mirror of
https://github.com/openvswitch/ovs
synced 2025-10-15 14:17:18 +00:00
233 lines
7.3 KiB
C
233 lines
7.3 KiB
C
/*
|
|
* Copyright (c) 2008, 2009, 2010, 2011 Nicira Networks.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at:
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include <config.h>
|
|
#include "pktbuf.h"
|
|
#include <inttypes.h>
|
|
#include <stdlib.h>
|
|
#include "coverage.h"
|
|
#include "ofp-util.h"
|
|
#include "ofpbuf.h"
|
|
#include "timeval.h"
|
|
#include "util.h"
|
|
#include "vconn.h"
|
|
#include "vlog.h"
|
|
|
|
VLOG_DEFINE_THIS_MODULE(pktbuf);
|
|
|
|
COVERAGE_DEFINE(pktbuf_buffer_unknown);
|
|
COVERAGE_DEFINE(pktbuf_null_cookie);
|
|
COVERAGE_DEFINE(pktbuf_retrieved);
|
|
COVERAGE_DEFINE(pktbuf_reuse_error);
|
|
|
|
/* Buffers are identified by a 32-bit opaque ID. We divide the ID
|
|
* into a buffer number (low bits) and a cookie (high bits). The buffer number
|
|
* is an index into an array of buffers. The cookie distinguishes between
|
|
* different packets that have occupied a single buffer. Thus, the more
|
|
* buffers we have, the lower-quality the cookie... */
|
|
#define PKTBUF_BITS 8
|
|
#define PKTBUF_MASK (PKTBUF_CNT - 1)
|
|
#define PKTBUF_CNT (1u << PKTBUF_BITS)
|
|
|
|
#define COOKIE_BITS (32 - PKTBUF_BITS)
|
|
#define COOKIE_MAX ((1u << COOKIE_BITS) - 1)
|
|
|
|
#define OVERWRITE_MSECS 5000
|
|
|
|
struct packet {
|
|
struct ofpbuf *buffer;
|
|
uint32_t cookie;
|
|
long long int timeout;
|
|
uint16_t in_port;
|
|
};
|
|
|
|
struct pktbuf {
|
|
struct packet packets[PKTBUF_CNT];
|
|
unsigned int buffer_idx;
|
|
unsigned int null_idx;
|
|
};
|
|
|
|
int
|
|
pktbuf_capacity(void)
|
|
{
|
|
return PKTBUF_CNT;
|
|
}
|
|
|
|
struct pktbuf *
|
|
pktbuf_create(void)
|
|
{
|
|
return xzalloc(sizeof *pktbuf_create());
|
|
}
|
|
|
|
void
|
|
pktbuf_destroy(struct pktbuf *pb)
|
|
{
|
|
if (pb) {
|
|
size_t i;
|
|
|
|
for (i = 0; i < PKTBUF_CNT; i++) {
|
|
ofpbuf_delete(pb->packets[i].buffer);
|
|
}
|
|
free(pb);
|
|
}
|
|
}
|
|
|
|
static unsigned int
|
|
make_id(unsigned int buffer_idx, unsigned int cookie)
|
|
{
|
|
return buffer_idx | (cookie << PKTBUF_BITS);
|
|
}
|
|
|
|
/* Attempts to allocate an OpenFlow packet buffer id within 'pb'. The packet
|
|
* buffer will store a copy of 'buffer' and the port number 'in_port', which
|
|
* should be the datapath port number on which 'buffer' was received.
|
|
*
|
|
* If successful, returns the packet buffer id (a number other than
|
|
* UINT32_MAX). pktbuf_retrieve() can later be used to retrieve the buffer and
|
|
* its input port number (buffers do expire after a time, so this is not
|
|
* guaranteed to be true forever). On failure, returns UINT32_MAX.
|
|
*
|
|
* The caller retains ownership of 'buffer'. */
|
|
uint32_t
|
|
pktbuf_save(struct pktbuf *pb, struct ofpbuf *buffer, uint16_t in_port)
|
|
{
|
|
struct packet *p = &pb->packets[pb->buffer_idx];
|
|
pb->buffer_idx = (pb->buffer_idx + 1) & PKTBUF_MASK;
|
|
if (p->buffer) {
|
|
if (time_msec() < p->timeout) {
|
|
return UINT32_MAX;
|
|
}
|
|
ofpbuf_delete(p->buffer);
|
|
}
|
|
|
|
/* Don't use maximum cookie value since all-1-bits ID is special. */
|
|
if (++p->cookie >= COOKIE_MAX) {
|
|
p->cookie = 0;
|
|
}
|
|
p->buffer = ofpbuf_new_with_headroom(buffer->size,
|
|
sizeof(struct ofp_packet_in));
|
|
ofpbuf_put(p->buffer, buffer->data, buffer->size);
|
|
p->timeout = time_msec() + OVERWRITE_MSECS;
|
|
p->in_port = in_port;
|
|
return make_id(p - pb->packets, p->cookie);
|
|
}
|
|
|
|
/*
|
|
* Allocates and returns a "null" packet buffer id. The returned packet buffer
|
|
* id is considered valid by pktbuf_retrieve(), but it is not associated with
|
|
* actual buffered data.
