0
    size_t i, offset = 0;
3458
3459
0
    ovs_assert(id < MFF_N_IDS);
3460
3461
    /* Find the spot for 'id'. */
3462
0
    BITMAP_FOR_EACH_1 (i, id, fa->used.bm) {
3463
0
        offset += mf_from_id(i)->n_bytes;
3464
0
    }
3465
3466
0
    size_t value_size = mf_from_id(id)->n_bytes;
3467
3468
    /* make room if necessary. */
3469
0
    if (!bitmap_is_set(fa->used.bm, id)) {
3470
0
        fa->values = xrealloc(fa->values, fa->values_size + value_size);
3471
        /* Move remainder forward, if any. */
3472
0
        if (offset < fa->values_size) {
3473
0
            memmove(fa->values + offset + value_size, fa->values + offset,
3474
0
                    fa->values_size - offset);
3475
0
        }
3476
0
        fa->values_size += value_size;
3477
0
    }
3478
0
    bitmap_set1(fa->used.bm, id);
3479
3480
0
    memcpy(fa->values + offset, value, value_size);
3481
0
}
3482
3483
/* A wrapper for variable length mf_fields that is maintained by
3484
 * struct vl_mff_map.*/
3485
struct vl_mf_field {
3486
    struct mf_field mf;
3487
    struct ovs_refcount ref_cnt;
3488
    struct cmap_node cmap_node; /* In ofproto->vl_mff_map->cmap. */
3489
};
3490
3491
static inline uint32_t
3492
mf_field_hash(uint32_t key)
3493
0
{
3494
0
    return hash_int(key, 0);
3495
0
}
3496
3497
static void
3498
vmf_delete(struct vl_mf_field *vmf)
3499
0
{
3500
0
    if (ovs_refcount_unref(&vmf->ref_cnt) == 1) {
3501
        /* Postpone as this function is typically called immediately
3502
         * after removing from cmap. */
3503
0
        ovsrcu_postpone(free, vmf);
3504
0
    } else {
3505
0
        VLOG_WARN_RL(&rl,
3506
0
                     "Attempted to delete VMF %s but refcount is nonzero!",
3507
0
                     vmf->mf.name);
3508
0
    }
3509
0
}
3510
3511
enum ofperr
3512
mf_vl_mff_map_clear(struct vl_mff_map *vl_mff_map, bool force)
3513
    OVS_REQUIRES(vl_mff_map->mutex)
3514
0
{
3515
0
    struct vl_mf_field *vmf;
3516
3517
0
    if (!force) {
3518
0
        CMAP_FOR_EACH (vmf, cmap_node, &vl_mff_map->cmap) {
3519
0
            if (ovs_refcount_read(&vmf->ref_cnt) != 1) {
3520
0
                return OFPERR_NXTTMFC_INVALID_TLV_DEL;
3521
0
            }
3522
0
        }
3523
0
    }
3524
3525
0
    CMAP_FOR_EACH (vmf, cmap_node, &vl_mff_map->cmap) {
3526
0
        cmap_remove(&vl_mff_map->cmap, &vmf->cmap_node,
3527
0
                    mf_field_hash(vmf->mf.id));
3528
0
        vmf_delete(vmf);
3529
0
    }
3530
3531
0
    return 0;
3532
0
}
3533
3534
static struct vl_mf_field *
3535
mf_get_vl_mff__(uint32_t id, const struct vl_mff_map *vl_mff_map)
3536
0
{
3537
0
    struct vl_mf_field *vmf;
3538
3539
0
    CMAP_FOR_EACH_WITH_HASH (vmf, cmap_node, mf_field_hash(id),
3540
0
                             &vl_mff_map->cmap) {
3541
0
        if (vmf->mf.id == id) {
3542
0
            return vmf;
3543
0
        }
3544
0
    }
3545
3546
0
    return NULL;
3547
0
}
3548
3549
/* If 'mff' is a variable length field, looks up 'vl_mff_map', returns a
3550
 * pointer to the variable length meta-flow field corresponding to 'mff'.
