diff options
author | Jarno Rajahalme <jrajahalme@nicira.com> | 2015-02-06 00:40:49 +0300 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2015-02-08 09:40:17 +0300 |
commit | 83d2b9ba1abca241df44a502b6da950a25856b5b (patch) | |
tree | 16b6618df6b9cdbbf955457352cb71acd8cca324 /net/rds/iw_cm.c | |
parent | 2150f984258e7909327cb90115c8ff41b4e9acb5 (diff) | |
download | linux-83d2b9ba1abca241df44a502b6da950a25856b5b.tar.xz |
net: openvswitch: Support masked set actions.
OVS userspace already probes the openvswitch kernel module for
OVS_ACTION_ATTR_SET_MASKED support. This patch adds the kernel module
implementation of masked set actions.
The existing set action sets many fields at once. When only a subset
of the IP header fields, for example, should be modified, all the IP
fields need to be exact matched so that the other field values can be
copied to the set action. A masked set action allows modification of
an arbitrary subset of the supported header bits without requiring the
rest to be matched.
Masked set action is now supported for all writeable key types, except
for the tunnel key. The set tunnel action is an exception as any
input tunnel info is cleared before action processing starts, so there
is no tunnel info to mask.
The kernel module converts all (non-tunnel) set actions to masked set
actions. This makes action processing more uniform, and results in
less branching and duplicating the action processing code. When
returning actions to userspace, the fully masked set actions are
converted back to normal set actions. We use a kernel internal action
code to be able to tell the userspace provided and converted masked
set actions apart.
Signed-off-by: Jarno Rajahalme <jrajahalme@nicira.com>
Acked-by: Pravin B Shelar <pshelar@nicira.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/rds/iw_cm.c')
0 files changed, 0 insertions, 0 deletions