2009-06-17 14:35:35 -07:00
|
|
|
|
/*
|
2012-12-16 17:08:50 -08:00
|
|
|
|
* Copyright (c) 2008, 2009, 2010, 2011, 2012, 2013 Nicira, Inc.
|
2009-06-17 14:35:35 -07:00
|
|
|
|
*
|
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
|
* You may obtain a copy of the License at:
|
|
|
|
|
*
|
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
*
|
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
|
* limitations under the License.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include <config.h>
|
2010-12-29 14:20:16 -08:00
|
|
|
|
|
|
|
|
|
#include "dpif-linux.h"
|
2009-06-17 14:35:35 -07:00
|
|
|
|
|
|
|
|
|
#include <ctype.h>
|
|
|
|
|
#include <errno.h>
|
|
|
|
|
#include <fcntl.h>
|
|
|
|
|
#include <inttypes.h>
|
|
|
|
|
#include <net/if.h>
|
2010-05-26 15:32:34 -07:00
|
|
|
|
#include <linux/types.h>
|
2010-07-20 11:23:21 -07:00
|
|
|
|
#include <linux/pkt_sched.h>
|
2009-06-24 10:24:09 -07:00
|
|
|
|
#include <linux/rtnetlink.h>
|
2009-06-17 14:35:35 -07:00
|
|
|
|
#include <linux/sockios.h>
|
2011-11-28 09:29:18 -08:00
|
|
|
|
#include <poll.h>
|
2009-06-17 14:35:35 -07:00
|
|
|
|
#include <stdlib.h>
|
2011-11-28 09:29:18 -08:00
|
|
|
|
#include <strings.h>
|
2011-11-22 09:25:32 -08:00
|
|
|
|
#include <sys/epoll.h>
|
2010-05-20 13:26:48 -07:00
|
|
|
|
#include <sys/stat.h>
|
2009-06-17 14:35:35 -07:00
|
|
|
|
#include <unistd.h>
|
|
|
|
|
|
2011-04-04 16:55:34 -07:00
|
|
|
|
#include "bitmap.h"
|
2009-06-17 14:35:35 -07:00
|
|
|
|
#include "dpif-provider.h"
|
2011-06-01 13:39:51 -07:00
|
|
|
|
#include "dynamic-string.h"
|
2011-06-03 17:15:12 -07:00
|
|
|
|
#include "flow.h"
|
2010-04-10 01:19:29 -04:00
|
|
|
|
#include "netdev.h"
|
2011-04-28 13:02:15 -07:00
|
|
|
|
#include "netdev-linux.h"
|
2010-12-03 14:41:38 -08:00
|
|
|
|
#include "netdev-vport.h"
|
2011-08-25 14:06:54 -07:00
|
|
|
|
#include "netlink-notifier.h"
|
2011-01-26 13:41:54 -08:00
|
|
|
|
#include "netlink-socket.h"
|
datapath: Report kernel's flow key when passing packets up to userspace.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to change
the kernel's idea of the flow key separately from the userspace version.
This commit takes one step in that direction by making the kernel report
its idea of the flow that a packet belongs to whenever it passes a packet
up to userspace. This means that userspace can intelligently figure out
what to do:
- If userspace's notion of the flow for the packet matches the kernel's,
then nothing special is necessary.
- If the kernel has a more specific notion for the flow than userspace,
for example if the kernel decoded IPv6 headers but userspace stopped
at the Ethernet type (because it does not understand IPv6), then again
nothing special is necessary: userspace can still set up the flow in
the usual way.
- If userspace has a more specific notion for the flow than the kernel,
for example if userspace decoded an IPv6 header but the kernel
stopped at the Ethernet type, then userspace can forward the packet
manually, without setting up a flow in the kernel. (This case is
bad from a performance point of view, but at least it is correct.)
This commit does not actually make userspace flexible enough to handle
changes in the kernel flow key structure, although userspace does now
have enough information to do that intelligently. This will have to wait
for later commits.
This commit is bigger than it would otherwise be because it is rolled
together with changing "struct odp_msg" to a sequence of Netlink
attributes. The alternative, to do each of those changes in a separate
patch, seemed like overkill because it meant that either we would have to
introduce and then kill off Netlink attributes for in_port and tun_id, if
Netlink conversion went first, or shove yet another variable-length header
into the stuff already after odp_msg, if adding the flow key to odp_msg
went first.
This commit will slow down performance of checksumming packets sent up to
userspace. I'm not entirely pleased with how I did it. I considered a
couple of alternatives, but none of them seemed that much better.
Suggestions welcome. Not changing anything wasn't an option,
unfortunately. At any rate some slowdown will become unavoidable when OVS
actually starts using Netlink instead of just Netlink framing.
(Actually, I thought of one option where we could avoid that: make
userspace do the checksum instead, by passing csum_start and csum_offset as
part of what goes to userspace. But that's not perfect either.)
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2011-01-24 14:59:57 -08:00
|
|
|
|
#include "netlink.h"
|
2011-01-26 07:03:39 -08:00
|
|
|
|
#include "odp-util.h"
|
2009-06-17 14:35:35 -07:00
|
|
|
|
#include "ofpbuf.h"
|
datapath: Report kernel's flow key when passing packets up to userspace.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to change
the kernel's idea of the flow key separately from the userspace version.
This commit takes one step in that direction by making the kernel report
its idea of the flow that a packet belongs to whenever it passes a packet
up to userspace. This means that userspace can intelligently figure out
what to do:
- If userspace's notion of the flow for the packet matches the kernel's,
then nothing special is necessary.
- If the kernel has a more specific notion for the flow than userspace,
for example if the kernel decoded IPv6 headers but userspace stopped
at the Ethernet type (because it does not understand IPv6), then again
nothing special is necessary: userspace can still set up the flow in
the usual way.
- If userspace has a more specific notion for the flow than the kernel,
for example if userspace decoded an IPv6 header but the kernel
stopped at the Ethernet type, then userspace can forward the packet
manually, without setting up a flow in the kernel. (This case is
bad from a performance point of view, but at least it is correct.)
This commit does not actually make userspace flexible enough to handle
changes in the kernel flow key structure, although userspace does now
have enough information to do that intelligently. This will have to wait
for later commits.
This commit is bigger than it would otherwise be because it is rolled
together with changing "struct odp_msg" to a sequence of Netlink
attributes. The alternative, to do each of those changes in a separate
patch, seemed like overkill because it meant that either we would have to
introduce and then kill off Netlink attributes for in_port and tun_id, if
Netlink conversion went first, or shove yet another variable-length header
into the stuff already after odp_msg, if adding the flow key to odp_msg
went first.
This commit will slow down performance of checksumming packets sent up to
userspace. I'm not entirely pleased with how I did it. I considered a
couple of alternatives, but none of them seemed that much better.
Suggestions welcome. Not changing anything wasn't an option,
unfortunately. At any rate some slowdown will become unavoidable when OVS
actually starts using Netlink instead of just Netlink framing.
(Actually, I thought of one option where we could avoid that: make
userspace do the checksum instead, by passing csum_start and csum_offset as
part of what goes to userspace. But that's not perfect either.)
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2011-01-24 14:59:57 -08:00
|
|
|
|
#include "packets.h"
|
2009-06-17 14:35:35 -07:00
|
|
|
|
#include "poll-loop.h"
|
2011-09-16 15:23:37 -07:00
|
|
|
|
#include "random.h"
|
2010-05-03 13:47:28 -07:00
|
|
|
|
#include "shash.h"
|
2011-03-25 15:26:30 -07:00
|
|
|
|
#include "sset.h"
|
2012-06-01 17:40:31 -04:00
|
|
|
|
#include "timeval.h"
|
2011-01-26 15:42:00 -08:00
|
|
|
|
#include "unaligned.h"
|
2009-06-17 14:35:35 -07:00
|
|
|
|
#include "util.h"
|
|
|
|
|
#include "vlog.h"
|
2010-07-16 11:02:49 -07:00
|
|
|
|
|
2010-10-19 14:47:01 -07:00
|
|
|
|
VLOG_DEFINE_THIS_MODULE(dpif_linux);
|
2012-02-16 17:12:36 -08:00
|
|
|
|
enum { MAX_PORTS = USHRT_MAX };
|
2011-04-04 16:55:34 -07:00
|
|
|
|
|
2011-08-26 23:34:40 -07:00
|
|
|
|
/* This ethtool flag was introduced in Linux 2.6.24, so it might be
|
|
|
|
|
* missing if we have old headers. */
|
|
|
|
|
#define ETH_FLAG_LRO (1 << 15) /* LRO is enabled */
|
|
|
|
|
|
2011-01-26 15:42:00 -08:00
|
|
|
|
struct dpif_linux_dp {
|
2011-01-28 13:55:04 -08:00
|
|
|
|
/* Generic Netlink header. */
|
|
|
|
|
uint8_t cmd;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
/* struct ovs_header. */
|
2011-01-21 17:01:56 -08:00
|
|
|
|
int dp_ifindex;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
|
|
|
|
|
/* Attributes. */
|
2011-08-18 10:35:40 -07:00
|
|
|
|
const char *name; /* OVS_DP_ATTR_NAME. */
|
2013-11-18 15:24:10 +01:00
|
|
|
|
const uint32_t *upcall_pid; /* OVS_DP_ATTR_UPCALL_PID. */
|
2011-08-18 10:35:40 -07:00
|
|
|
|
struct ovs_dp_stats stats; /* OVS_DP_ATTR_STATS. */
|
2013-10-21 14:37:34 -07:00
|
|
|
|
struct ovs_dp_megaflow_stats megaflow_stats;
|
|
|
|
|
/* OVS_DP_ATTR_MEGAFLOW_STATS.*/
|
2011-01-26 15:42:00 -08:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void dpif_linux_dp_init(struct dpif_linux_dp *);
|
2011-01-28 13:55:04 -08:00
|
|
|
|
static int dpif_linux_dp_from_ofpbuf(struct dpif_linux_dp *,
|
|
|
|
|
const struct ofpbuf *);
|
|
|
|
|
static void dpif_linux_dp_dump_start(struct nl_dump *);
|
2011-01-26 15:42:00 -08:00
|
|
|
|
static int dpif_linux_dp_transact(const struct dpif_linux_dp *request,
|
|
|
|
|
struct dpif_linux_dp *reply,
|
|
|
|
|
struct ofpbuf **bufp);
|
|
|
|
|
static int dpif_linux_dp_get(const struct dpif *, struct dpif_linux_dp *reply,
|
|
|
|
|
struct ofpbuf **bufp);
|
|
|
|
|
|
|
|
|
|
struct dpif_linux_flow {
|
2011-01-28 14:00:51 -08:00
|
|
|
|
/* Generic Netlink header. */
|
|
|
|
|
uint8_t cmd;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
/* struct ovs_header. */
|
2011-01-26 15:42:00 -08:00
|
|
|
|
unsigned int nlmsg_flags;
|
2011-01-21 17:01:56 -08:00
|
|
|
|
int dp_ifindex;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
|
|
|
|
|
/* Attributes.
|
|
|
|
|
*
|
2011-10-04 15:25:14 -07:00
|
|
|
|
* The 'stats' member points to 64-bit data that might only be aligned on
|
|
|
|
|
* 32-bit boundaries, so get_unaligned_u64() should be used to access its
|
|
|
|
|
* values.
|
2011-01-31 15:46:03 -08:00
|
|
|
|
*
|
2011-08-18 10:35:40 -07:00
|
|
|
|
* If 'actions' is nonnull then OVS_FLOW_ATTR_ACTIONS will be included in
|
2011-01-31 15:46:03 -08:00
|
|
|
|
* the Netlink version of the command, even if actions_len is zero. */
|
2011-08-18 10:35:40 -07:00
|
|
|
|
const struct nlattr *key; /* OVS_FLOW_ATTR_KEY. */
|
2011-01-26 15:42:00 -08:00
|
|
|
|
size_t key_len;
|
2013-06-19 07:15:10 +00:00
|
|
|
|
const struct nlattr *mask; /* OVS_FLOW_ATTR_MASK. */
|
|
|
|
|
size_t mask_len;
|
2011-08-18 10:35:40 -07:00
|
|
|
|
const struct nlattr *actions; /* OVS_FLOW_ATTR_ACTIONS. */
|
2011-01-26 15:42:00 -08:00
|
|
|
|
size_t actions_len;
|
2011-08-18 10:35:40 -07:00
|
|
|
|
const struct ovs_flow_stats *stats; /* OVS_FLOW_ATTR_STATS. */
|
|
|
|
|
const uint8_t *tcp_flags; /* OVS_FLOW_ATTR_TCP_FLAGS. */
|
2011-10-04 15:25:14 -07:00
|
|
|
|
const ovs_32aligned_u64 *used; /* OVS_FLOW_ATTR_USED. */
|
2011-08-18 10:35:40 -07:00
|
|
|
|
bool clear; /* OVS_FLOW_ATTR_CLEAR. */
|
2011-01-26 15:42:00 -08:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void dpif_linux_flow_init(struct dpif_linux_flow *);
|
2011-01-28 14:00:51 -08:00
|
|
|
|
static int dpif_linux_flow_from_ofpbuf(struct dpif_linux_flow *,
|
|
|
|
|
const struct ofpbuf *);
|
|
|
|
|
static void dpif_linux_flow_to_ofpbuf(const struct dpif_linux_flow *,
|
|
|
|
|
struct ofpbuf *);
|
2011-09-27 16:07:23 -07:00
|
|
|
|
static int dpif_linux_flow_transact(struct dpif_linux_flow *request,
|
2011-01-26 15:42:00 -08:00
|
|
|
|
struct dpif_linux_flow *reply,
|
|
|
|
|
struct ofpbuf **bufp);
|
|
|
|
|
static void dpif_linux_flow_get_stats(const struct dpif_linux_flow *,
|
|
|
|
|
struct dpif_flow_stats *);
|
|
|
|
|
|
2013-01-04 18:34:26 -08:00
|
|
|
|
/* One of the dpif channels between the kernel and userspace. */
|
2012-05-23 16:55:09 -07:00
|
|
|
|
struct dpif_channel {
|
2012-06-01 17:40:31 -04:00
|
|
|
|
struct nl_sock *sock; /* Netlink socket. */
|
|
|
|
|
long long int last_poll; /* Last time this channel was polled. */
|
2012-05-23 16:55:09 -07:00
|
|
|
|
};
|
|
|
|
|
|
2012-06-01 17:40:31 -04:00
|
|
|
|
static void report_loss(struct dpif *, struct dpif_channel *);
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Datapath interface for the openvswitch Linux kernel module. */
|
|
|
|
|
struct dpif_linux {
|
|
|
|
|
struct dpif dpif;
|
2011-01-21 17:01:56 -08:00
|
|
|
|
int dp_ifindex;
|
2009-06-24 10:24:09 -07:00
|
|
|
|
|
2011-09-14 13:05:09 -07:00
|
|
|
|
/* Upcall messages. */
|
2013-07-30 15:31:48 -07:00
|
|
|
|
struct ovs_mutex upcall_lock;
|
2013-01-04 18:34:26 -08:00
|
|
|
|
int uc_array_size; /* Size of 'channels' and 'epoll_events'. */
|
|
|
|
|
struct dpif_channel *channels;
|
|
|
|
|
struct epoll_event *epoll_events;
|
2012-05-23 16:55:09 -07:00
|
|
|
|
int epoll_fd; /* epoll fd that includes channel socks. */
|
2013-01-04 18:34:26 -08:00
|
|
|
|
int n_events; /* Num events returned by epoll_wait(). */
|
|
|
|
|
int event_offset; /* Offset into 'epoll_events'. */
|
2011-01-26 13:41:54 -08:00
|
|
|
|
|
2009-06-24 10:24:09 -07:00
|
|
|
|
/* Change notification. */
|
2013-07-22 15:00:49 -07:00
|
|
|
|
struct nl_sock *port_notifier; /* vport multicast group subscriber. */
|
2013-05-01 17:13:14 -07:00
|
|
|
|
bool refresh_channels;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static struct vlog_rate_limit error_rl = VLOG_RATE_LIMIT_INIT(9999, 5);
|
|
|
|
|
|
2013-07-22 15:00:49 -07:00
|
|
|
|
/* Generic Netlink family numbers for OVS.
|
|
|
|
|
*
|
|
|
|
|
* Initialized by dpif_linux_init(). */
|
2011-08-18 10:35:40 -07:00
|
|
|
|
static int ovs_datapath_family;
|
|
|
|
|
static int ovs_vport_family;
|
|
|
|
|
static int ovs_flow_family;
|
|
|
|
|
static int ovs_packet_family;
|
2011-01-26 13:41:54 -08:00
|
|
|
|
|
2013-07-22 15:00:49 -07:00
|
|
|
|
/* Generic Netlink multicast groups for OVS.