3551
 * Returns NULL if no mapping is existed for 'mff'. */
3552
const struct mf_field *
3553
mf_get_vl_mff(const struct mf_field *mff,
3554
              const struct vl_mff_map *vl_mff_map)
3555
0
{
3556
0
    if (mff && mff->variable_len && vl_mff_map) {
3557
0
        struct vl_mf_field *vl_mff = mf_get_vl_mff__(mff->id, vl_mff_map);
3558
3559
0
        return vl_mff ? &vl_mff->mf : NULL;
3560
0
    }
3561
3562
0
    return NULL;
3563
0
}
3564
3565
static enum ofperr
3566
mf_vl_mff_map_del(struct vl_mff_map *vl_mff_map,
3567
                  const struct ofputil_tlv_table_mod *ttm, bool force)
3568
    OVS_REQUIRES(vl_mff_map->mutex)
3569
0
{
3570
0
    struct ofputil_tlv_map *tlv_map;
3571
0
    struct vl_mf_field *vmf;
3572
0
    unsigned int idx;
3573
3574
0
    if (!force) {
3575
0
        LIST_FOR_EACH (tlv_map, list_node, &ttm->mappings) {
3576
0
            idx = MFF_TUN_METADATA0 + tlv_map->index;
3577
0
            if (idx >= MFF_TUN_METADATA0 + TUN_METADATA_NUM_OPTS) {
3578
0
                return OFPERR_NXTTMFC_BAD_FIELD_IDX;
3579
0
            }
3580
3581
0
            vmf = mf_get_vl_mff__(idx, vl_mff_map);
3582
0
            if (vmf && ovs_refcount_read(&vmf->ref_cnt) != 1) {
3583
0
                return OFPERR_NXTTMFC_INVALID_TLV_DEL;
3584
0
            }
3585
0
        }
3586
0
    }
3587
3588
0
    LIST_FOR_EACH (tlv_map, list_node, &ttm->mappings) {
3589
0
        idx = MFF_TUN_METADATA0 + tlv_map->index;
3590
0
        if (idx >= MFF_TUN_METADATA0 + TUN_METADATA_NUM_OPTS) {
3591
0
            return OFPERR_NXTTMFC_BAD_FIELD_IDX;
3592
0
        }
3593
3594
0
        vmf = mf_get_vl_mff__(idx, vl_mff_map);
3595
0
        if (vmf) {
3596
0
            cmap_remove(&vl_mff_map->cmap, &vmf->cmap_node,
3597
0
                        mf_field_hash(idx));
3598
0
            vmf_delete(vmf);
3599
0
        }
3600
0
    }
3601
3602
0
    return 0;
3603
0
}
3604
3605
static enum ofperr
3606
mf_vl_mff_map_add(struct vl_mff_map *vl_mff_map,
3607
                  const struct ofputil_tlv_table_mod *ttm)
3608
    OVS_REQUIRES(vl_mff_map->mutex)
3609
0
{
3610
0
    struct ofputil_tlv_map *tlv_map;
3611
0
    struct vl_mf_field *vmf;
3612
0
    unsigned int idx;
3613
3614
0
    LIST_FOR_EACH (tlv_map, list_node, &ttm->mappings) {
3615
0
        idx = MFF_TUN_METADATA0 + tlv_map->index;
3616
0
        if (idx >= MFF_TUN_METADATA0 + TUN_METADATA_NUM_OPTS) {
3617
0
            return OFPERR_NXTTMFC_BAD_FIELD_IDX;
3618
0
        }
3619
3620
0
        vmf = xmalloc(sizeof *vmf);
3621
0
        vmf->mf = mf_fields[idx];
3622
0
        vmf->mf.n_bytes = tlv_map->option_len;
3623
0
        vmf->mf.n_bits = tlv_map->option_len * 8;
3624
0
        vmf->mf.mapped = true;
3625
0
        ovs_refcount_init(&vmf->ref_cnt);
3626
3627
0
        cmap_insert(&vl_mff_map->cmap, &vmf->cmap_node,
3628
0
                    mf_field_hash(idx));
3629
0
    }
3630
3631
0
    return 0;
3632
0
}
3633
3634
/* Updates the tun_metadata mf_field in 'vl_mff_map' according to 'ttm'.
3635
 * This function must be invoked after tun_metadata_table_mod().