|
|
*
|
|
* This function is always successful.
|
|
*
|
|
* This is useful in one special case: with the current OpenFlow design, the
|
|
* "fail-open" code cannot always know whether a connection to a controller is
|
|
* actually valid until it receives a OFPT_PACKET_OUT or OFPT_FLOW_MOD request,
|
|
* but at that point the packet in question has already been forwarded (since
|
|
* we are still in "fail-open" mode). If the packet was buffered in the usual
|
|
* way, then the OFPT_PACKET_OUT or OFPT_FLOW_MOD would cause a duplicate
|
|
* packet in the network. Null packet buffer ids identify such a packet that
|
|
* has already been forwarded, so that Open vSwitch can quietly ignore the
|
|
* request to re-send it. (After that happens, the switch exits fail-open
|
|
* mode.)
|
|
*
|
|
* See the top-level comment in fail-open.c for an overview.
|
|
*/
|
|
uint32_t
|
|
pktbuf_get_null(void)
|
|
{
|
|
return make_id(0, COOKIE_MAX);
|
|
}
|
|
|
|
/* Attempts to retrieve a saved packet with the given 'id' from 'pb'. Returns
|
|
* 0 if successful, otherwise an OpenFlow error code constructed with
|
|
* ofp_mkerr().
|
|
*
|
|
* On success, ordinarily stores the buffered packet in '*bufferp' and the
|
|
* datapath port number on which the packet was received in '*in_port'. The
|
|
* caller becomes responsible for freeing the buffer. However, if 'id'
|
|
* identifies a "null" packet buffer (created with pktbuf_get_null()), stores
|
|
* NULL in '*bufferp' and UINT16_max in '*in_port'.
|
|
*
|
|
* 'in_port' may be NULL if the input port is not of interest.
|
|
*
|
|
* A returned packet will have at least sizeof(struct ofp_packet_in) bytes of
|
|
* headroom.
|
|
*
|
|
* On failure, stores NULL in in '*bufferp' and UINT16_MAX in '*in_port'. */
|
|
int
|
|
pktbuf_retrieve(struct pktbuf *pb, uint32_t id, struct ofpbuf **bufferp,
|
|
uint16_t *in_port)
|
|
{
|
|
static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 20);
|
|
struct packet *p;
|
|
int error;
|
|
|
|
if (id == UINT32_MAX) {
|
|
error = 0;
|
|
goto error;
|
|
}
|
|
|
|
if (!pb) {
|
|
VLOG_WARN_RL(&rl, "attempt to send buffered packet via connection "
|
|
"without buffers");
|
|
return ofp_mkerr(OFPET_BAD_REQUEST, OFPBRC_BUFFER_UNKNOWN);
|
|
}
|
|
|
|
p = &pb->packets[id & PKTBUF_MASK];
|
|
if (p->cookie == id >> PKTBUF_BITS) {
|
|
struct ofpbuf *buffer = p->buffer;
|
|
if (buffer) {
|
|
*bufferp = buffer;
|
|
if (in_port) {
|
|
*in_port = p->in_port;
|
|
}
|
|
p->buffer = NULL;
|
|
COVERAGE_INC(pktbuf_retrieved);
|
|
return 0;
|
|
} else {
|
|
COVERAGE_INC(pktbuf_reuse_error);
|
|
VLOG_WARN_RL(&rl, "attempt to reuse buffer %08"PRIx32, id);
|
|
error = ofp_mkerr(OFPET_BAD_REQUEST, OFPBRC_BUFFER_EMPTY);
|
|
}
|
|
} else if (id >> PKTBUF_BITS != COOKIE_MAX) {
|
|
COVERAGE_INC(pktbuf_buffer_unknown);
|
|
VLOG_WARN_RL(&rl, "cookie mismatch: %08"PRIx32" != %08"PRIx32,
|
|
id, (id & PKTBUF_MASK) | (p->cookie << PKTBUF_BITS));
|
|
error = ofp_mkerr(OFPET_BAD_REQUEST, OFPBRC_BUFFER_UNKNOWN);
|
|
} else {
|
|
COVERAGE_INC(pktbuf_null_cookie);
|
|
VLOG_INFO_RL(&rl, "Received null cookie %08"PRIx32" (this is normal "
|
|
"if the switch was recently in fail-open mode)", id);
|
|
error = 0;
|
|
}
|
|
error:
|
|
*bufferp = NULL;
|
|
if (in_port) {
|
|
*in_port = UINT16_MAX;
|
|
}
|
|
return error;
|
|
}
|
|
|
|
void
|
|
pktbuf_discard(struct pktbuf *pb, uint32_t id)
|
|
{
|
|
struct packet *p = &pb->packets[id & PKTBUF_MASK];
|
|
if (p->cookie == id >> PKTBUF_BITS) {
|
|
ofpbuf_delete(p->buffer);
|
|
p->buffer = NULL;
|
|
}
|
|
}
|