|
|
|
|
|
*
|
|
|
|
|
* Initialized by dpif_linux_init(). */
|
|
|
|
|
static unsigned int ovs_vport_mcgroup;
|
2011-01-26 13:41:54 -08:00
|
|
|
|
|
|
|
|
|
static int dpif_linux_init(void);
|
2013-07-22 15:00:49 -07:00
|
|
|
|
static int open_dpif(const struct dpif_linux_dp *, struct dpif **);
|
2013-06-19 16:58:44 -07:00
|
|
|
|
static uint32_t dpif_linux_port_get_pid(const struct dpif *,
|
|
|
|
|
odp_port_t port_no);
|
2013-05-01 17:13:14 -07:00
|
|
|
|
static int dpif_linux_refresh_channels(struct dpif *);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
|
2011-01-28 13:59:03 -08:00
|
|
|
|
static void dpif_linux_vport_to_ofpbuf(const struct dpif_linux_vport *,
|
|
|
|
|
struct ofpbuf *);
|
|
|
|
|
static int dpif_linux_vport_from_ofpbuf(struct dpif_linux_vport *,
|
|
|
|
|
const struct ofpbuf *);
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
static struct dpif_linux *
|
|
|
|
|
dpif_linux_cast(const struct dpif *dpif)
|
|
|
|
|
{
|
|
|
|
|
dpif_assert_class(dpif, &dpif_linux_class);
|
|
|
|
|
return CONTAINER_OF(dpif, struct dpif_linux, dpif);
|
|
|
|
|
}
|
|
|
|
|
|
2009-07-06 11:06:36 -07:00
|
|
|
|
static int
|
2011-03-25 13:00:13 -07:00
|
|
|
|
dpif_linux_enumerate(struct sset *all_dps)
|
2009-07-06 11:06:36 -07:00
|
|
|
|
{
|
2011-01-28 13:55:04 -08:00
|
|
|
|
struct nl_dump dump;
|
|
|
|
|
struct ofpbuf msg;
|
|
|
|
|
int error;
|
2011-01-26 13:41:54 -08:00
|
|
|
|
|
2011-01-28 13:55:04 -08:00
|
|
|
|
error = dpif_linux_init();
|
|
|
|
|
if (error) {
|
|
|
|
|
return error;
|
2011-01-26 13:41:54 -08:00
|
|
|
|
}
|
2009-07-06 11:06:36 -07:00
|
|
|
|
|
2011-01-28 13:55:04 -08:00
|
|
|
|
dpif_linux_dp_dump_start(&dump);
|
|
|
|
|
while (nl_dump_next(&dump, &msg)) {
|
|
|
|
|
struct dpif_linux_dp dp;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
|
2011-01-28 13:55:04 -08:00
|
|
|
|
if (!dpif_linux_dp_from_ofpbuf(&dp, &msg)) {
|
2011-03-25 13:00:13 -07:00
|
|
|
|
sset_add(all_dps, dp.name);
|
2009-07-06 11:06:36 -07:00
|
|
|
|
}
|
|
|
|
|
}
|
2011-01-28 13:55:04 -08:00
|
|
|
|
return nl_dump_done(&dump);
|
2009-07-06 11:06:36 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
static int
|
2010-11-18 10:06:41 -08:00
|
|
|
|
dpif_linux_open(const struct dpif_class *class OVS_UNUSED, const char *name,
|
|
|
|
|
bool create, struct dpif **dpifp)
|
2009-06-17 14:35:35 -07:00
|
|
|
|
{
|
2011-01-26 13:41:54 -08:00
|
|
|
|
struct dpif_linux_dp dp_request, dp;
|
2011-01-26 12:28:59 -08:00
|
|
|
|
struct ofpbuf *buf;
|
2011-10-12 11:04:10 -07:00
|
|
|
|
uint32_t upcall_pid;
|
2011-01-26 12:28:59 -08:00
|
|
|
|
int error;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
|
2011-01-26 13:41:54 -08:00
|
|
|
|
error = dpif_linux_init();
|
|
|
|
|
if (error) {
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Create or look up datapath. */
|
|
|
|
|
dpif_linux_dp_init(&dp_request);
|
2011-10-12 11:04:10 -07:00
|
|
|
|
if (create) {
|
|
|
|
|
dp_request.cmd = OVS_DP_CMD_NEW;
|
|
|
|
|
upcall_pid = 0;
|
|
|
|
|
dp_request.upcall_pid = &upcall_pid;
|
|
|
|
|
} else {
|
|
|
|
|
dp_request.cmd = OVS_DP_CMD_GET;
|
|
|
|
|
}
|
2011-01-21 17:01:56 -08:00
|
|
|
|
dp_request.name = name;
|
2011-01-26 13:41:54 -08:00
|
|
|
|
error = dpif_linux_dp_transact(&dp_request, &dp, &buf);
|
|
|
|
|
if (error) {
|
|
|
|
|
return error;
|
2011-01-26 12:28:59 -08:00
|
|
|
|
}
|
2011-01-21 17:01:56 -08:00
|
|
|
|
|
2013-07-22 15:00:49 -07:00
|
|
|
|
error = open_dpif(&dp, dpifp);
|
2011-09-14 11:26:21 -07:00
|
|
|
|
ofpbuf_delete(buf);
|
2013-07-22 15:00:49 -07:00
|
|
|
|
return error;
|
2011-01-26 12:28:59 -08:00
|
|
|
|
}
|
|
|
|
|
|
2013-07-22 15:00:49 -07:00
|
|
|
|
static int
|
2011-01-21 17:01:56 -08:00
|
|
|
|
open_dpif(const struct dpif_linux_dp *dp, struct dpif **dpifp)
|
2011-01-26 12:28:59 -08:00
|
|
|
|
{
|
|
|
|
|
struct dpif_linux *dpif;
|
|
|
|
|
|
2011-09-16 15:23:37 -07:00
|
|
|
|
dpif = xzalloc(sizeof *dpif);
|
2013-07-22 15:00:49 -07:00
|
|
|
|
dpif->port_notifier = NULL;
|
Use "error-checking" mutexes in place of other kinds wherever possible.
We've seen a number of deadlocks in the tree since thread safety was
introduced. So far, all of these are self-deadlocks, that is, a single
thread acquiring a lock and then attempting to re-acquire the same lock
recursively. When this has happened, the process simply hung, and it was
somewhat difficult to find the cause.
POSIX "error-checking" mutexes check for this specific problem (and
others). This commit switches from other types of mutexes to
error-checking mutexes everywhere that we can, that is, everywhere that
we're not using recursive mutexes. This ought to help find problems more
quickly in the future.
There might be performance advantages to other kinds of mutexes in some
cases. However, the existing mutex type choices were just guesses, so I'd
rather go for easy detection of errors until we know that other mutex
types actually perform better in specific cases. Also, I did a quick
microbenchmark of glibc mutex types on my host and found that the
error checking mutexes weren't any slower than the other types, at least
when the mutex is uncontended.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Ethan Jackson <ethan@nicira.com>
2013-08-20 13:40:02 -07:00
|
|
|
|
ovs_mutex_init(&dpif->upcall_lock);
|
2011-11-22 09:25:32 -08:00
|
|
|
|
dpif->epoll_fd = -1;
|
2011-01-26 12:28:59 -08:00
|
|
|
|
|
2011-01-21 17:01:56 -08:00
|
|
|
|
dpif_init(&dpif->dpif, &dpif_linux_class, dp->name,
|
|
|
|
|
dp->dp_ifindex, dp->dp_ifindex);
|
2011-01-26 12:28:59 -08:00
|
|
|
|
|
2011-01-21 17:01:56 -08:00
|
|
|
|
dpif->dp_ifindex = dp->dp_ifindex;
|
2011-01-26 12:28:59 -08:00
|
|
|
|
*dpifp = &dpif->dpif;
|
2013-07-22 15:00:49 -07:00
|
|
|
|
|
|
|
|
|
return 0;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
|
2011-09-16 15:23:37 -07:00
|
|
|
|
static void
|
2012-05-23 16:55:09 -07:00
|
|
|
|
destroy_channels(struct dpif_linux *dpif)
|
2011-09-16 15:23:37 -07:00
|
|
|
|
{
|
2013-06-19 16:58:44 -07:00
|
|
|
|
unsigned int i;
|
2011-09-16 15:23:37 -07:00
|
|
|
|
|
2013-01-04 18:34:26 -08:00
|
|
|
|
if (dpif->epoll_fd < 0) {
|
|
|
|
|
return;
|
2011-11-22 09:25:32 -08:00
|
|
|
|
}
|
2013-01-04 18:34:26 -08:00
|
|
|
|
|
|
|
|
|
for (i = 0; i < dpif->uc_array_size; i++ ) {
|
|
|
|
|
struct dpif_linux_vport vport_request;
|
|
|
|
|
struct dpif_channel *ch = &dpif->channels[i];
|
|
|
|
|
uint32_t upcall_pid = 0;
|
|
|
|
|
|
|
|
|
|
if (!ch->sock) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
2013-07-23 12:41:57 -07:00
|
|
|
|
epoll_ctl(dpif->epoll_fd, EPOLL_CTL_DEL, nl_sock_fd(ch->sock), NULL);
|
|
|
|
|
|
2013-01-04 18:34:26 -08:00
|
|
|
|
/* Turn off upcalls. */
|
|
|
|
|
dpif_linux_vport_init(&vport_request);
|
|
|
|
|
vport_request.cmd = OVS_VPORT_CMD_SET;
|
|
|
|
|
vport_request.dp_ifindex = dpif->dp_ifindex;
|
2013-06-19 16:58:44 -07:00
|
|
|
|
vport_request.port_no = u32_to_odp(i);
|
2013-01-04 18:34:26 -08:00
|
|
|
|
vport_request.upcall_pid = &upcall_pid;
|
|
|
|
|
dpif_linux_vport_transact(&vport_request, NULL, NULL);
|
|
|
|
|
|
2012-05-23 16:55:09 -07:00
|
|
|
|
nl_sock_destroy(ch->sock);
|
2011-09-16 15:23:37 -07:00
|
|
|
|
}
|
2013-01-04 18:34:26 -08:00
|
|
|
|
|
|
|
|
|
free(dpif->channels);
|
|
|
|
|
dpif->channels = NULL;
|
|
|
|
|
dpif->uc_array_size = 0;
|
|
|
|
|
|
|
|
|
|
free(dpif->epoll_events);
|
|
|
|
|
dpif->epoll_events = NULL;
|
|
|
|
|
dpif->n_events = dpif->event_offset = 0;
|
|
|
|
|
|
2013-07-23 12:41:57 -07:00
|
|
|
|
/* Don't close dpif->epoll_fd since that would cause other threads that
|
|
|
|
|
* call dpif_recv_wait(dpif) to wait on an arbitrary fd or a closed fd. */
|
2013-01-04 18:34:26 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int
|
2013-06-19 16:58:44 -07:00
|
|
|
|
add_channel(struct dpif_linux *dpif, odp_port_t port_no, struct nl_sock *sock)
|
2013-01-04 18:34:26 -08:00
|
|
|
|
{
|
|
|
|
|
struct epoll_event event;
|
2013-06-19 16:58:44 -07:00
|
|
|
|
uint32_t port_idx = odp_to_u32(port_no);
|
2013-01-04 18:34:26 -08:00
|
|
|
|
|
|
|
|
|
if (dpif->epoll_fd < 0) {
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* We assume that the datapath densely chooses port numbers, which
|
|
|
|
|
* can therefore be used as an index into an array of channels. */
|
2013-06-19 16:58:44 -07:00
|
|
|
|
if (port_idx >= dpif->uc_array_size) {
|
|
|
|
|
uint32_t new_size = port_idx + 1;
|
|
|
|
|
uint32_t i;
|
2013-01-04 18:34:26 -08:00
|
|
|
|
|
2013-05-01 16:54:18 -07:00
|
|
|
|
if (new_size > MAX_PORTS) {
|
2013-01-04 18:34:26 -08:00
|
|
|
|
VLOG_WARN_RL(&error_rl, "%s: datapath port %"PRIu32" too big",
|
|
|
|
|
dpif_name(&dpif->dpif), port_no);
|
|
|
|
|
return EFBIG;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
dpif->channels = xrealloc(dpif->channels,
|
|
|
|
|
new_size * sizeof *dpif->channels);
|
|
|
|
|
for (i = dpif->uc_array_size; i < new_size; i++) {
|
|
|
|
|
dpif->channels[i].sock = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
dpif->epoll_events = xrealloc(dpif->epoll_events,
|
|
|
|
|
new_size * sizeof *dpif->epoll_events);
|
|
|
|
|
dpif->uc_array_size = new_size;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
memset(&event, 0, sizeof event);
|
|
|
|
|
event.events = EPOLLIN;
|
2013-06-19 16:58:44 -07:00
|
|
|
|
event.data.u32 = port_idx;
|
2013-01-04 18:34:26 -08:00
|
|
|
|
if (epoll_ctl(dpif->epoll_fd, EPOLL_CTL_ADD, nl_sock_fd(sock),
|
|
|
|
|
&event) < 0) {
|
|
|
|
|
return errno;
|
|
|
|
|
}
|
|
|
|
|
|
2013-06-19 16:58:44 -07:00
|
|
|
|
nl_sock_destroy(dpif->channels[port_idx].sock);
|
|
|
|
|
dpif->channels[port_idx].sock = sock;
|
|
|
|
|
dpif->channels[port_idx].last_poll = LLONG_MIN;
|
2013-01-04 18:34:26 -08:00
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2013-06-19 16:58:44 -07:00
|
|
|
|
del_channel(struct dpif_linux *dpif, odp_port_t port_no)
|
2013-01-04 18:34:26 -08:00
|
|
|
|
{
|
|
|
|
|
struct dpif_channel *ch;
|
2013-06-19 16:58:44 -07:00
|
|
|
|
uint32_t port_idx = odp_to_u32(port_no);
|
2013-01-04 18:34:26 -08:00
|
|
|
|
|
2013-06-19 16:58:44 -07:00
|
|
|
|
if (dpif->epoll_fd < 0 || port_idx >= dpif->uc_array_size) {
|
2013-01-04 18:34:26 -08:00
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2013-06-19 16:58:44 -07:00
|
|
|
|
ch = &dpif->channels[port_idx];
|
2013-01-04 18:34:26 -08:00
|
|
|
|
if (!ch->sock) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
epoll_ctl(dpif->epoll_fd, EPOLL_CTL_DEL, nl_sock_fd(ch->sock), NULL);
|
2013-04-10 13:05:04 -07:00
|
|
|
|
dpif->event_offset = dpif->n_events = 0;
|
2013-01-04 18:34:26 -08:00
|
|
|
|
|
|
|
|
|
nl_sock_destroy(ch->sock);
|
|
|
|
|
ch->sock = NULL;
|
2011-09-16 15:23:37 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
static void
|
|
|
|
|
dpif_linux_close(struct dpif *dpif_)
|
|
|
|
|
{
|
|
|
|
|
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
2011-08-24 16:21:10 -07:00
|
|
|
|
|
2013-07-22 15:00:49 -07:00
|
|
|
|
nl_sock_destroy(dpif->port_notifier);
|
2012-05-23 16:55:09 -07:00
|
|
|
|
destroy_channels(dpif);
|
2013-07-23 12:41:57 -07:00
|
|
|
|
if (dpif->epoll_fd >= 0) {
|
|
|
|
|
close(dpif->epoll_fd);
|
|
|
|
|
}
|
2013-07-30 15:31:48 -07:00
|
|
|
|
ovs_mutex_destroy(&dpif->upcall_lock);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
free(dpif);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int
|
2010-02-08 13:22:41 -05:00
|
|
|
|
dpif_linux_destroy(struct dpif *dpif_)
|
2009-06-17 14:35:35 -07:00
|
|
|
|
{
|
2011-01-26 15:42:00 -08:00
|
|
|
|
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
|
|
|
|
struct dpif_linux_dp dp;
|
|
|
|
|
|
|
|
|
|
dpif_linux_dp_init(&dp);
|
2011-08-18 10:35:40 -07:00
|
|
|
|
dp.cmd = OVS_DP_CMD_DEL;
|
2011-01-21 17:01:56 -08:00
|
|
|
|
dp.dp_ifindex = dpif->dp_ifindex;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
return dpif_linux_dp_transact(&dp, NULL, NULL);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
|
2013-05-01 17:13:14 -07:00
|
|
|
|
static void
|
|
|
|
|
dpif_linux_run(struct dpif *dpif_)
|
|
|
|
|
{
|
|
|
|
|
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
|
|
|
|
if (dpif->refresh_channels) {
|
|
|
|
|
dpif->refresh_channels = false;
|
|
|
|
|
dpif_linux_refresh_channels(dpif_);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
static int
|
2011-10-05 11:18:13 -07:00
|
|
|
|
dpif_linux_get_stats(const struct dpif *dpif_, struct dpif_dp_stats *stats)
|
2009-06-17 14:35:35 -07:00
|
|
|
|
{
|
2011-01-26 15:42:00 -08:00
|
|
|
|
struct dpif_linux_dp dp;
|
|
|
|
|
struct ofpbuf *buf;
|
|
|
|
|
int error;
|
|
|
|
|
|
|
|
|
|
error = dpif_linux_dp_get(dpif_, &dp, &buf);
|
|
|
|
|
if (!error) {
|
2011-10-05 11:18:13 -07:00
|
|
|
|
stats->n_hit = dp.stats.n_hit;
|
|
|
|
|
stats->n_missed = dp.stats.n_missed;
|
|
|
|
|
stats->n_lost = dp.stats.n_lost;
|
|
|
|
|
stats->n_flows = dp.stats.n_flows;
|
2013-10-21 14:37:34 -07:00
|
|
|
|
stats->n_masks = dp.megaflow_stats.n_masks;
|
|
|
|
|
stats->n_mask_hit = dp.megaflow_stats.n_mask_hit;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
ofpbuf_delete(buf);
|
|
|
|
|
}
|
|
|
|
|
return error;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
|
2012-12-14 19:14:54 -08:00
|
|
|
|
static const char *
|
|
|
|
|
get_vport_type(const struct dpif_linux_vport *vport)
|
|
|
|
|
{
|
|
|
|
|
static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(5, 20);
|
|
|
|
|
|
|
|
|
|
switch (vport->type) {
|
|
|
|
|
case OVS_VPORT_TYPE_NETDEV:
|
|
|
|
|
return "system";
|
|
|
|
|
|
|
|
|
|
case OVS_VPORT_TYPE_INTERNAL:
|
|
|
|
|
return "internal";
|
|
|
|
|
|
|
|
|
|
case OVS_VPORT_TYPE_GRE:
|
|
|
|
|
return "gre";
|
|
|
|
|
|
|
|
|
|
case OVS_VPORT_TYPE_GRE64:
|
|
|
|
|
return "gre64";
|
|
|
|
|
|
|
|
|
|
case OVS_VPORT_TYPE_VXLAN:
|
|
|
|
|
return "vxlan";
|
|
|
|
|
|
2013-02-21 21:52:04 -08:00
|
|
|
|
case OVS_VPORT_TYPE_LISP:
|
|
|
|
|
return "lisp";
|
|
|
|
|
|
2012-12-14 19:14:54 -08:00
|
|
|
|
case OVS_VPORT_TYPE_UNSPEC:
|
|
|
|
|
case __OVS_VPORT_TYPE_MAX:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
VLOG_WARN_RL(&rl, "dp%d: port `%s' has unsupported type %u",
|
|
|
|
|
vport->dp_ifindex, vport->name, (unsigned int) vport->type);
|
|
|
|
|
return "unknown";
|
|
|
|
|
}
|
|
|
|
|
|
2013-01-25 13:30:40 -08:00
|
|
|
|
static enum ovs_vport_type
|
|
|
|