3636
 * Returns OFPERR_NXTTMFC_BAD_FIELD_IDX, if the index for the vl_mf_field is
3637
 * invalid.
3638
 * Returns OFPERR_NXTTMFC_INVALID_TLV_DEL, if 'ttm' tries to delete an
3639
 * vl_mf_field that is still used by any active flow.*/
3640
enum ofperr
3641
mf_vl_mff_map_mod_from_tun_metadata(struct vl_mff_map *vl_mff_map,
3642
                                    const struct ofputil_tlv_table_mod *ttm)
3643
    OVS_REQUIRES(vl_mff_map->mutex)
3644
0
{
3645
0
    switch (ttm->command) {
3646
0
    case NXTTMC_ADD:
3647
0
        return mf_vl_mff_map_add(vl_mff_map, ttm);
3648
3649
0
    case NXTTMC_DELETE:
3650
0
        return mf_vl_mff_map_del(vl_mff_map, ttm, false);
3651
3652
0
    case NXTTMC_CLEAR:
3653
0
        return mf_vl_mff_map_clear(vl_mff_map, false);
3654
3655
0
    default:
3656
0
        OVS_NOT_REACHED();
3657
0
    }
3658
3659
0
    return 0;
3660
0
}
3661
3662
/* Returns true if a variable length meta-flow field 'mff' is not mapped in
3663
 * the 'vl_mff_map'. */
3664
bool
3665
mf_vl_mff_invalid(const struct mf_field *mff, const struct vl_mff_map *map)
3666
0
{
3667
0
    return map && mff && mff->variable_len && !mff->mapped;
3668
0
}
3669
3670
void
3671
mf_vl_mff_set_tlv_bitmap(const struct mf_field *mff, uint64_t *tlv_bitmap)
3672
0
{
3673
0
    if (mff && mff->mapped) {
3674
0
        ovs_assert(mf_is_tun_metadata(mff));
3675
0
        ULLONG_SET1(*tlv_bitmap, mff->id - MFF_TUN_METADATA0);
3676
0
    }
3677
0
}
3678
3679
static void
3680
mf_vl_mff_ref_cnt_mod(const struct vl_mff_map *map, uint64_t tlv_bitmap,
3681
                      bool ref)
3682
0
{
3683
0
    struct vl_mf_field *vmf;
3684
0
    int i;
3685
3686
0
    if (map) {
3687
0
        ULLONG_FOR_EACH_1 (i, tlv_bitmap) {
3688
0
            vmf = mf_get_vl_mff__(i + MFF_TUN_METADATA0, map);
3689
0
            if (vmf) {
3690
0
                if (ref) {
3691
0
                    ovs_refcount_ref(&vmf->ref_cnt);
3692
0
                } else {
3693
0
                    ovs_refcount_unref(&vmf->ref_cnt);
3694
0
                }
3695
0
            } else {
3696
0
                VLOG_WARN("Invalid TLV index %d.", i);
3697
0
            }
3698
0
        }
3699
0
    }
3700
0
}
3701
3702
void
3703
mf_vl_mff_ref(const struct vl_mff_map *map, uint64_t tlv_bitmap)
3704
0
{
3705
0
    mf_vl_mff_ref_cnt_mod(map, tlv_bitmap, true);
3706
0
}
3707
3708
void
3709
mf_vl_mff_unref(const struct vl_mff_map *map, uint64_t tlv_bitmap)
3710
0
{
3711
0
    mf_vl_mff_ref_cnt_mod(map, tlv_bitmap, false);
3712
0
}
3713
3714
enum ofperr
3715
mf_vl_mff_nx_pull_header(struct ofpbuf *b, const struct vl_mff_map *vl_mff_map,
3716
                         const struct mf_field **field, bool *masked,
3717
                         uint64_t *tlv_bitmap)
3718
0
{
3719
0
    enum ofperr error = nx_pull_header(b, vl_mff_map, field, masked);
3720
0
    if (error) {
3721
0
        return error;
3722
0
    }
3723
3724
0
    mf_vl_mff_set_tlv_bitmap(*field, tlv_bitmap);
3725
0
    return 0;
3726
0
}
3727
3728
enum ofperr
3729
