On Wed, Jan 24, 2018 at 11:06 AM, William Tu <u9012...@gmail.com> wrote:
> The patch adds support for openvswitch to configure erspan
> v1 and v2.  The OVS_TUNNEL_KEY_ATTR_ERSPAN_OPTS attr is added
> to uapi as a binary blob to support all ERSPAN v1 and v2's
> fields.  Note that Previous commit "openvswitch: Add erspan tunnel
> support." was reverted since it does not design properly.
>
> Signed-off-by: William Tu <u9012...@gmail.com>
> ---
>  include/uapi/linux/openvswitch.h |  2 +-
>  net/openvswitch/flow_netlink.c   | 90 
> +++++++++++++++++++++++++++++++++++++++-
>  2 files changed, 90 insertions(+), 2 deletions(-)
>
> diff --git a/include/uapi/linux/openvswitch.h 
> b/include/uapi/linux/openvswitch.h
> index dcfab5e3b55c..158c2e45c0a5 100644
> --- a/include/uapi/linux/openvswitch.h
> +++ b/include/uapi/linux/openvswitch.h
> @@ -273,7 +273,6 @@ enum {
>
>  #define OVS_VXLAN_EXT_MAX (__OVS_VXLAN_EXT_MAX - 1)
>
> -
>  /* OVS_VPORT_ATTR_OPTIONS attributes for tunnels.
>   */
>  enum {
> @@ -363,6 +362,7 @@ enum ovs_tunnel_key_attr {
>         OVS_TUNNEL_KEY_ATTR_IPV6_SRC,           /* struct in6_addr src IPv6 
> address. */
>         OVS_TUNNEL_KEY_ATTR_IPV6_DST,           /* struct in6_addr dst IPv6 
> address. */
>         OVS_TUNNEL_KEY_ATTR_PAD,
> +       OVS_TUNNEL_KEY_ATTR_ERSPAN_OPTS,        /* struct erspan_metadata */
>         __OVS_TUNNEL_KEY_ATTR_MAX
>  };
>
Since this is uapi, we need to define the struct erspan_metadata in a
UAPI header file.

Also lets move field 'version' to the begining of the struct for easy
expansion later.
struct erspan_metadata {
        int version;
        union {
                __be32 index;           /* Version 1 (type II)*/
                struct erspan_md2 md2;  /* Version 2 (type III) */
        } u;
};

> diff --git a/net/openvswitch/flow_netlink.c b/net/openvswitch/flow_netlink.c
> index f143908b651d..9d00c24b2836 100644
> --- a/net/openvswitch/flow_netlink.c
> +++ b/net/openvswitch/flow_netlink.c
> @@ -49,6 +49,7 @@
>  #include <net/mpls.h>
>  #include <net/vxlan.h>
>  #include <net/tun_proto.h>
> +#include <net/erspan.h>
>
>  #include "flow_netlink.h"
>
> @@ -329,7 +330,8 @@ size_t ovs_tun_key_attr_size(void)
>                 + nla_total_size(0)    /* OVS_TUNNEL_KEY_ATTR_CSUM */
>                 + nla_total_size(0)    /* OVS_TUNNEL_KEY_ATTR_OAM */
>                 + nla_total_size(256)  /* OVS_TUNNEL_KEY_ATTR_GENEVE_OPTS */
> -               /* OVS_TUNNEL_KEY_ATTR_VXLAN_OPTS is mutually exclusive with
> +               /* OVS_TUNNEL_KEY_ATTR_VXLAN_OPTS and
> +                * OVS_TUNNEL_KEY_ATTR_ERSPAN_OPTS is mutually exclusive with
>                  * OVS_TUNNEL_KEY_ATTR_GENEVE_OPTS and covered by it.
>                  */
>                 + nla_total_size(2)    /* OVS_TUNNEL_KEY_ATTR_TP_SRC */
> @@ -400,6 +402,7 @@ static const struct ovs_len_tbl 
> ovs_tunnel_key_lens[OVS_TUNNEL_KEY_ATTR_MAX + 1]
>                                                 .next = 
> ovs_vxlan_ext_key_lens },
>         [OVS_TUNNEL_KEY_ATTR_IPV6_SRC]      = { .len = sizeof(struct 
> in6_addr) },
>         [OVS_TUNNEL_KEY_ATTR_IPV6_DST]      = { .len = sizeof(struct 
> in6_addr) },
> +       [OVS_TUNNEL_KEY_ATTR_ERSPAN_OPTS]   = { .len = OVS_ATTR_VARIABLE },
>  };
>
>  static const struct ovs_len_tbl
> @@ -631,6 +634,33 @@ static int vxlan_tun_opt_from_nlattr(const struct nlattr 
> *attr,
>         return 0;
>  }
>
> +static int erspan_tun_opt_from_nlattr(const struct nlattr *a,
> +                                     struct sw_flow_match *match, bool 
> is_mask,
> +                                     bool log)
> +{
> +       unsigned long opt_key_offset;
> +
> +       BUILD_BUG_ON(sizeof(struct erspan_metadata) >
> +                    sizeof(match->key->tun_opts));
> +
> +       if (nla_len(a) > sizeof(match->key->tun_opts)) {
> +               OVS_NLERR(log, "ERSPAN option length err (len %d, max %zu).",
> +                         nla_len(a), sizeof(match->key->tun_opts));
> +               return -EINVAL;
> +       }
> +
> +       if (!is_mask)
> +               SW_FLOW_KEY_PUT(match, tun_opts_len,
> +                               sizeof(struct erspan_metadata), false);
> +       else
> +               SW_FLOW_KEY_PUT(match, tun_opts_len, 0xff, true);
> +
> +       opt_key_offset = TUN_METADATA_OFFSET(nla_len(a));
> +       SW_FLOW_KEY_MEMCPY_OFFSET(match, opt_key_offset, nla_data(a),
> +                                 nla_len(a), is_mask);
> +       return 0;
> +}
> +
...
> @@ -2461,6 +2509,41 @@ static int validate_geneve_opts(struct sw_flow_key 
> *key)
>         return 0;
>  }
>
> +static int validate_erspan_opts(struct sw_flow_key *key, bool log)
> +{
I do not see any need to validate ERSPAN key values, except the total
len, which should be less than 255.

> +
>  static int validate_and_copy_set_tun(const struct nlattr *attr,
>                                      struct sw_flow_actions **sfa, bool log)
>  {
> @@ -2486,6 +2569,11 @@ static int validate_and_copy_set_tun(const struct 
> nlattr *attr,
>                         break;
>                 case OVS_TUNNEL_KEY_ATTR_VXLAN_OPTS:
>                         break;
> +               case OVS_TUNNEL_KEY_ATTR_ERSPAN_OPTS:
> +                       err = validate_erspan_opts(&key, log);
> +                       if (err < 0)
> +                               return err;
> +                       break;
>                 }
>         };
>
> --
> 2.7.4
>

Reply via email to