|
netdev_to_ovs_vport_type(const struct netdev *netdev)
|
|
|
|
|
{
|
|
|
|
|
const char *type = netdev_get_type(netdev);
|
|
|
|
|
|
|
|
|
|
if (!strcmp(type, "tap") || !strcmp(type, "system")) {
|
|
|
|
|
return OVS_VPORT_TYPE_NETDEV;
|
|
|
|
|
} else if (!strcmp(type, "internal")) {
|
|
|
|
|
return OVS_VPORT_TYPE_INTERNAL;
|
|
|
|
|
} else if (strstr(type, "gre64")) {
|
|
|
|
|
return OVS_VPORT_TYPE_GRE64;
|
|
|
|
|
} else if (strstr(type, "gre")) {
|
|
|
|
|
return OVS_VPORT_TYPE_GRE;
|
|
|
|
|
} else if (!strcmp(type, "vxlan")) {
|
|
|
|
|
return OVS_VPORT_TYPE_VXLAN;
|
2013-02-21 21:52:04 -08:00
|
|
|
|
} else if (!strcmp(type, "lisp")) {
|
|
|
|
|
return OVS_VPORT_TYPE_LISP;
|
2013-01-25 13:30:40 -08:00
|
|
|
|
} else {
|
|
|
|
|
return OVS_VPORT_TYPE_UNSPEC;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
static int
|
2013-07-23 12:41:57 -07:00
|
|
|
|
dpif_linux_port_add__(struct dpif *dpif_, struct netdev *netdev,
|
|
|
|
|
odp_port_t *port_nop)
|
2009-06-17 14:35:35 -07:00
|
|
|
|
{
|
2011-01-26 12:28:59 -08:00
|
|
|
|
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
2013-02-14 09:37:26 -05:00
|
|
|
|
const struct netdev_tunnel_config *tnl_cfg;
|
2013-05-01 11:05:28 -07:00
|
|
|
|
char namebuf[NETDEV_VPORT_NAME_BUFSIZE];
|
|
|
|
|
const char *name = netdev_vport_get_dpif_port(netdev,
|
|
|
|
|
namebuf, sizeof namebuf);
|
2010-12-03 14:41:38 -08:00
|
|
|
|
const char *type = netdev_get_type(netdev);
|
2011-01-26 12:28:59 -08:00
|
|
|
|
struct dpif_linux_vport request, reply;
|
2013-01-04 18:34:26 -08:00
|
|
|
|
struct nl_sock *sock = NULL;
|
2012-11-14 15:58:19 -08:00
|
|
|
|
uint32_t upcall_pid;
|
2011-01-26 12:28:59 -08:00
|
|
|
|
struct ofpbuf *buf;
|
2013-02-14 09:37:26 -05:00
|
|
|
|
uint64_t options_stub[64 / 8];
|
|
|
|
|
struct ofpbuf options;
|
2012-11-14 15:58:19 -08:00
|
|
|
|
int error;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
|
2013-01-04 18:34:26 -08:00
|
|
|
|
if (dpif->epoll_fd >= 0) {
|
|
|
|
|
error = nl_sock_create(NETLINK_GENERIC, &sock);
|
|
|
|
|
if (error) {
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2011-01-26 12:28:59 -08:00
|
|
|
|
dpif_linux_vport_init(&request);
|
2011-08-18 10:35:40 -07:00
|
|
|
|
request.cmd = OVS_VPORT_CMD_NEW;
|
2011-01-21 17:01:56 -08:00
|
|
|
|
request.dp_ifindex = dpif->dp_ifindex;
|
2013-01-25 13:30:40 -08:00
|
|
|
|
request.type = netdev_to_ovs_vport_type(netdev);
|
2011-08-18 10:35:40 -07:00
|
|
|
|
if (request.type == OVS_VPORT_TYPE_UNSPEC) {
|
2011-01-23 20:01:30 -08:00
|
|
|
|
VLOG_WARN_RL(&error_rl, "%s: cannot create port `%s' because it has "
|
|
|
|
|
"unsupported type `%s'",
|
2011-01-26 12:28:59 -08:00
|
|
|
|
dpif_name(dpif_), name, type);
|
2013-01-04 18:34:26 -08:00
|
|
|
|
nl_sock_destroy(sock);
|
2011-01-23 20:01:30 -08:00
|
|
|
|
return EINVAL;
|
|
|
|
|
}
|
2011-01-26 12:28:59 -08:00
|
|
|
|
request.name = name;
|
2010-12-03 14:41:38 -08:00
|
|
|
|
|
2011-08-26 23:34:40 -07:00
|
|
|
|
if (request.type == OVS_VPORT_TYPE_NETDEV) {
|
|
|
|
|
netdev_linux_ethtool_set_flag(netdev, ETH_FLAG_LRO, "LRO", false);
|
|
|
|
|
}
|
|
|
|
|
|
2013-02-14 09:37:26 -05:00
|
|
|
|
tnl_cfg = netdev_get_tunnel_config(netdev);
|
|
|
|
|
if (tnl_cfg && tnl_cfg->dst_port != 0) {
|
|
|
|
|
ofpbuf_use_stack(&options, options_stub, sizeof options_stub);
|
|
|
|
|
nl_msg_put_u16(&options, OVS_TUNNEL_ATTR_DST_PORT,
|
2013-02-15 11:24:27 -08:00
|
|
|
|
ntohs(tnl_cfg->dst_port));
|
2013-02-14 09:37:26 -05:00
|
|
|
|
request.options = options.data;
|
|
|
|
|
request.options_len = options.size;
|
|
|
|
|
}
|
|
|
|
|
|
2012-11-14 15:58:19 -08:00
|
|
|
|
request.port_no = *port_nop;
|
2013-01-04 18:34:26 -08:00
|
|
|
|
upcall_pid = sock ? nl_sock_pid(sock) : 0;
|
2012-11-14 15:58:19 -08:00
|
|
|
|
request.upcall_pid = &upcall_pid;
|
2012-02-16 17:12:36 -08:00
|
|
|
|
|
2012-11-14 15:58:19 -08:00
|
|
|
|
error = dpif_linux_vport_transact(&request, &reply, &buf);
|
|
|
|
|
if (!error) {
|
|
|
|
|
*port_nop = reply.port_no;
|
|
|
|
|
VLOG_DBG("%s: assigning port %"PRIu32" to netlink pid %"PRIu32,
|
2013-01-05 10:43:49 -08:00
|
|
|
|
dpif_name(dpif_), reply.port_no, upcall_pid);
|
2013-01-16 15:53:14 -08:00
|
|
|
|
} else {
|
2013-06-19 16:58:44 -07:00
|
|
|
|
if (error == EBUSY && *port_nop != ODPP_NONE) {
|
2013-01-16 15:53:14 -08:00
|
|
|
|
VLOG_INFO("%s: requested port %"PRIu32" is in use",
|
|
|
|
|
dpif_name(dpif_), *port_nop);
|
|
|
|
|
}
|
2013-01-04 18:34:26 -08:00
|
|
|
|
nl_sock_destroy(sock);
|
|
|
|
|
ofpbuf_delete(buf);
|
|
|
|
|
return error;
|
2012-11-14 15:58:19 -08:00
|
|
|
|
}
|
|
|
|
|
ofpbuf_delete(buf);
|
2010-12-03 14:41:38 -08:00
|
|
|
|
|
2013-01-04 18:34:26 -08:00
|
|
|
|
if (sock) {
|
|
|
|
|
error = add_channel(dpif, *port_nop, sock);
|
|
|
|
|
if (error) {
|
|
|
|
|
VLOG_INFO("%s: could not add channel for port %s",
|
|
|
|
|
dpif_name(dpif_), name);
|
|
|
|
|
|
|
|
|
|
/* Delete the port. */
|
|
|
|
|
dpif_linux_vport_init(&request);
|
|
|
|
|
request.cmd = OVS_VPORT_CMD_DEL;
|
|
|
|
|
request.dp_ifindex = dpif->dp_ifindex;
|
|
|
|
|
request.port_no = *port_nop;
|
|
|
|
|
dpif_linux_vport_transact(&request, NULL, NULL);
|
|
|
|
|
|
|
|
|
|
nl_sock_destroy(sock);
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int
|
2013-07-23 12:41:57 -07:00
|
|
|
|
dpif_linux_port_add(struct dpif *dpif_, struct netdev *netdev,
|
|
|
|
|
odp_port_t *port_nop)
|
|
|
|
|
{
|
|
|
|
|
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
|
|
|
|
int error;
|
|
|
|
|
|
2013-07-30 15:31:48 -07:00
|
|
|
|
ovs_mutex_lock(&dpif->upcall_lock);
|
2013-07-23 12:41:57 -07:00
|
|
|
|
error = dpif_linux_port_add__(dpif_, netdev, port_nop);
|
2013-07-30 15:31:48 -07:00
|
|
|
|
ovs_mutex_unlock(&dpif->upcall_lock);
|
2013-07-23 12:41:57 -07:00
|
|
|
|
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
|
dpif_linux_port_del__(struct dpif *dpif_, odp_port_t port_no)
|
2009-06-17 14:35:35 -07:00
|
|
|
|
{
|
2011-01-26 12:28:59 -08:00
|
|
|
|
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
|
|
|
|
struct dpif_linux_vport vport;
|
2011-04-04 16:55:34 -07:00
|
|
|
|
int error;
|
2011-01-26 12:28:59 -08:00
|
|
|
|
|
|
|
|
|
dpif_linux_vport_init(&vport);
|
2011-08-18 10:35:40 -07:00
|
|
|
|
vport.cmd = OVS_VPORT_CMD_DEL;
|
2011-01-21 17:01:56 -08:00
|
|
|
|
vport.dp_ifindex = dpif->dp_ifindex;
|
2011-01-26 12:28:59 -08:00
|
|
|
|
vport.port_no = port_no;
|
2011-04-04 16:55:34 -07:00
|
|
|
|
error = dpif_linux_vport_transact(&vport, NULL, NULL);
|
|
|
|
|
|
2013-01-04 18:34:26 -08:00
|
|
|
|
del_channel(dpif, port_no);
|
|
|
|
|
|
2011-04-04 16:55:34 -07:00
|
|
|
|
return error;
|
2010-12-03 14:41:38 -08:00
|
|
|
|
}
|
2010-04-10 01:19:29 -04:00
|
|
|
|
|
2013-07-23 12:41:57 -07:00
|
|
|
|
static int
|
|
|
|
|
dpif_linux_port_del(struct dpif *dpif_, odp_port_t port_no)
|
|
|
|
|
{
|
|
|
|
|
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
|
|
|
|
int error;
|
|
|
|
|
|
2013-07-30 15:31:48 -07:00
|
|
|
|
ovs_mutex_lock(&dpif->upcall_lock);
|
2013-07-23 12:41:57 -07:00
|
|
|
|
error = dpif_linux_port_del__(dpif_, port_no);
|
2013-07-30 15:31:48 -07:00
|
|
|
|
ovs_mutex_unlock(&dpif->upcall_lock);
|
2013-07-23 12:41:57 -07:00
|
|
|
|
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
2010-12-03 14:41:38 -08:00
|
|
|
|
static int
|
2013-06-19 16:58:44 -07:00
|
|
|
|
dpif_linux_port_query__(const struct dpif *dpif, odp_port_t port_no,
|
2011-01-23 18:48:02 -08:00
|
|
|
|
const char *port_name, struct dpif_port *dpif_port)
|
2010-12-03 14:41:38 -08:00
|
|
|
|
{
|
2011-01-26 12:28:59 -08:00
|
|
|
|
struct dpif_linux_vport request;
|
|
|
|
|
struct dpif_linux_vport reply;
|
|
|
|
|
struct ofpbuf *buf;
|
2011-01-23 18:48:02 -08:00
|
|
|
|
int error;
|
|
|
|
|
|
2011-01-26 12:28:59 -08:00
|
|
|
|
dpif_linux_vport_init(&request);
|
2011-08-18 10:35:40 -07:00
|
|
|
|
request.cmd = OVS_VPORT_CMD_GET;
|
2011-01-21 17:01:56 -08:00
|
|
|
|
request.dp_ifindex = dpif_linux_cast(dpif)->dp_ifindex;
|
2011-01-26 12:28:59 -08:00
|
|
|
|
request.port_no = port_no;
|
|
|
|
|
request.name = port_name;
|
2011-01-23 18:48:02 -08:00
|
|
|
|
|
2011-01-26 12:28:59 -08:00
|
|
|
|
error = dpif_linux_vport_transact(&request, &reply, &buf);
|
|
|
|
|
if (!error) {
|
2012-02-27 18:42:17 -08:00
|
|
|
|
if (reply.dp_ifindex != request.dp_ifindex) {
|
|
|
|
|
/* A query by name reported that 'port_name' is in some datapath
|
|
|
|
|
* other than 'dpif', but the caller wants to know about 'dpif'. */
|
|
|
|
|
error = ENODEV;
|
2012-10-17 23:11:53 -07:00
|
|
|
|
} else if (dpif_port) {
|
2012-02-27 18:42:17 -08:00
|
|
|
|
dpif_port->name = xstrdup(reply.name);
|
2012-12-14 19:14:54 -08:00
|
|
|
|
dpif_port->type = xstrdup(get_vport_type(&reply));
|
2012-02-27 18:42:17 -08:00
|
|
|
|
dpif_port->port_no = reply.port_no;
|
|
|
|
|
}
|
2011-01-26 12:28:59 -08:00
|
|
|
|
ofpbuf_delete(buf);
|
2010-04-10 01:19:29 -04:00
|
|
|
|
}
|
2011-01-26 12:28:59 -08:00
|
|
|
|
return error;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int
|
2013-06-19 16:58:44 -07:00
|
|
|
|
dpif_linux_port_query_by_number(const struct dpif *dpif, odp_port_t port_no,
|
2011-01-23 18:48:02 -08:00
|
|
|
|
struct dpif_port *dpif_port)
|
2009-06-17 14:35:35 -07:00
|
|
|
|
{
|
2011-01-26 12:28:59 -08:00
|
|
|
|
return dpif_linux_port_query__(dpif, port_no, NULL, dpif_port);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int
|
2011-01-23 18:48:02 -08:00
|
|
|
|
dpif_linux_port_query_by_name(const struct dpif *dpif, const char *devname,
|
|
|
|
|
struct dpif_port *dpif_port)
|
2009-06-17 14:35:35 -07:00
|
|
|
|
{
|
2011-01-23 18:48:02 -08:00
|
|
|
|
return dpif_linux_port_query__(dpif, 0, devname, dpif_port);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
|
2013-08-22 14:24:18 -07:00
|
|
|
|
static uint32_t
|
2011-01-26 09:24:59 -08:00
|
|
|
|
dpif_linux_get_max_ports(const struct dpif *dpif OVS_UNUSED)
|
|
|
|
|
{
|
2013-08-22 14:24:18 -07:00
|
|
|
|
return MAX_PORTS;
|
2011-01-26 09:24:59 -08:00
|
|
|
|
}
|
|
|
|
|
|
2011-10-12 16:24:54 -07:00
|
|
|
|
static uint32_t
|
2013-06-19 16:58:44 -07:00
|
|
|
|
dpif_linux_port_get_pid(const struct dpif *dpif_, odp_port_t port_no)
|
2011-10-12 16:24:54 -07:00
|
|
|
|
{
|
2013-07-23 12:41:57 -07:00
|
|
|
|
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
2013-06-19 16:58:44 -07:00
|
|
|
|
uint32_t port_idx = odp_to_u32(port_no);
|
2013-07-23 12:41:57 -07:00
|
|
|
|
uint32_t pid = 0;
|
2011-10-12 16:24:54 -07:00
|
|
|
|
|
2013-07-30 15:31:48 -07:00
|
|
|
|
ovs_mutex_lock(&dpif->upcall_lock);
|
2013-07-23 12:41:57 -07:00
|
|
|
|
if (dpif->epoll_fd >= 0) {
|
2013-06-19 16:58:44 -07:00
|
|
|
|
/* The ODPP_NONE "reserved" port number uses the "ovs-system"'s
|
2013-01-04 18:34:26 -08:00
|
|
|
|
* channel, since it is not heavily loaded. */
|
2013-06-19 16:58:44 -07:00
|
|
|
|
uint32_t idx = port_idx >= dpif->uc_array_size ? 0 : port_idx;
|
2013-07-23 12:41:57 -07:00
|
|
|
|
pid = nl_sock_pid(dpif->channels[idx].sock);
|
2011-10-12 16:24:54 -07:00
|
|
|
|
}
|
2013-07-30 15:31:48 -07:00
|
|
|
|
ovs_mutex_unlock(&dpif->upcall_lock);
|
2013-07-23 12:41:57 -07:00
|
|
|
|
|
|
|
|
|
return pid;
|
2011-10-12 16:24:54 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
static int
|
|
|
|
|
dpif_linux_flow_flush(struct dpif *dpif_)
|
|
|
|
|
{
|
2013-07-19 14:51:32 -07:00
|
|
|
|
const struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
2011-01-28 14:00:51 -08:00
|
|
|
|
struct dpif_linux_flow flow;
|
|
|
|
|
|
|
|
|
|
dpif_linux_flow_init(&flow);
|
2011-08-18 10:35:40 -07:00
|
|
|
|
flow.cmd = OVS_FLOW_CMD_DEL;
|
2011-01-21 17:01:56 -08:00
|
|
|
|
flow.dp_ifindex = dpif->dp_ifindex;
|
2011-01-28 14:00:51 -08:00
|
|
|
|
return dpif_linux_flow_transact(&flow, NULL, NULL);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
|
2011-01-26 12:28:59 -08:00
|
|
|
|
struct dpif_linux_port_state {
|
2011-01-28 13:59:03 -08:00
|
|
|
|
struct nl_dump dump;
|
2011-01-26 12:28:59 -08:00
|
|
|
|
};
|
|
|
|
|
|
2013-05-01 14:40:38 -07:00
|
|
|
|
static void
|
|
|
|
|
dpif_linux_port_dump_start__(const struct dpif *dpif_, struct nl_dump *dump)
|
2009-06-17 14:35:35 -07:00
|
|
|
|
{
|
2013-07-19 14:51:32 -07:00
|
|
|
|
const struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
2011-01-28 13:59:03 -08:00
|
|
|
|
struct dpif_linux_vport request;
|
|
|
|
|
struct ofpbuf *buf;
|
|
|
|
|
|
|
|
|
|
dpif_linux_vport_init(&request);
|
2013-09-12 10:54:23 -07:00
|
|
|
|
request.cmd = OVS_VPORT_CMD_GET;
|
2011-01-21 17:01:56 -08:00
|
|
|
|
request.dp_ifindex = dpif->dp_ifindex;
|
2011-01-28 13:59:03 -08:00
|
|
|
|
|
|
|
|
|
buf = ofpbuf_new(1024);
|
|
|
|
|
dpif_linux_vport_to_ofpbuf(&request, buf);
|
2013-05-01 14:40:38 -07:00
|
|
|
|
nl_dump_start(dump, NETLINK_GENERIC, buf);
|
2011-01-28 13:59:03 -08:00
|
|
|
|
ofpbuf_delete(buf);
|
2013-05-01 14:40:38 -07:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
|
dpif_linux_port_dump_start(const struct dpif *dpif, void **statep)
|
|
|
|
|
{
|
|
|
|
|
struct dpif_linux_port_state *state;
|
|
|
|
|
|
|
|
|
|
*statep = state = xmalloc(sizeof *state);
|
|
|
|
|
dpif_linux_port_dump_start__(dpif, &state->dump);
|
2011-01-28 13:59:03 -08:00
|
|
|
|
|
datapath: Change listing ports to use an iterator concept.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to add new
features to the kernel vport layer without changing userspace software. In
turn, that means that the odp_port structure must become variable-length.
This does not, however, fit in well with the ODP_PORT_LIST ioctl in its
current form, because that would require userspace to know how much space
to allocate for each port in advance, or to allocate as much space as
could possibly be needed. Neither choice is very attractive.
This commit prepares for a different solution, by replacing ODP_PORT_LIST
by a new ioctl ODP_VPORT_DUMP that retrieves information about a single
vport from the datapath on each call. It is much cleaner to allocate the
maximum amount of space for a single vport than to do so for possibly a
large number of vports.
It would be faster to retrieve a number of vports in batch instead of just
one at a time, but that will naturally happen later when the kernel
datapath interface is changed to use Netlink, so this patch does not bother
with it.