mf_vl_mff_nx_pull_entry(struct ofpbuf *b, const struct vl_mff_map *vl_mff_map,
3730
                        const struct mf_field **field, union mf_value *value,
3731
                        union mf_value *mask, uint64_t *tlv_bitmap)
3732
0
{
3733
0
    enum ofperr error = nx_pull_entry(b, vl_mff_map, field, value, mask, true);
3734
0
    if (error) {
3735
0
        return error;
3736
0
    }
3737
3738
0
    mf_vl_mff_set_tlv_bitmap(*field, tlv_bitmap);
3739
0
    return 0;
3740
0
}
3741
3742
enum ofperr
3743
mf_vl_mff_mf_from_nxm_header(uint32_t header,
3744
                             const struct vl_mff_map *vl_mff_map,
3745
                             const struct mf_field **field,
3746
                             uint64_t *tlv_bitmap)
3747
0
{
3748
0
    *field = mf_from_nxm_header(header, vl_mff_map);
3749
0
    if (!*field) {
3750
0
        return OFPERR_OFPBAC_BAD_SET_TYPE;
3751
0
    } else if (mf_vl_mff_invalid(*field, vl_mff_map)) {
3752
0
        return OFPERR_NXFMFC_INVALID_TLV_FIELD;
3753
0
    }
3754
3755
0
    mf_vl_mff_set_tlv_bitmap(*field, tlv_bitmap);
3756
0
    return 0;
3757
0
}
3758

3759
/* Returns true if the 1-bits in 'super' are a superset of the 1-bits in 'sub',
3760
 * false otherwise. */
3761
bool
3762
mf_bitmap_is_superset(const struct mf_bitmap *super,
3763
                      const struct mf_bitmap *sub)
3764
0
{
3765
0
    return bitmap_is_superset(super->bm, sub->bm, MFF_N_IDS);
3766
0
}
3767
3768
/* Returns the bitwise-and of 'a' and 'b'. */
3769
struct mf_bitmap
3770
mf_bitmap_and(struct mf_bitmap a, struct mf_bitmap b)
3771
0
{
3772
0
    bitmap_and(a.bm, b.bm, MFF_N_IDS);
3773
0
    return a;
3774
0
}
3775
3776
/* Returns the bitwise-or of 'a' and 'b'. */
3777
struct mf_bitmap
3778
mf_bitmap_or(struct mf_bitmap a, struct mf_bitmap b)
3779
0
{
3780
0
    bitmap_or(a.bm, b.bm, MFF_N_IDS);
3781
0
    return a;
3782
0
}
3783
3784
/* Returns the bitwise-not of 'x'. */
3785
struct mf_bitmap
3786
mf_bitmap_not(struct mf_bitmap x)
3787
0
{
3788
0
    bitmap_not(x.bm, MFF_N_IDS);
3789
0
    return x;
3790
0
}
3791
3792
void
3793
mf_set_mask_l3_prereqs(const struct mf_field *mf, const struct flow *fl,
3794
                       struct flow_wildcards *wc)
3795
0
{
3796
0
    if (is_ip_any(fl) &&
3797
0
        ((mf->id == MFF_IPV4_SRC) ||
3798
0
         (mf->id == MFF_IPV4_DST) ||
3799
0
         (mf->id == MFF_IPV6_SRC) ||
3800
0
         (mf->id == MFF_IPV6_DST) ||
3801
0
         (mf->id == MFF_IPV6_LABEL) ||
3802
0
         (mf->id == MFF_IP_DSCP) ||
3803
0
         (mf->id == MFF_IP_ECN) ||
3804
0
         (mf->id == MFF_IP_TTL))) {
3805
0
        WC_MASK_FIELD(wc, nw_proto);
3806
0
    } else if ((fl->dl_type == htons(ETH_TYPE_ARP)) &&
3807
0
               ((mf->id == MFF_ARP_OP) ||
3808
0
                (mf->id == MFF_ARP_SHA) ||
3809
0
                (mf->id == MFF_ARP_THA) ||
3810
0
                (mf->id == MFF_ARP_SPA) ||
3811
0
                (mf->id == MFF_ARP_TPA))) {
3812
        /* mask only the lower 8 bits. */
3813
0
        wc->masks.nw_proto = 0xff;
3814
0
    }
3815
0
}