The Netlink version won't need to take the starting port number from
userspace, since Netlink sockets can keep track of that state as part
of their "dump" feature.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2011-01-10 13:12:12 -08:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2013-05-01 14:40:38 -07:00
|
|
|
|
static bool
|
|
|
|
|
dpif_linux_port_dump_next__(const struct dpif *dpif_, struct nl_dump *dump,
|
|
|
|
|
struct dpif_linux_vport *vport)
|
|
|
|
|
{
|
|
|
|
|
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
|
|
|
|
struct ofpbuf buf;
|
|
|
|
|
int error;
|
|
|
|
|
|
|
|
|
|
if (!nl_dump_next(dump, &buf)) {
|
|
|
|
|
return EOF;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
error = dpif_linux_vport_from_ofpbuf(vport, &buf);
|
|
|
|
|
if (error) {
|
|
|
|
|
VLOG_WARN_RL(&error_rl, "%s: failed to parse vport record (%s)",
|
|
|
|
|
dpif_name(&dpif->dpif), ovs_strerror(error));
|
|
|
|
|
}
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
datapath: Change listing ports to use an iterator concept.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to add new
features to the kernel vport layer without changing userspace software. In
turn, that means that the odp_port structure must become variable-length.
This does not, however, fit in well with the ODP_PORT_LIST ioctl in its
current form, because that would require userspace to know how much space
to allocate for each port in advance, or to allocate as much space as
could possibly be needed. Neither choice is very attractive.
This commit prepares for a different solution, by replacing ODP_PORT_LIST
by a new ioctl ODP_VPORT_DUMP that retrieves information about a single
vport from the datapath on each call. It is much cleaner to allocate the
maximum amount of space for a single vport than to do so for possibly a
large number of vports.
It would be faster to retrieve a number of vports in batch instead of just
one at a time, but that will naturally happen later when the kernel
datapath interface is changed to use Netlink, so this patch does not bother
with it.
The Netlink version won't need to take the starting port number from
userspace, since Netlink sockets can keep track of that state as part
of their "dump" feature.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2011-01-10 13:12:12 -08:00
|
|
|
|
static int
|
2011-01-28 13:59:03 -08:00
|
|
|
|
dpif_linux_port_dump_next(const struct dpif *dpif OVS_UNUSED, void *state_,
|
2011-01-23 18:48:02 -08:00
|
|
|
|
struct dpif_port *dpif_port)
|
datapath: Change listing ports to use an iterator concept.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to add new
features to the kernel vport layer without changing userspace software. In
turn, that means that the odp_port structure must become variable-length.
This does not, however, fit in well with the ODP_PORT_LIST ioctl in its
current form, because that would require userspace to know how much space
to allocate for each port in advance, or to allocate as much space as
could possibly be needed. Neither choice is very attractive.
This commit prepares for a different solution, by replacing ODP_PORT_LIST
by a new ioctl ODP_VPORT_DUMP that retrieves information about a single
vport from the datapath on each call. It is much cleaner to allocate the
maximum amount of space for a single vport than to do so for possibly a
large number of vports.
It would be faster to retrieve a number of vports in batch instead of just
one at a time, but that will naturally happen later when the kernel
datapath interface is changed to use Netlink, so this patch does not bother
with it.
The Netlink version won't need to take the starting port number from
userspace, since Netlink sockets can keep track of that state as part
of their "dump" feature.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2011-01-10 13:12:12 -08:00
|
|
|
|
{
|
2011-01-26 12:28:59 -08:00
|
|
|
|
struct dpif_linux_port_state *state = state_;
|
2011-01-28 13:59:03 -08:00
|
|
|
|
struct dpif_linux_vport vport;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
int error;
|
|
|
|
|
|
2013-05-01 14:40:38 -07:00
|
|
|
|
error = dpif_linux_port_dump_next__(dpif, &state->dump, &vport);
|
2010-12-03 14:41:38 -08:00
|
|
|
|
if (error) {
|
2011-01-28 13:59:03 -08:00
|
|
|
|
return error;
|
2010-12-03 14:41:38 -08:00
|
|
|
|
}
|
2012-07-13 16:00:29 -07:00
|
|
|
|
dpif_port->name = CONST_CAST(char *, vport.name);
|
2012-12-14 19:14:54 -08:00
|
|
|
|
dpif_port->type = CONST_CAST(char *, get_vport_type(&vport));
|
2011-01-28 13:59:03 -08:00
|
|
|
|
dpif_port->port_no = vport.port_no;
|
|
|
|
|
return 0;
|
datapath: Change listing ports to use an iterator concept.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to add new
features to the kernel vport layer without changing userspace software. In
turn, that means that the odp_port structure must become variable-length.
This does not, however, fit in well with the ODP_PORT_LIST ioctl in its
current form, because that would require userspace to know how much space
to allocate for each port in advance, or to allocate as much space as
could possibly be needed. Neither choice is very attractive.
This commit prepares for a different solution, by replacing ODP_PORT_LIST
by a new ioctl ODP_VPORT_DUMP that retrieves information about a single
vport from the datapath on each call. It is much cleaner to allocate the
maximum amount of space for a single vport than to do so for possibly a
large number of vports.
It would be faster to retrieve a number of vports in batch instead of just
one at a time, but that will naturally happen later when the kernel
datapath interface is changed to use Netlink, so this patch does not bother
with it.
The Netlink version won't need to take the starting port number from
userspace, since Netlink sockets can keep track of that state as part
of their "dump" feature.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2011-01-10 13:12:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int
|
2012-02-16 17:12:36 -08:00
|
|
|
|
dpif_linux_port_dump_done(const struct dpif *dpif_ OVS_UNUSED, void *state_)
|
datapath: Change listing ports to use an iterator concept.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to add new
features to the kernel vport layer without changing userspace software. In
turn, that means that the odp_port structure must become variable-length.
This does not, however, fit in well with the ODP_PORT_LIST ioctl in its
current form, because that would require userspace to know how much space
to allocate for each port in advance, or to allocate as much space as
could possibly be needed. Neither choice is very attractive.
This commit prepares for a different solution, by replacing ODP_PORT_LIST
by a new ioctl ODP_VPORT_DUMP that retrieves information about a single
vport from the datapath on each call. It is much cleaner to allocate the
maximum amount of space for a single vport than to do so for possibly a
large number of vports.
It would be faster to retrieve a number of vports in batch instead of just
one at a time, but that will naturally happen later when the kernel
datapath interface is changed to use Netlink, so this patch does not bother
with it.
The Netlink version won't need to take the starting port number from
userspace, since Netlink sockets can keep track of that state as part
of their "dump" feature.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2011-01-10 13:12:12 -08:00
|
|
|
|
{
|
2011-01-26 12:28:59 -08:00
|
|
|
|
struct dpif_linux_port_state *state = state_;
|
2011-01-28 13:59:03 -08:00
|
|
|
|
int error = nl_dump_done(&state->dump);
|
2011-04-29 13:12:19 -07:00
|
|
|
|
|
datapath: Change listing ports to use an iterator concept.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to add new
features to the kernel vport layer without changing userspace software. In
turn, that means that the odp_port structure must become variable-length.
This does not, however, fit in well with the ODP_PORT_LIST ioctl in its
current form, because that would require userspace to know how much space
to allocate for each port in advance, or to allocate as much space as
could possibly be needed. Neither choice is very attractive.
This commit prepares for a different solution, by replacing ODP_PORT_LIST
by a new ioctl ODP_VPORT_DUMP that retrieves information about a single
vport from the datapath on each call. It is much cleaner to allocate the
maximum amount of space for a single vport than to do so for possibly a
large number of vports.
It would be faster to retrieve a number of vports in batch instead of just
one at a time, but that will naturally happen later when the kernel
datapath interface is changed to use Netlink, so this patch does not bother
with it.
The Netlink version won't need to take the starting port number from
userspace, since Netlink sockets can keep track of that state as part
of their "dump" feature.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2011-01-10 13:12:12 -08:00
|
|
|
|
free(state);
|
2011-01-28 13:59:03 -08:00
|
|
|
|
return error;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-24 10:24:09 -07:00
|
|
|
|
static int
|
|
|
|
|
dpif_linux_port_poll(const struct dpif *dpif_, char **devnamep)
|
|
|
|
|
{
|
|
|
|
|
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
|
|
|
|
|
2013-07-22 15:00:49 -07:00
|
|
|
|
/* Lazily create the Netlink socket to listen for notifications. */
|
|
|
|
|
if (!dpif->port_notifier) {
|
|
|
|
|
struct nl_sock *sock;
|
|
|
|
|
int error;
|
|
|
|
|
|
|
|
|
|
error = nl_sock_create(NETLINK_GENERIC, &sock);
|
|
|
|
|
if (error) {
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
error = nl_sock_join_mcgroup(sock, ovs_vport_mcgroup);
|
|
|
|
|
if (error) {
|
|
|
|
|
nl_sock_destroy(sock);
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
dpif->port_notifier = sock;
|
|
|
|
|
|
|
|
|
|
/* We have no idea of the current state so report that everything
|
|
|
|
|
* changed. */
|
|
|
|
|
return ENOBUFS;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (;;) {
|
|
|
|
|
static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 5);
|
|
|
|
|
uint64_t buf_stub[4096 / 8];
|
|
|
|
|
struct ofpbuf buf;
|
|
|
|
|
int error;
|
|
|
|
|
|
|
|
|
|
ofpbuf_use_stub(&buf, buf_stub, sizeof buf_stub);
|
|
|
|
|
error = nl_sock_recv(dpif->port_notifier, &buf, false);
|
|
|
|
|
if (!error) {
|
|
|
|
|
struct dpif_linux_vport vport;
|
|
|
|
|
|
|
|
|
|
error = dpif_linux_vport_from_ofpbuf(&vport, &buf);
|
|
|
|
|
if (!error) {
|
|
|
|
|
if (vport.dp_ifindex == dpif->dp_ifindex
|
|
|
|
|
&& (vport.cmd == OVS_VPORT_CMD_NEW
|
|
|
|
|
|| vport.cmd == OVS_VPORT_CMD_DEL
|
|
|
|
|
|| vport.cmd == OVS_VPORT_CMD_SET)) {
|
|
|
|
|
VLOG_DBG("port_changed: dpif:%s vport:%s cmd:%"PRIu8,
|
|
|
|
|
dpif->dpif.full_name, vport.name, vport.cmd);
|
2013-05-01 17:13:14 -07:00
|
|
|
|
if (vport.cmd == OVS_VPORT_CMD_DEL) {
|
|
|
|
|
dpif->refresh_channels = true;
|
|
|
|
|
}
|
2013-07-22 15:00:49 -07:00
|
|
|
|
*devnamep = xstrdup(vport.name);
|
2013-08-01 14:07:35 -07:00
|
|
|
|
ofpbuf_uninit(&buf);
|
2013-07-22 15:00:49 -07:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
}
|
2013-08-01 14:07:35 -07:00
|
|
|
|
} else if (error != EAGAIN) {
|
|
|
|
|
VLOG_WARN_RL(&rl, "error reading or parsing netlink (%s)",
|
|
|
|
|
ovs_strerror(error));
|
|
|
|
|
nl_sock_drain(dpif->port_notifier);
|
|
|
|
|
error = ENOBUFS;
|
2013-07-22 15:00:49 -07:00
|
|
|
|
}
|
|
|
|
|
|
2013-08-01 14:07:35 -07:00
|
|
|
|
ofpbuf_uninit(&buf);
|
|
|
|
|
if (error) {
|
|
|
|
|
return error;
|
|
|
|
|
}
|
2009-06-24 10:24:09 -07:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
dpif_linux_port_poll_wait(const struct dpif *dpif_)
|
|
|
|
|
{
|
2013-07-19 14:51:32 -07:00
|
|
|
|
const struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
2013-07-22 15:00:49 -07:00
|
|
|
|
|
|
|
|
|
if (dpif->port_notifier) {
|
|
|
|
|
nl_sock_wait(dpif->port_notifier, POLLIN);
|
|
|
|
|
} else {
|
2009-06-24 10:24:09 -07:00
|
|
|
|
poll_immediate_wake();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
static int
|
2011-02-01 09:25:26 -08:00
|
|
|
|
dpif_linux_flow_get__(const struct dpif *dpif_,
|
|
|
|
|
const struct nlattr *key, size_t key_len,
|
|
|
|
|
struct dpif_linux_flow *reply, struct ofpbuf **bufp)
|
2009-06-17 14:35:35 -07:00
|
|
|
|
{
|
2013-07-19 14:51:32 -07:00
|
|
|
|
const struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
2011-02-01 09:25:26 -08:00
|
|
|
|
struct dpif_linux_flow request;
|
2011-01-26 07:03:39 -08:00
|
|
|
|
|
2011-01-26 15:42:00 -08:00
|
|
|
|
dpif_linux_flow_init(&request);
|
2011-08-18 10:35:40 -07:00
|
|
|
|
request.cmd = OVS_FLOW_CMD_GET;
|
2011-01-21 17:01:56 -08:00
|
|
|
|
request.dp_ifindex = dpif->dp_ifindex;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
request.key = key;
|
|
|
|
|
request.key_len = key_len;
|
2011-02-01 09:25:26 -08:00
|
|
|
|
return dpif_linux_flow_transact(&request, reply, bufp);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
|
dpif_linux_flow_get(const struct dpif *dpif_,
|
|
|
|
|
const struct nlattr *key, size_t key_len,
|
|
|
|
|
struct ofpbuf **actionsp, struct dpif_flow_stats *stats)
|
|
|
|
|
{
|
|
|
|
|
struct dpif_linux_flow reply;
|
|
|
|
|
struct ofpbuf *buf;
|
|
|
|
|
int error;
|
|
|
|
|
|
|
|
|
|
error = dpif_linux_flow_get__(dpif_, key, key_len, &reply, &buf);
|
2011-01-26 07:03:39 -08:00
|
|
|
|
if (!error) {
|
|
|
|
|
if (stats) {
|
2011-01-26 15:42:00 -08:00
|
|
|
|
dpif_linux_flow_get_stats(&reply, stats);
|
2011-01-26 07:03:39 -08:00
|
|
|
|
}
|
2011-01-26 15:42:00 -08:00
|
|
|
|
if (actionsp) {
|
2012-07-13 16:00:29 -07:00
|
|
|
|
buf->data = CONST_CAST(struct nlattr *, reply.actions);
|
2011-01-26 15:42:00 -08:00
|
|
|
|
buf->size = reply.actions_len;
|
|
|
|
|
*actionsp = buf;
|
|
|
|
|
} else {
|
|
|
|
|
ofpbuf_delete(buf);
|
2011-01-26 07:03:39 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return error;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
|
2011-09-27 15:08:50 -07:00
|
|
|
|
static void
|
2011-12-26 14:39:03 -08:00
|
|
|
|
dpif_linux_init_flow_put(struct dpif *dpif_, const struct dpif_flow_put *put,
|
2011-09-27 15:08:50 -07:00
|
|
|
|
struct dpif_linux_flow *request)
|
|
|
|
|
{
|
2013-04-23 14:06:25 -07:00
|
|
|
|
static const struct nlattr dummy_action;
|
2011-09-27 15:08:50 -07:00
|
|
|
|
|
2013-07-19 14:51:32 -07:00
|
|
|
|
const struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
2011-09-27 15:08:50 -07:00
|
|
|
|
|
|
|
|
|
dpif_linux_flow_init(request);
|
2011-12-26 14:39:03 -08:00
|
|
|
|
request->cmd = (put->flags & DPIF_FP_CREATE
|
2011-09-27 15:08:50 -07:00
|
|
|
|
? OVS_FLOW_CMD_NEW : OVS_FLOW_CMD_SET);
|
|
|
|
|
request->dp_ifindex = dpif->dp_ifindex;
|
2011-12-26 14:39:03 -08:00
|
|
|
|
request->key = put->key;
|
|
|
|
|
request->key_len = put->key_len;
|
2013-06-19 07:15:10 +00:00
|
|
|
|
request->mask = put->mask;
|
|
|
|
|
request->mask_len = put->mask_len;
|
2011-09-27 15:08:50 -07:00
|
|
|
|
/* Ensure that OVS_FLOW_ATTR_ACTIONS will always be included. */
|
2013-04-23 14:06:25 -07:00
|
|
|
|
request->actions = (put->actions
|
|
|
|
|
? put->actions
|
|
|
|
|
: CONST_CAST(struct nlattr *, &dummy_action));
|
2011-12-26 14:39:03 -08:00
|
|
|
|
request->actions_len = put->actions_len;
|
|
|
|
|
if (put->flags & DPIF_FP_ZERO_STATS) {
|
2011-09-27 15:08:50 -07:00
|
|
|
|
request->clear = true;
|
|
|
|
|
}
|
2011-12-26 14:39:03 -08:00
|
|
|
|
request->nlmsg_flags = put->flags & DPIF_FP_MODIFY ? 0 : NLM_F_CREATE;
|
2011-09-27 15:08:50 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
static int
|
2011-12-26 14:39:03 -08:00
|
|
|
|
dpif_linux_flow_put(struct dpif *dpif_, const struct dpif_flow_put *put)
|
2009-06-17 14:35:35 -07:00
|
|
|
|
{
|
2011-01-26 15:42:00 -08:00
|
|
|
|
struct dpif_linux_flow request, reply;
|
|
|
|
|
struct ofpbuf *buf;
|
2011-01-26 07:03:39 -08:00
|
|
|
|
int error;
|
|
|
|
|
|
2011-12-26 14:39:03 -08:00
|
|
|
|
dpif_linux_init_flow_put(dpif_, put, &request);
|
2011-01-26 15:42:00 -08:00
|
|
|
|
error = dpif_linux_flow_transact(&request,
|
2011-12-26 14:39:03 -08:00
|
|
|
|
put->stats ? &reply : NULL,
|
|
|
|
|
put->stats ? &buf : NULL);
|
|
|
|
|
if (!error && put->stats) {
|
|
|
|
|
dpif_linux_flow_get_stats(&reply, put->stats);
|
2011-01-26 15:42:00 -08:00
|
|
|
|
ofpbuf_delete(buf);
|
2011-01-26 07:03:39 -08:00
|
|
|
|
}
|
|
|
|
|
return error;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
|
2012-04-17 21:52:10 -07:00
|
|
|
|
static void
|
|
|
|
|
dpif_linux_init_flow_del(struct dpif *dpif_, const struct dpif_flow_del *del,
|
|
|
|
|
struct dpif_linux_flow *request)
|
2009-06-17 14:35:35 -07:00
|
|
|
|
{
|
2013-07-19 14:51:32 -07:00
|
|
|
|
const struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
2012-04-17 21:52:10 -07:00
|
|
|
|
|
|
|
|
|
dpif_linux_flow_init(request);
|
|
|
|
|
request->cmd = OVS_FLOW_CMD_DEL;
|
|
|
|
|
request->dp_ifindex = dpif->dp_ifindex;
|
|
|
|
|
request->key = del->key;
|
|
|
|
|
request->key_len = del->key_len;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
|
dpif_linux_flow_del(struct dpif *dpif_, const struct dpif_flow_del *del)
|
|
|
|
|
{
|
2011-01-26 15:42:00 -08:00
|
|
|
|
struct dpif_linux_flow request, reply;
|
|
|
|
|
struct ofpbuf *buf;
|
2011-01-26 07:03:39 -08:00
|
|
|
|
int error;
|
|
|
|
|
|
2012-04-17 21:52:10 -07:00
|
|
|
|
dpif_linux_init_flow_del(dpif_, del, &request);
|
2011-01-26 15:42:00 -08:00
|
|
|
|
error = dpif_linux_flow_transact(&request,
|
2012-04-17 21:52:10 -07:00
|
|
|
|
del->stats ? &reply : NULL,
|
|
|
|
|
del->stats ? &buf : NULL);
|
|
|
|
|
if (!error && del->stats) {
|
|
|
|
|
dpif_linux_flow_get_stats(&reply, del->stats);
|
2011-01-26 15:42:00 -08:00
|
|
|
|
ofpbuf_delete(buf);
|
2011-01-26 07:03:39 -08:00
|
|
|
|
}
|
|
|
|
|
return error;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
|
2011-01-26 07:03:39 -08:00
|
|
|
|
struct dpif_linux_flow_state {
|
2011-01-28 14:00:51 -08:00
|
|
|
|
struct nl_dump dump;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
struct dpif_linux_flow flow;
|
2011-01-26 07:11:50 -08:00
|
|
|
|
struct dpif_flow_stats stats;
|
2011-02-01 09:25:26 -08:00
|
|
|
|
struct ofpbuf *buf;
|
2011-01-26 07:03:39 -08:00
|
|
|
|
};
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
static int
|
2011-01-28 14:00:51 -08:00
|
|
|
|
dpif_linux_flow_dump_start(const struct dpif *dpif_, void **statep)
|
2009-06-17 14:35:35 -07:00
|
|
|
|
{
|
2013-07-19 14:51:32 -07:00
|
|
|
|
const struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
2011-01-28 14:00:51 -08:00
|
|
|
|
struct dpif_linux_flow_state *state;
|
|
|
|
|
struct dpif_linux_flow request;
|
|
|
|
|
struct ofpbuf *buf;
|
|
|
|
|
|
|
|
|
|
*statep = state = xmalloc(sizeof *state);
|
|
|
|
|
|
|
|
|
|
dpif_linux_flow_init(&request);
|
2013-09-12 10:54:23 -07:00
|
|
|
|
request.cmd = OVS_FLOW_CMD_GET;
|
2011-01-21 17:01:56 -08:00
|
|
|
|
request.dp_ifindex = dpif->dp_ifindex;
|
2011-01-28 14:00:51 -08:00
|
|
|
|
|
|
|
|
|
buf = ofpbuf_new(1024);
|
|
|
|
|
dpif_linux_flow_to_ofpbuf(&request, buf);
|
2013-04-29 13:57:50 -07:00
|
|
|
|
nl_dump_start(&state->dump, NETLINK_GENERIC, buf);
|
2011-01-28 14:00:51 -08:00
|
|
|
|
ofpbuf_delete(buf);
|
|
|
|
|
|
2011-02-01 09:25:26 -08:00
|
|
|
|
state->buf = NULL;
|
|
|
|
|
|
datapath: Change listing flows to use an iterator concept.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to change
the kernel's idea of the flow key separately from the userspace version.
In turn, that means that flow keys must become variable-length. This does
not, however, fit in well with the ODP_FLOW_LIST ioctl in its current form,
because that would require userspace to know how much space to allocate
for each flow's key in advance, or to allocate as much space as could
possibly be needed. Neither choice is very attractive.
This commit prepares for a different solution, by replacing ODP_FLOW_LIST
by a new ioctl ODP_FLOW_DUMP that retrieves a single flow from the datapath
on each call. It is much cleaner to allocate the maximum amount of space
for a single flow key than to do so for possibly a very large number of
flow keys.
As a side effect, this patch also fixes a race condition that sometimes
made "ovs-dpctl dump-flows" print an error: previously, flows were listed
and then their actions were retrieved, which left a window in which
ovs-vswitchd could delete the flow. Now dumping a flow and its actions is
a single step, closing that window.
Dumping all of the flows in a datapath is no longer an atomic step, so now
it is possible to miss some flows or see a single flow twice during
iteration, if the flow table is modified by another process. It doesn't
look like this should be a problem for ovs-vswitchd.
It would be faster to retrieve a number of flows in batch instead of just
one at a time, but that will naturally happen later when the kernel
datapath interface is changed to use Netlink, so this patch does not bother
with it.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2010-12-28 10:39:52 -08:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int
|
2011-01-28 14:00:51 -08:00
|
|
|
|
dpif_linux_flow_dump_next(const struct dpif *dpif_ OVS_UNUSED, void *state_,
|
2011-01-26 07:03:39 -08:00
|
|
|
|
const struct nlattr **key, size_t *key_len,
|
2013-06-19 07:15:10 +00:00
|
|
|
|
const struct nlattr **mask, size_t *mask_len,
|
2011-01-26 07:03:39 -08:00
|
|
|
|
const struct nlattr **actions, size_t *actions_len,
|
2011-01-26 07:11:50 -08:00
|
|
|
|
const struct dpif_flow_stats **stats)
|
datapath: Change listing flows to use an iterator concept.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to change
the kernel's idea of the flow key separately from the userspace version.
In turn, that means that flow keys must become variable-length. This does
not, however, fit in well with the ODP_FLOW_LIST ioctl in its current form,
because that would require userspace to know how much space to allocate
for each flow's key in advance, or to allocate as much space as could
possibly be needed. Neither choice is very attractive.
This commit prepares for a different solution, by replacing ODP_FLOW_LIST
by a new ioctl ODP_FLOW_DUMP that retrieves a single flow from the datapath
on each call. It is much cleaner to allocate the maximum amount of space
for a single flow key than to do so for possibly a very large number of
flow keys.
As a side effect, this patch also fixes a race condition that sometimes
made "ovs-dpctl dump-flows" print an error: previously, flows were listed
and then their actions were retrieved, which left a window in which
ovs-vswitchd could delete the flow. Now dumping a flow and its actions is
a single step, closing that window.
Dumping all of the flows in a datapath is no longer an atomic step, so now
it is possible to miss some flows or see a single flow twice during
iteration, if the flow table is modified by another process. It doesn't
look like this should be a problem for ovs-vswitchd.
It would be faster to retrieve a number of flows in batch instead of just
one at a time, but that will naturally happen later when the kernel
datapath interface is changed to use Netlink, so this patch does not bother
with it.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2010-12-28 10:39:52 -08:00
|
|
|
|
{
|
2011-01-26 07:03:39 -08:00
|
|
|
|
struct dpif_linux_flow_state *state = state_;
|
2011-01-28 14:00:51 -08:00
|
|
|
|
struct ofpbuf buf;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
int error;
|
|
|
|
|
|
2011-02-01 09:25:26 -08:00
|
|
|
|
do {
|
|
|
|
|
ofpbuf_delete(state->buf);
|
|
|
|
|
state->buf = NULL;
|
2011-01-26 07:03:39 -08:00
|
|
|
|
|
2011-02-01 09:25:26 -08:00
|
|
|
|
if (!nl_dump_next(&state->dump, &buf)) {
|
|
|
|
|
return EOF;
|
2011-01-26 07:03:39 -08:00
|
|
|
|
}
|
2011-02-01 09:25:26 -08:00
|
|
|
|
|
|
|
|
|
error = dpif_linux_flow_from_ofpbuf(&state->flow, &buf);
|
|
|
|
|
if (error) {
|
|
|
|
|
return error;
|
2011-01-26 07:03:39 -08:00
|
|
|
|
}
|
2011-02-01 09:25:26 -08:00
|
|
|
|
|
|
|
|
|
if (actions && !state->flow.actions) {
|
|
|
|
|
error = dpif_linux_flow_get__(dpif_, state->flow.key,
|
|
|
|
|
state->flow.key_len,
|
|
|
|
|
&state->flow, &state->buf);
|
|
|
|
|
if (error == ENOENT) {
|
|
|
|
|
VLOG_DBG("dumped flow disappeared on get");
|
|
|
|
|
} else if (error) {
|
2013-06-24 10:54:49 -07:00
|
|
|
|
VLOG_WARN("error fetching dumped flow: %s",
|
|
|
|
|
ovs_strerror(error));
|
2011-02-01 09:25:26 -08:00
|
|
|
|
}
|
2011-01-26 07:03:39 -08:00
|
|
|
|
}
|
2011-02-01 09:25:26 -08:00
|
|
|
|
} while (error);
|
|
|
|
|
|
|
|
|
|
if (actions) {
|
|
|
|
|
*actions = state->flow.actions;
|
|
|
|
|
*actions_len = state->flow.actions_len;
|
|
|
|
|
}
|
|
|
|
|
if (key) {
|
|
|
|
|
*key = state->flow.key;
|
|
|
|
|
*key_len = state->flow.key_len;
|
|
|
|
|
}
|
2013-06-19 07:15:10 +00:00
|
|
|
|
if (mask) {
|
|
|
|
|
*mask = state->flow.mask;
|
|
|
|
|
*mask_len = state->flow.mask ? state->flow.mask_len : 0;
|
|
|
|
|
}
|
2011-02-01 09:25:26 -08:00
|
|
|
|
if (stats) {
|
|
|
|
|
dpif_linux_flow_get_stats(&state->flow, &state->stats);
|
|
|
|
|
*stats = &state->stats;
|
2011-01-26 07:03:39 -08:00
|
|
|
|
}
|
2011-01-28 14:00:51 -08:00
|
|
|
|
return error;
|
datapath: Change listing flows to use an iterator concept.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to change
the kernel's idea of the flow key separately from the userspace version.
In turn, that means that flow keys must become variable-length. This does
not, however, fit in well with the ODP_FLOW_LIST ioctl in its current form,
because that would require userspace to know how much space to allocate
for each flow's key in advance, or to allocate as much space as could
possibly be needed. Neither choice is very attractive.
This commit prepares for a different solution, by replacing ODP_FLOW_LIST
by a new ioctl ODP_FLOW_DUMP that retrieves a single flow from the datapath
on each call. It is much cleaner to allocate the maximum amount of space
for a single flow key than to do so for possibly a very large number of
flow keys.
As a side effect, this patch also fixes a race condition that sometimes
made "ovs-dpctl dump-flows" print an error: previously, flows were listed
and then their actions were retrieved, which left a window in which
ovs-vswitchd could delete the flow. Now dumping a flow and its actions is
a single step, closing that window.
Dumping all of the flows in a datapath is no longer an atomic step, so now
it is possible to miss some flows or see a single flow twice during
iteration, if the flow table is modified by another process. It doesn't
look like this should be a problem for ovs-vswitchd.
It would be faster to retrieve a number of flows in batch instead of just
one at a time, but that will naturally happen later when the kernel
datapath interface is changed to use Netlink, so this patch does not bother
with it.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2010-12-28 10:39:52 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int
|
2011-01-26 15:42:00 -08:00
|
|
|
|
dpif_linux_flow_dump_done(const struct dpif *dpif OVS_UNUSED, void *state_)
|
datapath: Change listing flows to use an iterator concept.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to change
the kernel's idea of the flow key separately from the userspace version.
In turn, that means that flow keys must become variable-length. This does
not, however, fit in well with the ODP_FLOW_LIST ioctl in its current form,
because that would require userspace to know how much space to allocate
for each flow's key in advance, or to allocate as much space as could
possibly be needed. Neither choice is very attractive.
This commit prepares for a different solution, by replacing ODP_FLOW_LIST
by a new ioctl ODP_FLOW_DUMP that retrieves a single flow from the datapath
on each call. It is much cleaner to allocate the maximum amount of space
for a single flow key than to do so for possibly a very large number of
flow keys.
As a side effect, this patch also fixes a race condition that sometimes
made "ovs-dpctl dump-flows" print an error: previously, flows were listed
and then their actions were retrieved, which left a window in which
ovs-vswitchd could delete the flow. Now dumping a flow and its actions is
a single step, closing that window.
Dumping all of the flows in a datapath is no longer an atomic step, so now
it is possible to miss some flows or see a single flow twice during
iteration, if the flow table is modified by another process. It doesn't
look like this should be a problem for ovs-vswitchd.
It would be faster to retrieve a number of flows in batch instead of just
one at a time, but that will naturally happen later when the kernel
datapath interface is changed to use Netlink, so this patch does not bother
with it.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2010-12-28 10:39:52 -08:00
|
|
|
|
{
|
2011-01-26 15:42:00 -08:00
|
|
|
|
struct dpif_linux_flow_state *state = state_;
|
2011-01-28 14:00:51 -08:00
|
|
|
|
int error = nl_dump_done(&state->dump);
|
2011-02-01 09:25:26 -08:00
|
|
|
|
ofpbuf_delete(state->buf);
|
datapath: Change listing flows to use an iterator concept.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to change
the kernel's idea of the flow key separately from the userspace version.
In turn, that means that flow keys must become variable-length. This does
not, however, fit in well with the ODP_FLOW_LIST ioctl in its current form,
because that would require userspace to know how much space to allocate
for each flow's key in advance, or to allocate as much space as could
possibly be needed. Neither choice is very attractive.
This commit prepares for a different solution, by replacing ODP_FLOW_LIST
by a new ioctl ODP_FLOW_DUMP that retrieves a single flow from the datapath
on each call. It is much cleaner to allocate the maximum amount of space
for a single flow key than to do so for possibly a very large number of
flow keys.
As a side effect, this patch also fixes a race condition that sometimes
made "ovs-dpctl dump-flows" print an error: previously, flows were listed
and then their actions were retrieved, which left a window in which
ovs-vswitchd could delete the flow. Now dumping a flow and its actions is
a single step, closing that window.
Dumping all of the flows in a datapath is no longer an atomic step, so now
it is possible to miss some flows or see a single flow twice during
iteration, if the flow table is modified by another process. It doesn't
look like this should be a problem for ovs-vswitchd.
It would be faster to retrieve a number of flows in batch instead of just
one at a time, but that will naturally happen later when the kernel
datapath interface is changed to use Netlink, so this patch does not bother
with it.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2010-12-28 10:39:52 -08:00
|
|
|
|
free(state);
|
2011-01-28 14:00:51 -08:00
|
|
|
|
return error;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
|
2012-04-05 16:49:22 -07:00
|
|
|
|
static void
|
|
|
|
|
dpif_linux_encode_execute(int dp_ifindex, const struct dpif_execute *d_exec,
|
|
|
|
|
struct ofpbuf *buf)
|
2009-06-17 14:35:35 -07:00
|
|
|
|
{
|
2011-12-26 14:39:03 -08:00
|
|
|
|
struct ovs_header *k_exec;
|
2011-01-23 19:08:06 -08:00
|
|
|
|
|
2012-04-05 16:49:22 -07:00
|
|
|
|
ofpbuf_prealloc_tailroom(buf, (64
|
|
|
|
|
+ d_exec->packet->size
|
|
|
|
|
+ d_exec->key_len
|
|
|
|
|
+ d_exec->actions_len));
|
2011-01-23 19:08:06 -08:00
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
nl_msg_put_genlmsghdr(buf, 0, ovs_packet_family, NLM_F_REQUEST,
|
2011-10-22 18:22:18 -07:00
|
|
|
|
OVS_PACKET_CMD_EXECUTE, OVS_PACKET_VERSION);
|
2011-01-23 19:08:06 -08:00
|
|
|
|
|
2011-12-26 14:39:03 -08:00
|
|
|
|
k_exec = ofpbuf_put_uninit(buf, sizeof *k_exec);
|
|
|
|
|
k_exec->dp_ifindex = dp_ifindex;
|
2011-01-23 19:08:06 -08:00
|
|
|
|
|
2011-12-26 14:39:03 -08:00
|
|
|
|
nl_msg_put_unspec(buf, OVS_PACKET_ATTR_PACKET,
|
|
|
|
|
d_exec->packet->data, d_exec->packet->size);
|
|
|
|
|
nl_msg_put_unspec(buf, OVS_PACKET_ATTR_KEY, d_exec->key, d_exec->key_len);
|
|
|
|
|
nl_msg_put_unspec(buf, OVS_PACKET_ATTR_ACTIONS,
|
|
|
|
|
d_exec->actions, d_exec->actions_len);
|
2011-09-27 15:08:50 -07:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int
|
2011-12-26 14:39:03 -08:00
|
|
|
|
dpif_linux_execute__(int dp_ifindex, const struct dpif_execute *execute)
|
2011-09-27 15:08:50 -07:00
|
|
|
|
{
|
2012-04-05 16:49:22 -07:00
|
|
|
|
uint64_t request_stub[1024 / 8];
|
|
|
|
|
struct ofpbuf request;
|
2011-09-27 15:08:50 -07:00
|
|
|
|
int error;
|
|
|
|
|
|
2012-04-05 16:49:22 -07:00
|
|
|
|
ofpbuf_use_stub(&request, request_stub, sizeof request_stub);
|
|
|
|
|
dpif_linux_encode_execute(dp_ifindex, execute, &request);
|
2013-04-29 13:57:50 -07:00
|
|
|
|
error = nl_transact(NETLINK_GENERIC, &request, NULL);
|
2012-04-05 16:49:22 -07:00
|
|
|
|
ofpbuf_uninit(&request);
|
2011-09-27 15:08:50 -07:00
|
|
|
|
|
2011-01-23 19:08:06 -08:00
|
|
|
|
return error;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
|
2011-06-03 17:15:12 -07:00
|
|
|
|
static int
|
2011-12-26 14:39:03 -08:00
|
|
|
|
dpif_linux_execute(struct dpif *dpif_, const struct dpif_execute *execute)
|
2011-06-03 17:15:12 -07:00
|
|
|
|
{
|
2013-07-19 14:51:32 -07:00
|
|
|
|
const struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
2011-06-03 17:15:12 -07:00
|
|
|
|
|
2011-12-26 14:39:03 -08:00
|
|
|
|
return dpif_linux_execute__(dpif->dp_ifindex, execute);
|
2011-06-03 17:15:12 -07:00
|
|
|
|
}
|
|
|
|
|
|
2012-04-05 16:49:22 -07:00
|
|
|
|
#define MAX_OPS 50
|
|
|
|
|
|
2011-09-27 15:08:50 -07:00
|
|
|
|
static void
|
2012-04-05 16:49:22 -07:00
|
|
|
|
dpif_linux_operate__(struct dpif *dpif_, struct dpif_op **ops, size_t n_ops)
|
2011-09-27 15:08:50 -07:00
|
|
|
|
{
|
2013-07-19 14:51:32 -07:00
|
|
|
|
const struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
2012-04-05 16:49:22 -07:00
|
|
|
|
|
|
|
|
|
struct op_auxdata {
|
|
|
|
|
struct nl_transaction txn;
|
2012-04-09 15:35:29 -07:00
|
|
|
|
|
2012-04-05 16:49:22 -07:00
|
|
|
|
struct ofpbuf request;
|
|
|
|
|
uint64_t request_stub[1024 / 8];
|
2012-04-09 15:35:29 -07:00
|
|
|
|
|
|
|
|
|
struct ofpbuf reply;
|
|
|
|
|
uint64_t reply_stub[1024 / 8];
|
2012-04-05 16:49:22 -07:00
|
|
|
|
} auxes[MAX_OPS];
|
|
|
|
|
|
|
|
|
|
struct nl_transaction *txnsp[MAX_OPS];
|
2011-09-27 15:08:50 -07:00
|
|
|
|
size_t i;
|
|
|
|
|
|
2012-11-06 13:14:55 -08:00
|
|
|
|
ovs_assert(n_ops <= MAX_OPS);
|
2011-09-27 15:08:50 -07:00
|
|
|
|
for (i = 0; i < n_ops; i++) {
|
2012-04-05 16:49:22 -07:00
|
|
|
|
struct op_auxdata *aux = &auxes[i];
|
2011-12-26 14:17:55 -08:00
|
|
|
|
struct dpif_op *op = ops[i];
|
2012-04-17 21:52:10 -07:00
|
|
|
|
struct dpif_flow_put *put;
|
|
|
|
|
struct dpif_flow_del *del;
|
|
|
|
|
struct dpif_execute *execute;
|
2012-04-05 16:49:22 -07:00
|
|
|
|
struct dpif_linux_flow flow;
|
|
|
|
|
|
|
|
|
|
ofpbuf_use_stub(&aux->request,
|
|
|
|
|
aux->request_stub, sizeof aux->request_stub);
|
|
|
|
|
aux->txn.request = &aux->request;
|
2012-04-17 21:52:10 -07:00
|
|
|
|
|
2012-04-09 15:35:29 -07:00
|
|
|
|
ofpbuf_use_stub(&aux->reply, aux->reply_stub, sizeof aux->reply_stub);
|
|
|
|
|
aux->txn.reply = NULL;
|
|
|
|
|
|
2012-04-17 21:52:10 -07:00
|
|
|
|
switch (op->type) {
|
|
|
|
|
case DPIF_OP_FLOW_PUT:
|
|
|
|
|
put = &op->u.flow_put;
|
2012-04-05 16:49:22 -07:00
|
|
|
|
dpif_linux_init_flow_put(dpif_, put, &flow);
|
2011-09-27 15:08:50 -07:00
|
|
|
|
if (put->stats) {
|
2012-04-05 16:49:22 -07:00
|
|
|
|
flow.nlmsg_flags |= NLM_F_ECHO;
|
2012-04-09 15:35:29 -07:00
|
|
|
|
aux->txn.reply = &aux->reply;
|
2011-09-27 15:08:50 -07:00
|
|
|
|
}
|
2012-04-05 16:49:22 -07:00
|
|
|
|
dpif_linux_flow_to_ofpbuf(&flow, &aux->request);
|
2012-04-17 21:52:10 -07:00
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case DPIF_OP_FLOW_DEL:
|
|
|
|
|
del = &op->u.flow_del;
|
2012-04-05 16:49:22 -07:00
|
|
|
|
dpif_linux_init_flow_del(dpif_, del, &flow);
|
2012-04-17 21:52:10 -07:00
|
|
|
|
if (del->stats) {
|
2012-04-05 16:49:22 -07:00
|
|
|
|
flow.nlmsg_flags |= NLM_F_ECHO;
|
2012-04-09 15:35:29 -07:00
|
|
|
|
aux->txn.reply = &aux->reply;
|
2012-04-17 21:52:10 -07:00
|
|
|
|
}
|
2012-04-05 16:49:22 -07:00
|
|
|
|
dpif_linux_flow_to_ofpbuf(&flow, &aux->request);
|
2012-04-17 21:52:10 -07:00
|
|
|
|
break;
|
2011-09-27 15:08:50 -07:00
|
|
|
|
|
2012-04-17 21:52:10 -07:00
|
|
|
|
case DPIF_OP_EXECUTE:
|
|
|
|
|
execute = &op->u.execute;
|
2012-04-05 16:49:22 -07:00
|
|
|
|
dpif_linux_encode_execute(dpif->dp_ifindex, execute,
|
|
|
|
|
&aux->request);
|
2012-04-17 21:52:10 -07:00
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
default:
|
2011-09-27 15:08:50 -07:00
|
|
|
|
NOT_REACHED();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < n_ops; i++) {
|
2012-04-05 16:49:22 -07:00
|
|
|
|
txnsp[i] = &auxes[i].txn;
|
2011-09-27 15:08:50 -07:00
|
|
|
|
}
|
2013-04-29 13:57:50 -07:00
|
|
|
|
nl_transact_multiple(NETLINK_GENERIC, txnsp, n_ops);
|
2011-09-27 15:08:50 -07:00
|
|
|
|
|
|
|
|
|
for (i = 0; i < n_ops; i++) {
|
2012-04-09 15:35:29 -07:00
|
|
|
|
struct op_auxdata *aux = &auxes[i];
|
2012-04-05 16:49:22 -07:00
|
|
|
|
struct nl_transaction *txn = &auxes[i].txn;
|
2011-12-26 14:17:55 -08:00
|
|
|
|
struct dpif_op *op = ops[i];
|
2012-04-17 21:52:10 -07:00
|
|
|
|
struct dpif_flow_put *put;
|
|
|
|
|
struct dpif_flow_del *del;
|
2011-09-27 15:08:50 -07:00
|
|
|
|
|
2012-04-17 21:52:10 -07:00
|
|
|
|
op->error = txn->error;
|
2011-09-27 15:08:50 -07:00
|
|
|
|
|
2012-04-17 21:52:10 -07:00
|
|
|
|
switch (op->type) {
|
|
|
|
|
case DPIF_OP_FLOW_PUT:
|
|
|
|
|
put = &op->u.flow_put;
|
2012-06-20 10:55:41 -07:00
|
|
|
|
if (put->stats) {
|
2012-04-17 21:52:10 -07:00
|
|
|
|
if (!op->error) {
|
2012-06-20 10:55:41 -07:00
|
|
|
|
struct dpif_linux_flow reply;
|
|
|
|
|
|
|
|
|
|
op->error = dpif_linux_flow_from_ofpbuf(&reply,
|
|
|
|
|
txn->reply);
|
|
|
|
|
if (!op->error) {
|
|
|
|
|
dpif_linux_flow_get_stats(&reply, put->stats);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (op->error) {
|
|
|
|
|
memset(put->stats, 0, sizeof *put->stats);
|
2011-09-27 15:08:50 -07:00
|
|
|
|
}
|
|
|
|
|
}
|
2012-04-17 21:52:10 -07:00
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case DPIF_OP_FLOW_DEL:
|
|
|
|
|
del = &op->u.flow_del;
|
2012-06-20 10:55:41 -07:00
|
|
|
|
if (del->stats) {
|
2012-04-17 21:52:10 -07:00
|
|
|
|
if (!op->error) {
|
2012-06-20 10:55:41 -07:00
|
|
|
|
struct dpif_linux_flow reply;
|
|
|
|
|
|
|
|
|
|
op->error = dpif_linux_flow_from_ofpbuf(&reply,
|
|
|
|
|
txn->reply);
|
|
|
|
|
if (!op->error) {
|
|
|
|
|
dpif_linux_flow_get_stats(&reply, del->stats);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (op->error) {
|
|
|
|
|
memset(del->stats, 0, sizeof *del->stats);
|
2012-04-17 21:52:10 -07:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case DPIF_OP_EXECUTE:
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
default:
|
2011-09-27 15:08:50 -07:00
|
|
|
|
NOT_REACHED();
|
|
|
|
|
}
|
|
|
|
|
|
2012-04-09 15:35:29 -07:00
|
|
|
|
ofpbuf_uninit(&aux->request);
|
|
|
|
|
ofpbuf_uninit(&aux->reply);
|
2011-09-27 15:08:50 -07:00
|
|
|
|
}
|
2012-04-05 16:49:22 -07:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
dpif_linux_operate(struct dpif *dpif, struct dpif_op **ops, size_t n_ops)
|
|
|
|
|
{
|
|
|
|
|
while (n_ops > 0) {
|
|
|
|
|
size_t chunk = MIN(n_ops, MAX_OPS);
|
|
|
|
|
dpif_linux_operate__(dpif, ops, chunk);
|
|
|
|
|
ops += chunk;
|
|
|
|
|
n_ops -= chunk;
|
|
|
|
|
}
|
2011-09-27 15:08:50 -07:00
|
|
|
|
}
|
|
|
|
|
|
2013-12-04 13:37:31 -08:00
|
|
|
|
/* Synchronizes 'dpif->channels' with the set of vports currently in 'dpif' in
|
|
|
|
|
* the kernel, by adding a new channel for any kernel vport that lacks one and
|
|
|
|
|
* deleting any channels that have no backing kernel vports. */
|
2009-06-17 14:35:35 -07:00
|
|
|
|
static int
|
2013-12-04 13:37:31 -08:00
|
|
|
|
dpif_linux_refresh_channels(struct dpif *dpif_)
|
2009-06-17 14:35:35 -07:00
|
|
|
|
{
|
2011-01-26 13:41:54 -08:00
|
|
|
|
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
2013-12-04 13:37:31 -08:00
|
|
|
|
unsigned long int *keep_channels;
|
|
|
|
|
struct dpif_linux_vport vport;
|
|
|
|
|
size_t keep_channels_nbits;
|
|
|
|
|
struct nl_dump dump;
|
|
|
|
|
int retval = 0;
|
|
|
|
|
size_t i;
|
2011-01-26 13:41:54 -08:00
|
|
|
|
|
2013-12-04 13:37:31 -08:00
|
|
|
|
/* To start with, we need an epoll fd. */
|
|
|
|
|
if (dpif->epoll_fd < 0) {
|
|
|
|
|
dpif->epoll_fd = epoll_create(10);
|
|
|
|
|
if (dpif->epoll_fd < 0) {
|
|
|
|
|
return errno;
|
|
|
|
|
}
|
2011-09-16 15:23:37 -07:00
|
|
|
|
}
|
2011-09-14 13:05:09 -07:00
|
|
|
|
|
2013-12-04 13:37:31 -08:00
|
|
|
|
keep_channels_nbits = dpif->uc_array_size;
|
|
|
|
|
keep_channels = bitmap_allocate(keep_channels_nbits);
|
2011-01-26 13:41:54 -08:00
|
|
|
|
|
2013-12-04 13:37:31 -08:00
|
|
|
|
dpif->n_events = dpif->event_offset = 0;
|
2011-11-22 09:25:32 -08:00
|
|
|
|
|
2013-12-04 13:37:31 -08:00
|
|
|
|
dpif_linux_port_dump_start__(dpif_, &dump);
|
|
|
|
|
while (dpif_linux_port_dump_next__(dpif_, &dump, &vport)) {
|
|
|
|
|
uint32_t port_no = odp_to_u32(vport.port_no);
|
|
|
|
|
struct nl_sock *sock = (port_no < dpif->uc_array_size
|
|
|
|
|
? dpif->channels[port_no].sock
|
|
|
|
|
: NULL);
|
|
|
|
|
bool new_sock = !sock;
|
|
|
|
|
int error;
|
2011-11-22 09:25:32 -08:00
|
|
|
|
|
2013-12-04 13:37:31 -08:00
|
|
|
|
if (new_sock) {
|
2013-01-04 18:34:26 -08:00
|
|
|
|
error = nl_sock_create(NETLINK_GENERIC, &sock);
|
2011-09-14 13:05:09 -07:00
|
|
|
|
if (error) {
|
2013-12-04 13:37:31 -08:00
|
|
|
|
retval = error;
|
|
|
|
|
goto error;
|
2011-01-26 13:41:54 -08:00
|
|
|
|
}
|
2013-12-04 13:37:31 -08:00
|
|
|
|
}
|
2011-11-22 09:25:32 -08:00
|
|
|
|
|
2013-12-04 13:37:31 -08:00
|
|
|
|
/* Configure the vport to deliver misses to 'sock'. */
|
|
|
|
|
if (!vport.upcall_pid || *vport.upcall_pid != nl_sock_pid(sock)) {
|
|
|
|
|
uint32_t upcall_pid = nl_sock_pid(sock);
|
|
|
|
|
struct dpif_linux_vport vport_request;
|
2013-01-04 18:34:26 -08:00
|
|
|
|
|
|
|
|
|
dpif_linux_vport_init(&vport_request);
|
|
|
|
|
vport_request.cmd = OVS_VPORT_CMD_SET;
|
|
|
|
|
vport_request.dp_ifindex = dpif->dp_ifindex;
|
2013-12-04 13:37:31 -08:00
|
|
|
|
vport_request.port_no = vport.port_no;
|
2013-01-04 18:34:26 -08:00
|
|
|
|
vport_request.upcall_pid = &upcall_pid;
|
|
|
|
|
error = dpif_linux_vport_transact(&vport_request, NULL, NULL);
|
|
|
|
|
if (!error) {
|
|
|
|
|
VLOG_DBG("%s: assigning port %"PRIu32" to netlink pid %"PRIu32,
|
|
|
|
|
dpif_name(&dpif->dpif), vport_request.port_no,
|
|
|
|
|
upcall_pid);
|
|
|
|
|
} else {
|
|
|
|
|
VLOG_WARN_RL(&error_rl,
|
|
|
|
|
"%s: failed to set upcall pid on port: %s",
|
2013-06-24 10:54:49 -07:00
|
|
|
|
dpif_name(&dpif->dpif), ovs_strerror(error));
|
2013-01-04 18:34:26 -08:00
|
|
|
|
|
2013-12-04 13:37:31 -08:00
|
|
|
|
if (error != ENODEV && error != ENOENT) {
|
|
|
|
|
retval = error;
|
2013-01-04 18:34:26 -08:00
|
|
|
|
} else {
|
2013-12-04 13:37:31 -08:00
|
|
|
|
/* The vport isn't really there, even though the dump says
|
|
|
|
|
* it is. Probably we just hit a race after a port
|
|
|
|
|
* disappeared. */
|
2013-01-04 18:34:26 -08:00
|
|
|
|
}
|
2013-12-04 13:37:31 -08:00
|
|
|
|
goto error;
|
2011-11-22 09:25:32 -08:00
|
|
|
|
}
|
2013-12-04 13:37:31 -08:00
|
|
|
|
}
|
2012-06-01 17:40:31 -04:00
|
|
|
|
|
2013-12-04 13:37:31 -08:00
|
|
|
|
if (new_sock) {
|
|
|
|
|
error = add_channel(dpif, vport.port_no, sock);
|
2013-01-04 18:34:26 -08:00
|
|
|
|
if (error) {
|
|
|
|
|
VLOG_INFO("%s: could not add channel for port %s",
|
2013-12-04 13:37:31 -08:00
|
|
|
|
dpif_name(dpif_), vport.name);
|
|
|
|
|
retval = error;
|
|
|
|
|
goto error;
|
2013-01-04 18:34:26 -08:00
|
|
|
|
}
|
2011-01-26 13:41:54 -08:00
|
|
|
|
}
|
2013-12-04 13:37:31 -08:00
|
|
|
|
|
|
|
|
|
if (port_no < keep_channels_nbits) {
|
|
|
|
|
bitmap_set1(keep_channels, port_no);
|
|
|
|
|
}
|
|
|
|
|
continue;
|
|
|
|
|
|
|
|
|
|
error:
|
|
|
|
|
nl_sock_destroy(sock);
|
2011-01-26 13:41:54 -08:00
|
|
|
|
}
|
2013-12-04 13:37:31 -08:00
|
|
|
|
nl_dump_done(&dump);
|
2011-09-14 13:05:09 -07:00
|
|
|
|
|
2013-12-04 13:37:31 -08:00
|
|
|
|
/* Discard any saved channels that we didn't reuse. */
|
|
|
|
|
for (i = 0; i < keep_channels_nbits; i++) {
|
|
|
|
|
if (!bitmap_is_set(keep_channels, i)) {
|
|
|
|
|
nl_sock_destroy(dpif->channels[i].sock);
|
|
|
|
|
dpif->channels[i].sock = NULL;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
free(keep_channels);
|
|
|
|
|
|
|
|
|
|
return retval;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
|
dpif_linux_recv_set__(struct dpif *dpif_, bool enable)
|
|
|
|
|
{
|
|
|
|
|
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
|
|
|
|
|
|
|
|
|
if ((dpif->epoll_fd >= 0) == enable) {
|
|
|
|
|
return 0;
|
|
|
|
|
} else if (!enable) {
|
|
|
|
|
destroy_channels(dpif);
|
|
|
|
|
return 0;
|
|
|
|
|
} else {
|
|
|
|
|
return dpif_linux_refresh_channels(dpif_);
|
|
|
|
|
}
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
|
2013-07-23 12:41:57 -07:00
|
|
|
|
static int
|
|
|
|
|
dpif_linux_recv_set(struct dpif *dpif_, bool enable)
|
|
|
|
|
{
|
|
|
|
|
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
|
|
|
|
int error;
|
|
|
|
|
|
2013-07-30 15:31:48 -07:00
|
|
|
|
ovs_mutex_lock(&dpif->upcall_lock);
|
2013-07-23 12:41:57 -07:00
|
|
|
|
error = dpif_linux_recv_set__(dpif_, enable);
|
2013-07-30 15:31:48 -07:00
|
|
|
|
ovs_mutex_unlock(&dpif->upcall_lock);
|
2013-07-23 12:41:57 -07:00
|
|
|
|
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
2010-07-20 11:23:21 -07:00
|
|
|
|
static int
|
|
|
|
|
dpif_linux_queue_to_priority(const struct dpif *dpif OVS_UNUSED,
|
|
|
|
|
uint32_t queue_id, uint32_t *priority)
|
|
|
|
|
{
|
|
|
|
|
if (queue_id < 0xf000) {
|
2010-07-16 15:50:57 -07:00
|
|
|
|
*priority = TC_H_MAKE(1 << 16, queue_id + 1);
|
2010-07-20 11:23:21 -07:00
|
|
|
|
return 0;
|
|
|
|
|
} else {
|
|
|
|
|
return EINVAL;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
static int
|
2011-01-26 13:41:54 -08:00
|
|
|
|
parse_odp_packet(struct ofpbuf *buf, struct dpif_upcall *upcall,
|
2011-01-21 17:01:56 -08:00
|
|
|
|
int *dp_ifindex)
|
datapath: Report kernel's flow key when passing packets up to userspace.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to change
the kernel's idea of the flow key separately from the userspace version.
This commit takes one step in that direction by making the kernel report
its idea of the flow that a packet belongs to whenever it passes a packet
up to userspace. This means that userspace can intelligently figure out
what to do:
- If userspace's notion of the flow for the packet matches the kernel's,
then nothing special is necessary.
- If the kernel has a more specific notion for the flow than userspace,
for example if the kernel decoded IPv6 headers but userspace stopped
at the Ethernet type (because it does not understand IPv6), then again
nothing special is necessary: userspace can still set up the flow in
the usual way.
- If userspace has a more specific notion for the flow than the kernel,
for example if userspace decoded an IPv6 header but the kernel
stopped at the Ethernet type, then userspace can forward the packet
manually, without setting up a flow in the kernel. (This case is
bad from a performance point of view, but at least it is correct.)
This commit does not actually make userspace flexible enough to handle
changes in the kernel flow key structure, although userspace does now
have enough information to do that intelligently. This will have to wait
for later commits.
This commit is bigger than it would otherwise be because it is rolled
together with changing "struct odp_msg" to a sequence of Netlink
attributes. The alternative, to do each of those changes in a separate
patch, seemed like overkill because it meant that either we would have to
introduce and then kill off Netlink attributes for in_port and tun_id, if
Netlink conversion went first, or shove yet another variable-length header
into the stuff already after odp_msg, if adding the flow key to odp_msg
went first.
This commit will slow down performance of checksumming packets sent up to
userspace. I'm not entirely pleased with how I did it. I considered a
couple of alternatives, but none of them seemed that much better.
Suggestions welcome. Not changing anything wasn't an option,
unfortunately. At any rate some slowdown will become unavoidable when OVS
actually starts using Netlink instead of just Netlink framing.
(Actually, I thought of one option where we could avoid that: make
userspace do the checksum instead, by passing csum_start and csum_offset as
part of what goes to userspace. But that's not perfect either.)
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2011-01-24 14:59:57 -08:00
|
|
|
|
{
|
2011-08-18 10:35:40 -07:00
|
|
|
|
static const struct nl_policy ovs_packet_policy[] = {
|
datapath: Report kernel's flow key when passing packets up to userspace.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to change
the kernel's idea of the flow key separately from the userspace version.
This commit takes one step in that direction by making the kernel report
its idea of the flow that a packet belongs to whenever it passes a packet
up to userspace. This means that userspace can intelligently figure out
what to do:
- If userspace's notion of the flow for the packet matches the kernel's,
then nothing special is necessary.
- If the kernel has a more specific notion for the flow than userspace,
for example if the kernel decoded IPv6 headers but userspace stopped
at the Ethernet type (because it does not understand IPv6), then again
nothing special is necessary: userspace can still set up the flow in
the usual way.
- If userspace has a more specific notion for the flow than the kernel,
for example if userspace decoded an IPv6 header but the kernel
stopped at the Ethernet type, then userspace can forward the packet
manually, without setting up a flow in the kernel. (This case is
bad from a performance point of view, but at least it is correct.)
This commit does not actually make userspace flexible enough to handle
changes in the kernel flow key structure, although userspace does now
have enough information to do that intelligently. This will have to wait
for later commits.
This commit is bigger than it would otherwise be because it is rolled
together with changing "struct odp_msg" to a sequence of Netlink
attributes. The alternative, to do each of those changes in a separate
patch, seemed like overkill because it meant that either we would have to
introduce and then kill off Netlink attributes for in_port and tun_id, if
Netlink conversion went first, or shove yet another variable-length header
into the stuff already after odp_msg, if adding the flow key to odp_msg
went first.
This commit will slow down performance of checksumming packets sent up to
userspace. I'm not entirely pleased with how I did it. I considered a
couple of alternatives, but none of them seemed that much better.
Suggestions welcome. Not changing anything wasn't an option,
unfortunately. At any rate some slowdown will become unavoidable when OVS
actually starts using Netlink instead of just Netlink framing.
(Actually, I thought of one option where we could avoid that: make
userspace do the checksum instead, by passing csum_start and csum_offset as
part of what goes to userspace. But that's not perfect either.)
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2011-01-24 14:59:57 -08:00
|
|
|
|
/* Always present. */
|
2011-08-18 10:35:40 -07:00
|
|
|
|
[OVS_PACKET_ATTR_PACKET] = { .type = NL_A_UNSPEC,
|
datapath: Report kernel's flow key when passing packets up to userspace.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to change
the kernel's idea of the flow key separately from the userspace version.
This commit takes one step in that direction by making the kernel report
its idea of the flow that a packet belongs to whenever it passes a packet
up to userspace. This means that userspace can intelligently figure out
what to do:
- If userspace's notion of the flow for the packet matches the kernel's,
then nothing special is necessary.
- If the kernel has a more specific notion for the flow than userspace,
for example if the kernel decoded IPv6 headers but userspace stopped
at the Ethernet type (because it does not understand IPv6), then again
nothing special is necessary: userspace can still set up the flow in
the usual way.
- If userspace has a more specific notion for the flow than the kernel,
for example if userspace decoded an IPv6 header but the kernel
stopped at the Ethernet type, then userspace can forward the packet
manually, without setting up a flow in the kernel. (This case is
bad from a performance point of view, but at least it is correct.)
This commit does not actually make userspace flexible enough to handle
changes in the kernel flow key structure, although userspace does now
have enough information to do that intelligently. This will have to wait
for later commits.
This commit is bigger than it would otherwise be because it is rolled
together with changing "struct odp_msg" to a sequence of Netlink
attributes. The alternative, to do each of those changes in a separate
patch, seemed like overkill because it meant that either we would have to
introduce and then kill off Netlink attributes for in_port and tun_id, if
Netlink conversion went first, or shove yet another variable-length header
into the stuff already after odp_msg, if adding the flow key to odp_msg
went first.
This commit will slow down performance of checksumming packets sent up to
userspace. I'm not entirely pleased with how I did it. I considered a
couple of alternatives, but none of them seemed that much better.
Suggestions welcome. Not changing anything wasn't an option,
unfortunately. At any rate some slowdown will become unavoidable when OVS
actually starts using Netlink instead of just Netlink framing.
(Actually, I thought of one option where we could avoid that: make
userspace do the checksum instead, by passing csum_start and csum_offset as
part of what goes to userspace. But that's not perfect either.)
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2011-01-24 14:59:57 -08:00
|
|
|
|
.min_len = ETH_HEADER_LEN },
|
2011-08-18 10:35:40 -07:00
|
|
|
|
[OVS_PACKET_ATTR_KEY] = { .type = NL_A_NESTED },
|
datapath: Report kernel's flow key when passing packets up to userspace.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to change
the kernel's idea of the flow key separately from the userspace version.
This commit takes one step in that direction by making the kernel report
its idea of the flow that a packet belongs to whenever it passes a packet
up to userspace. This means that userspace can intelligently figure out
what to do:
- If userspace's notion of the flow for the packet matches the kernel's,
then nothing special is necessary.
- If the kernel has a more specific notion for the flow than userspace,
for example if the kernel decoded IPv6 headers but userspace stopped
at the Ethernet type (because it does not understand IPv6), then again
nothing special is necessary: userspace can still set up the flow in
the usual way.
- If userspace has a more specific notion for the flow than the kernel,
for example if userspace decoded an IPv6 header but the kernel
stopped at the Ethernet type, then userspace can forward the packet
manually, without setting up a flow in the kernel. (This case is
bad from a performance point of view, but at least it is correct.)
This commit does not actually make userspace flexible enough to handle
changes in the kernel flow key structure, although userspace does now
have enough information to do that intelligently. This will have to wait
for later commits.
This commit is bigger than it would otherwise be because it is rolled
together with changing "struct odp_msg" to a sequence of Netlink
attributes. The alternative, to do each of those changes in a separate
patch, seemed like overkill because it meant that either we would have to
introduce and then kill off Netlink attributes for in_port and tun_id, if
Netlink conversion went first, or shove yet another variable-length header
into the stuff already after odp_msg, if adding the flow key to odp_msg
went first.
This commit will slow down performance of checksumming packets sent up to
userspace. I'm not entirely pleased with how I did it. I considered a
couple of alternatives, but none of them seemed that much better.
Suggestions welcome. Not changing anything wasn't an option,
unfortunately. At any rate some slowdown will become unavoidable when OVS
actually starts using Netlink instead of just Netlink framing.
(Actually, I thought of one option where we could avoid that: make
userspace do the checksum instead, by passing csum_start and csum_offset as
part of what goes to userspace. But that's not perfect either.)
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2011-01-24 14:59:57 -08:00
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
/* OVS_PACKET_CMD_ACTION only. */
|
2013-02-15 16:48:32 -08:00
|
|
|
|
[OVS_PACKET_ATTR_USERDATA] = { .type = NL_A_UNSPEC, .optional = true },
|
datapath: Report kernel's flow key when passing packets up to userspace.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to change
the kernel's idea of the flow key separately from the userspace version.
This commit takes one step in that direction by making the kernel report
its idea of the flow that a packet belongs to whenever it passes a packet
up to userspace. This means that userspace can intelligently figure out
what to do:
- If userspace's notion of the flow for the packet matches the kernel's,
then nothing special is necessary.
- If the kernel has a more specific notion for the flow than userspace,
for example if the kernel decoded IPv6 headers but userspace stopped
at the Ethernet type (because it does not understand IPv6), then again
nothing special is necessary: userspace can still set up the flow in
the usual way.
- If userspace has a more specific notion for the flow than the kernel,
for example if userspace decoded an IPv6 header but the kernel
stopped at the Ethernet type, then userspace can forward the packet
manually, without setting up a flow in the kernel. (This case is
bad from a performance point of view, but at least it is correct.)
This commit does not actually make userspace flexible enough to handle
changes in the kernel flow key structure, although userspace does now
have enough information to do that intelligently. This will have to wait
for later commits.
This commit is bigger than it would otherwise be because it is rolled
together with changing "struct odp_msg" to a sequence of Netlink
attributes. The alternative, to do each of those changes in a separate
patch, seemed like overkill because it meant that either we would have to
introduce and then kill off Netlink attributes for in_port and tun_id, if
Netlink conversion went first, or shove yet another variable-length header
into the stuff already after odp_msg, if adding the flow key to odp_msg
went first.
This commit will slow down performance of checksumming packets sent up to
userspace. I'm not entirely pleased with how I did it. I considered a
couple of alternatives, but none of them seemed that much better.
Suggestions welcome. Not changing anything wasn't an option,
unfortunately. At any rate some slowdown will become unavoidable when OVS
actually starts using Netlink instead of just Netlink framing.
(Actually, I thought of one option where we could avoid that: make
userspace do the checksum instead, by passing csum_start and csum_offset as
part of what goes to userspace. But that's not perfect either.)
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2011-01-24 14:59:57 -08:00
|
|
|
|
};
|
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
struct ovs_header *ovs_header;
|
|
|
|
|
struct nlattr *a[ARRAY_SIZE(ovs_packet_policy)];
|
2011-01-26 13:41:54 -08:00
|
|
|
|
struct nlmsghdr *nlmsg;
|
|
|
|
|
struct genlmsghdr *genl;
|
|
|
|
|
struct ofpbuf b;
|
2011-01-28 13:55:04 -08:00
|
|
|
|
int type;
|
2011-01-26 13:41:54 -08:00
|
|
|
|
|
|
|
|
|
ofpbuf_use_const(&b, buf->data, buf->size);
|
|
|
|
|
|
|
|
|
|
nlmsg = ofpbuf_try_pull(&b, sizeof *nlmsg);
|
|
|
|
|
genl = ofpbuf_try_pull(&b, sizeof *genl);
|
2011-08-18 10:35:40 -07:00
|
|
|
|
ovs_header = ofpbuf_try_pull(&b, sizeof *ovs_header);
|
|
|
|
|
if (!nlmsg || !genl || !ovs_header
|
|
|
|
|
|| nlmsg->nlmsg_type != ovs_packet_family
|
|
|
|
|
|| !nl_policy_parse(&b, 0, ovs_packet_policy, a,
|
|
|
|
|
ARRAY_SIZE(ovs_packet_policy))) {
|
datapath: Report kernel's flow key when passing packets up to userspace.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to change
the kernel's idea of the flow key separately from the userspace version.
This commit takes one step in that direction by making the kernel report
its idea of the flow that a packet belongs to whenever it passes a packet
up to userspace. This means that userspace can intelligently figure out
what to do:
- If userspace's notion of the flow for the packet matches the kernel's,
then nothing special is necessary.
- If the kernel has a more specific notion for the flow than userspace,
for example if the kernel decoded IPv6 headers but userspace stopped
at the Ethernet type (because it does not understand IPv6), then again
nothing special is necessary: userspace can still set up the flow in
the usual way.
- If userspace has a more specific notion for the flow than the kernel,
for example if userspace decoded an IPv6 header but the kernel
stopped at the Ethernet type, then userspace can forward the packet
manually, without setting up a flow in the kernel. (This case is
bad from a performance point of view, but at least it is correct.)
This commit does not actually make userspace flexible enough to handle
changes in the kernel flow key structure, although userspace does now
have enough information to do that intelligently. This will have to wait
for later commits.
This commit is bigger than it would otherwise be because it is rolled
together with changing "struct odp_msg" to a sequence of Netlink
attributes. The alternative, to do each of those changes in a separate
patch, seemed like overkill because it meant that either we would have to
introduce and then kill off Netlink attributes for in_port and tun_id, if
Netlink conversion went first, or shove yet another variable-length header
into the stuff already after odp_msg, if adding the flow key to odp_msg
went first.
This commit will slow down performance of checksumming packets sent up to
userspace. I'm not entirely pleased with how I did it. I considered a
couple of alternatives, but none of them seemed that much better.
Suggestions welcome. Not changing anything wasn't an option,
unfortunately. At any rate some slowdown will become unavoidable when OVS
actually starts using Netlink instead of just Netlink framing.
(Actually, I thought of one option where we could avoid that: make
userspace do the checksum instead, by passing csum_start and csum_offset as
part of what goes to userspace. But that's not perfect either.)
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2011-01-24 14:59:57 -08:00
|
|
|
|
return EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
type = (genl->cmd == OVS_PACKET_CMD_MISS ? DPIF_UC_MISS
|
|
|
|
|
: genl->cmd == OVS_PACKET_CMD_ACTION ? DPIF_UC_ACTION
|
2011-01-28 13:55:04 -08:00
|
|
|
|
: -1);
|
|
|
|
|
if (type < 0) {
|
|
|
|
|
return EINVAL;
|
|
|
|
|
}
|
2011-01-26 07:14:04 -08:00
|
|
|
|
|
2011-01-28 13:55:04 -08:00
|
|
|
|
memset(upcall, 0, sizeof *upcall);
|
|
|
|
|
upcall->type = type;
|
2012-07-13 16:00:29 -07:00
|
|
|
|
upcall->key = CONST_CAST(struct nlattr *,
|
|
|
|
|
nl_attr_get(a[OVS_PACKET_ATTR_KEY]));
|
2011-08-18 10:35:40 -07:00
|
|
|
|
upcall->key_len = nl_attr_get_size(a[OVS_PACKET_ATTR_KEY]);
|
2013-02-15 16:48:32 -08:00
|
|
|
|
upcall->userdata = a[OVS_PACKET_ATTR_USERDATA];
|
2013-12-16 08:14:52 -08:00
|
|
|
|
|
|
|
|
|
/* Allow overwriting the netlink attribute header without reallocating. */
|
|
|
|
|
ofpbuf_use_stub(&upcall->packet,
|
|
|
|
|
CONST_CAST(struct nlattr *,
|
|
|
|
|
nl_attr_get(a[OVS_PACKET_ATTR_PACKET])) - 1,
|
|
|
|
|
nl_attr_get_size(a[OVS_PACKET_ATTR_PACKET]) +
|
|
|
|
|
sizeof(struct nlattr));
|
|
|
|
|
upcall->packet.data = (char *)upcall->packet.data + sizeof(struct nlattr);
|
2013-12-17 16:16:24 +00:00
|
|
|
|
upcall->packet.size = nl_attr_get_size(a[OVS_PACKET_ATTR_PACKET]);
|
2013-12-16 08:14:52 -08:00
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
*dp_ifindex = ovs_header->dp_ifindex;
|
2011-01-26 13:41:54 -08:00
|
|
|
|
|
datapath: Report kernel's flow key when passing packets up to userspace.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to change
the kernel's idea of the flow key separately from the userspace version.
This commit takes one step in that direction by making the kernel report
its idea of the flow that a packet belongs to whenever it passes a packet
up to userspace. This means that userspace can intelligently figure out
what to do:
- If userspace's notion of the flow for the packet matches the kernel's,
then nothing special is necessary.
- If the kernel has a more specific notion for the flow than userspace,
for example if the kernel decoded IPv6 headers but userspace stopped
at the Ethernet type (because it does not understand IPv6), then again
nothing special is necessary: userspace can still set up the flow in
the usual way.
- If userspace has a more specific notion for the flow than the kernel,
for example if userspace decoded an IPv6 header but the kernel
stopped at the Ethernet type, then userspace can forward the packet
manually, without setting up a flow in the kernel. (This case is
bad from a performance point of view, but at least it is correct.)
This commit does not actually make userspace flexible enough to handle
changes in the kernel flow key structure, although userspace does now
have enough information to do that intelligently. This will have to wait
for later commits.
This commit is bigger than it would otherwise be because it is rolled
together with changing "struct odp_msg" to a sequence of Netlink
attributes. The alternative, to do each of those changes in a separate
patch, seemed like overkill because it meant that either we would have to
introduce and then kill off Netlink attributes for in_port and tun_id, if
Netlink conversion went first, or shove yet another variable-length header
into the stuff already after odp_msg, if adding the flow key to odp_msg
went first.
This commit will slow down performance of checksumming packets sent up to
userspace. I'm not entirely pleased with how I did it. I considered a
couple of alternatives, but none of them seemed that much better.
Suggestions welcome. Not changing anything wasn't an option,
unfortunately. At any rate some slowdown will become unavoidable when OVS
actually starts using Netlink instead of just Netlink framing.
(Actually, I thought of one option where we could avoid that: make
userspace do the checksum instead, by passing csum_start and csum_offset as
part of what goes to userspace. But that's not perfect either.)
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2011-01-24 14:59:57 -08:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int
|
2013-07-23 12:41:57 -07:00
|
|
|
|
dpif_linux_recv__(struct dpif *dpif_, struct dpif_upcall *upcall,
|
|
|
|
|
struct ofpbuf *buf)
|
2009-06-17 14:35:35 -07:00
|
|
|
|
{
|
|
|
|
|
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
2011-09-16 15:23:37 -07:00
|
|
|
|
int read_tries = 0;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
|
2012-01-12 17:09:22 -08:00
|
|
|
|
if (dpif->epoll_fd < 0) {
|
2011-09-16 15:23:37 -07:00
|
|
|
|
return EAGAIN;
|
2011-01-26 13:41:54 -08:00
|
|
|
|
}
|
|
|
|
|
|
2013-01-04 18:34:26 -08:00
|
|
|
|
if (dpif->event_offset >= dpif->n_events) {
|
2011-11-28 09:29:18 -08:00
|
|
|
|
int retval;
|
2013-01-04 18:34:26 -08:00
|
|
|
|
|
|
|
|
|
dpif->event_offset = dpif->n_events = 0;
|
2011-11-10 15:39:39 -08:00
|
|
|
|
|
2011-11-28 09:29:18 -08:00
|
|
|
|
do {
|
2013-01-04 18:34:26 -08:00
|
|
|
|
retval = epoll_wait(dpif->epoll_fd, dpif->epoll_events,
|
|
|
|
|
dpif->uc_array_size, 0);
|
2011-11-28 09:29:18 -08:00
|
|
|
|
} while (retval < 0 && errno == EINTR);
|
|
|
|
|
if (retval < 0) {
|
|
|
|
|
static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 1);
|
2013-06-24 10:54:49 -07:00
|
|
|
|
VLOG_WARN_RL(&rl, "epoll_wait failed (%s)", ovs_strerror(errno));
|
2013-01-04 18:34:26 -08:00
|
|
|
|
} else if (retval > 0) {
|
|
|
|
|
dpif->n_events = retval;
|
2011-11-28 09:29:18 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2013-01-04 18:34:26 -08:00
|
|
|
|
while (dpif->event_offset < dpif->n_events) {
|
|
|
|
|
int idx = dpif->epoll_events[dpif->event_offset].data.u32;
|
|
|
|
|
struct dpif_channel *ch = &dpif->channels[idx];
|
2011-11-28 09:29:18 -08:00
|
|
|
|
|
2013-01-04 18:34:26 -08:00
|
|
|
|
dpif->event_offset++;
|
2011-09-16 15:23:37 -07:00
|
|
|
|
|
2011-11-10 15:39:39 -08:00
|
|
|
|
for (;;) {
|
2011-11-28 09:29:18 -08:00
|
|
|
|
int dp_ifindex;
|
2011-11-10 15:39:39 -08:00
|
|
|
|
int error;
|
2011-09-16 15:23:37 -07:00
|
|
|
|
|
2011-11-10 15:39:39 -08:00
|
|
|
|
if (++read_tries > 50) {
|
|
|
|
|
return EAGAIN;
|
|
|
|
|
}
|
2011-09-16 15:23:37 -07:00
|
|
|
|
|
2012-05-23 16:55:09 -07:00
|
|
|
|
error = nl_sock_recv(ch->sock, buf, false);
|
2012-06-01 17:40:31 -04:00
|
|
|
|
if (error == ENOBUFS) {
|
|
|
|
|
/* ENOBUFS typically means that we've received so many
|
|
|
|
|
* packets that the buffer overflowed. Try again
|
|
|
|
|
* immediately because there's almost certainly a packet
|
|
|
|
|
* waiting for us. */
|
|
|
|
|
report_loss(dpif_, ch);
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ch->last_poll = time_msec();
|
2012-04-09 15:35:29 -07:00
|
|
|
|
if (error) {
|
|
|
|
|
if (error == EAGAIN) {
|
|
|
|
|
break;
|
|
|
|
|
}
|
2011-11-10 15:39:39 -08:00
|
|
|
|
return error;
|
|
|
|
|
}
|
2011-09-16 15:23:37 -07:00
|
|
|
|
|
2011-11-10 15:39:39 -08:00
|
|
|
|
error = parse_odp_packet(buf, upcall, &dp_ifindex);
|
2012-01-12 17:09:22 -08:00
|
|
|
|
if (!error && dp_ifindex == dpif->dp_ifindex) {
|
2011-11-10 15:39:39 -08:00
|
|
|
|
return 0;
|
2013-01-04 18:34:26 -08:00
|
|
|
|
} else if (error) {
|
2011-11-10 15:39:39 -08:00
|
|
|
|
return error;
|
2011-09-16 15:23:37 -07:00
|
|
|
|
}
|
2011-01-26 13:41:54 -08:00
|
|
|
|
}
|
2011-11-22 09:25:32 -08:00
|
|
|
|
}
|
2011-01-26 13:41:54 -08:00
|
|
|
|
|
|
|
|
|
return EAGAIN;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
|
2013-07-23 12:41:57 -07:00
|
|
|
|
static int
|
|
|
|
|
dpif_linux_recv(struct dpif *dpif_, struct dpif_upcall *upcall,
|
|
|
|
|
struct ofpbuf *buf)
|
|
|
|
|
{
|
|
|
|
|
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
|
|
|
|
int error;
|
|
|
|
|
|
2013-07-30 15:31:48 -07:00
|
|
|
|
ovs_mutex_lock(&dpif->upcall_lock);
|
2013-07-23 12:41:57 -07:00
|
|
|
|
error = dpif_linux_recv__(dpif_, upcall, buf);
|
2013-07-30 15:31:48 -07:00
|
|
|
|
ovs_mutex_unlock(&dpif->upcall_lock);
|
2013-07-23 12:41:57 -07:00
|
|
|
|
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
static void
|
|
|
|
|
dpif_linux_recv_wait(struct dpif *dpif_)
|
|
|
|
|
{
|
2013-07-23 12:41:57 -07:00
|
|
|
|
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
2011-09-16 15:23:37 -07:00
|
|
|
|
|
2013-07-30 15:31:48 -07:00
|
|
|
|
ovs_mutex_lock(&dpif->upcall_lock);
|
2013-07-23 12:41:57 -07:00
|
|
|
|
if (dpif->epoll_fd >= 0) {
|
|
|
|
|
poll_fd_wait(dpif->epoll_fd, POLLIN);
|
2011-09-16 15:23:37 -07:00
|
|
|
|
}
|
2013-07-30 15:31:48 -07:00
|
|
|
|
ovs_mutex_unlock(&dpif->upcall_lock);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
|
2011-01-04 17:00:36 -08:00
|
|
|
|
static void
|
|
|
|
|
dpif_linux_recv_purge(struct dpif *dpif_)
|
|
|
|
|
{
|
|
|
|
|
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
2011-09-16 15:23:37 -07:00
|
|
|
|
|
2013-07-30 15:31:48 -07:00
|
|
|
|
ovs_mutex_lock(&dpif->upcall_lock);
|
2013-07-23 12:41:57 -07:00
|
|
|
|
if (dpif->epoll_fd >= 0) {
|
|
|
|
|
struct dpif_channel *ch;
|
2011-01-04 17:00:36 -08:00
|
|
|
|
|
2013-07-23 12:41:57 -07:00
|
|
|
|
for (ch = dpif->channels; ch < &dpif->channels[dpif->uc_array_size];
|
|
|
|
|
ch++) {
|
|
|
|
|
if (ch->sock) {
|
|
|
|
|
nl_sock_drain(ch->sock);
|
|
|
|
|
}
|
2013-01-04 18:34:26 -08:00
|
|
|
|
}
|
2011-01-04 17:00:36 -08:00
|
|
|
|
}
|
2013-07-30 15:31:48 -07:00
|
|
|
|
ovs_mutex_unlock(&dpif->upcall_lock);
|
2011-01-04 17:00:36 -08:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
const struct dpif_class dpif_linux_class = {
|
2010-01-22 14:37:10 -05:00
|
|
|
|
"system",
|
2009-07-06 11:06:36 -07:00
|
|
|
|
dpif_linux_enumerate,
|
2012-11-14 15:50:20 -08:00
|
|
|
|
NULL,
|
2009-06-17 14:35:35 -07:00
|
|
|
|
dpif_linux_open,
|
|
|
|
|
dpif_linux_close,
|
2010-02-08 13:22:41 -05:00
|
|
|
|
dpif_linux_destroy,
|
2013-05-01 17:13:14 -07:00
|
|
|
|
dpif_linux_run,
|
2013-07-22 15:00:49 -07:00
|
|
|
|
NULL, /* wait */
|
2009-06-17 14:35:35 -07:00
|
|
|
|
dpif_linux_get_stats,
|
|
|
|
|
dpif_linux_port_add,
|
|
|
|
|
dpif_linux_port_del,
|
|
|
|
|
dpif_linux_port_query_by_number,
|
|
|
|
|
dpif_linux_port_query_by_name,
|
2011-01-26 09:24:59 -08:00
|
|
|
|
dpif_linux_get_max_ports,
|
2011-10-12 16:24:54 -07:00
|
|
|
|
dpif_linux_port_get_pid,
|
datapath: Change listing ports to use an iterator concept.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to add new
features to the kernel vport layer without changing userspace software. In
turn, that means that the odp_port structure must become variable-length.
This does not, however, fit in well with the ODP_PORT_LIST ioctl in its
current form, because that would require userspace to know how much space
to allocate for each port in advance, or to allocate as much space as
could possibly be needed. Neither choice is very attractive.
This commit prepares for a different solution, by replacing ODP_PORT_LIST
by a new ioctl ODP_VPORT_DUMP that retrieves information about a single
vport from the datapath on each call. It is much cleaner to allocate the
maximum amount of space for a single vport than to do so for possibly a
large number of vports.
It would be faster to retrieve a number of vports in batch instead of just
one at a time, but that will naturally happen later when the kernel
datapath interface is changed to use Netlink, so this patch does not bother
with it.
The Netlink version won't need to take the starting port number from
userspace, since Netlink sockets can keep track of that state as part
of their "dump" feature.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2011-01-10 13:12:12 -08:00
|
|
|
|
dpif_linux_port_dump_start,
|
|
|
|
|
dpif_linux_port_dump_next,
|
|
|
|
|
dpif_linux_port_dump_done,
|
2009-06-24 10:24:09 -07:00
|
|
|
|
dpif_linux_port_poll,
|
|
|
|
|
dpif_linux_port_poll_wait,
|
2009-06-17 14:35:35 -07:00
|
|
|
|
dpif_linux_flow_get,
|
|
|
|
|
dpif_linux_flow_put,
|
|
|
|
|
dpif_linux_flow_del,
|
|
|
|
|
dpif_linux_flow_flush,
|
datapath: Change listing flows to use an iterator concept.
One of the goals for Open vSwitch is to decouple kernel and userspace
software, so that either one can be upgraded or rolled back independent of
the other. To do this in full generality, it must be possible to change
the kernel's idea of the flow key separately from the userspace version.
In turn, that means that flow keys must become variable-length. This does
not, however, fit in well with the ODP_FLOW_LIST ioctl in its current form,
because that would require userspace to know how much space to allocate
for each flow's key in advance, or to allocate as much space as could
possibly be needed. Neither choice is very attractive.
This commit prepares for a different solution, by replacing ODP_FLOW_LIST
by a new ioctl ODP_FLOW_DUMP that retrieves a single flow from the datapath
on each call. It is much cleaner to allocate the maximum amount of space
for a single flow key than to do so for possibly a very large number of
flow keys.
As a side effect, this patch also fixes a race condition that sometimes
made "ovs-dpctl dump-flows" print an error: previously, flows were listed
and then their actions were retrieved, which left a window in which
ovs-vswitchd could delete the flow. Now dumping a flow and its actions is
a single step, closing that window.
Dumping all of the flows in a datapath is no longer an atomic step, so now
it is possible to miss some flows or see a single flow twice during
iteration, if the flow table is modified by another process. It doesn't
look like this should be a problem for ovs-vswitchd.
It would be faster to retrieve a number of flows in batch instead of just
one at a time, but that will naturally happen later when the kernel
datapath interface is changed to use Netlink, so this patch does not bother
with it.
Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Jesse Gross <jesse@nicira.com>
2010-12-28 10:39:52 -08:00
|
|
|
|
dpif_linux_flow_dump_start,
|
|
|
|
|
dpif_linux_flow_dump_next,
|
|
|
|
|
dpif_linux_flow_dump_done,
|
2009-06-17 14:35:35 -07:00
|
|
|
|
dpif_linux_execute,
|
2011-09-27 15:08:50 -07:00
|
|
|
|
dpif_linux_operate,
|
2012-01-12 17:09:22 -08:00
|
|
|
|
dpif_linux_recv_set,
|
2010-07-20 11:23:21 -07:00
|
|
|
|
dpif_linux_queue_to_priority,
|
2009-06-17 14:35:35 -07:00
|
|
|
|
dpif_linux_recv,
|
|
|
|
|
dpif_linux_recv_wait,
|
2011-01-04 17:00:36 -08:00
|
|
|
|
dpif_linux_recv_purge,
|
2009-06-17 14:35:35 -07:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static int
|
2011-01-26 13:41:54 -08:00
|
|
|
|
dpif_linux_init(void)
|
2009-06-17 14:35:35 -07:00
|
|
|
|
{
|
2013-04-23 14:35:29 -07:00
|
|
|
|
static struct ovsthread_once once = OVSTHREAD_ONCE_INITIALIZER;
|
|
|
|
|
static int error;
|
2011-01-26 13:41:54 -08:00
|
|
|
|
|
2013-04-23 14:35:29 -07:00
|
|
|
|
if (ovsthread_once_start(&once)) {
|
2011-08-18 10:35:40 -07:00
|
|
|
|
error = nl_lookup_genl_family(OVS_DATAPATH_FAMILY,
|
|
|
|
|
&ovs_datapath_family);
|
2011-01-28 14:00:51 -08:00
|
|
|
|
if (error) {
|
|
|
|
|
VLOG_ERR("Generic Netlink family '%s' does not exist. "
|
|
|
|
|
"The Open vSwitch kernel module is probably not loaded.",
|
2011-08-18 10:35:40 -07:00
|
|
|
|
OVS_DATAPATH_FAMILY);
|
2011-01-28 14:00:51 -08:00
|
|
|
|
}
|
2011-01-28 13:59:03 -08:00
|
|
|
|
if (!error) {
|
2011-08-18 10:35:40 -07:00
|
|
|
|
error = nl_lookup_genl_family(OVS_VPORT_FAMILY, &ovs_vport_family);
|
2011-01-28 13:59:03 -08:00
|
|
|
|
}
|
2011-01-28 14:00:51 -08:00
|
|
|
|
if (!error) {
|
2011-08-18 10:35:40 -07:00
|
|
|
|
error = nl_lookup_genl_family(OVS_FLOW_FAMILY, &ovs_flow_family);
|
2011-01-28 14:00:51 -08:00
|
|
|
|
}
|
2011-01-28 13:55:04 -08:00
|
|
|
|
if (!error) {
|
2011-08-18 10:35:40 -07:00
|
|
|
|
error = nl_lookup_genl_family(OVS_PACKET_FAMILY,
|
|
|
|
|
&ovs_packet_family);
|
2011-01-28 13:55:04 -08:00
|
|
|
|
}
|
2011-08-24 16:21:10 -07:00
|
|
|
|
if (!error) {
|
|
|
|
|
error = nl_lookup_genl_mcgroup(OVS_VPORT_FAMILY, OVS_VPORT_MCGROUP,
|
2013-08-26 23:53:17 -07:00
|
|
|
|
&ovs_vport_mcgroup);
|
2011-08-24 16:21:10 -07:00
|
|
|
|
}
|
2013-04-23 14:35:29 -07:00
|
|
|
|
|
|
|
|
|
ovsthread_once_done(&once);
|
2011-01-26 13:41:54 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return error;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
|
2011-01-26 12:28:59 -08:00
|
|
|
|
bool
|
|
|
|
|
dpif_linux_is_internal_device(const char *name)
|
2010-12-29 14:20:16 -08:00
|
|
|
|
{
|
2011-01-26 12:28:59 -08:00
|
|
|
|
struct dpif_linux_vport reply;
|
|
|
|
|
struct ofpbuf *buf;
|
2010-12-29 14:20:16 -08:00
|
|
|
|
int error;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
|
2011-01-26 12:28:59 -08:00
|
|
|
|
error = dpif_linux_vport_get(name, &reply, &buf);
|
|
|
|
|
if (!error) {
|
|
|
|
|
ofpbuf_delete(buf);
|
2011-04-08 16:38:42 -07:00
|
|
|
|
} else if (error != ENODEV && error != ENOENT) {
|
2011-01-26 12:28:59 -08:00
|
|
|
|
VLOG_WARN_RL(&error_rl, "%s: vport query failed (%s)",
|
2013-06-24 10:54:49 -07:00
|
|
|
|
name, ovs_strerror(error));
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
return reply.type == OVS_VPORT_TYPE_INTERNAL;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
2011-01-26 12:28:59 -08:00
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
/* Parses the contents of 'buf', which contains a "struct ovs_header" followed
|
2011-01-26 12:28:59 -08:00
|
|
|
|
* by Netlink attributes, into 'vport'. Returns 0 if successful, otherwise a
|
|
|
|
|
* positive errno value.
|
|
|
|
|
*
|
|
|
|
|
* 'vport' will contain pointers into 'buf', so the caller should not free
|
|
|
|
|
* 'buf' while 'vport' is still in use. */
|
|
|
|
|
static int
|
|
|
|
|
dpif_linux_vport_from_ofpbuf(struct dpif_linux_vport *vport,
|
|
|
|
|
const struct ofpbuf *buf)
|
|
|
|
|
{
|
2011-08-18 10:35:40 -07:00
|
|
|
|
static const struct nl_policy ovs_vport_policy[] = {
|
|
|
|
|
[OVS_VPORT_ATTR_PORT_NO] = { .type = NL_A_U32 },
|
|
|
|
|
[OVS_VPORT_ATTR_TYPE] = { .type = NL_A_U32 },
|
|
|
|
|
[OVS_VPORT_ATTR_NAME] = { .type = NL_A_STRING, .max_len = IFNAMSIZ },
|
2011-09-14 13:05:09 -07:00
|
|
|
|
[OVS_VPORT_ATTR_UPCALL_PID] = { .type = NL_A_U32 },
|
2011-11-07 09:21:17 -08:00
|
|
|
|
[OVS_VPORT_ATTR_STATS] = { NL_POLICY_FOR(struct ovs_vport_stats),
|
2011-01-26 12:28:59 -08:00
|
|
|
|
.optional = true },
|
2011-08-18 10:35:40 -07:00
|
|
|
|
[OVS_VPORT_ATTR_OPTIONS] = { .type = NL_A_NESTED, .optional = true },
|
2011-01-26 12:28:59 -08:00
|
|
|
|
};
|
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
struct nlattr *a[ARRAY_SIZE(ovs_vport_policy)];
|
|
|
|
|
struct ovs_header *ovs_header;
|
2011-01-28 13:59:03 -08:00
|
|
|
|
struct nlmsghdr *nlmsg;
|
|
|
|
|
struct genlmsghdr *genl;
|
|
|
|
|
struct ofpbuf b;
|
2011-01-26 12:28:59 -08:00
|
|
|
|
|
|
|
|
|
dpif_linux_vport_init(vport);
|
|
|
|
|
|
2011-01-28 13:59:03 -08:00
|
|
|
|
ofpbuf_use_const(&b, buf->data, buf->size);
|
|
|
|
|
nlmsg = ofpbuf_try_pull(&b, sizeof *nlmsg);
|
|
|
|
|
genl = ofpbuf_try_pull(&b, sizeof *genl);
|
2011-08-18 10:35:40 -07:00
|
|
|
|
ovs_header = ofpbuf_try_pull(&b, sizeof *ovs_header);
|
|
|
|
|
if (!nlmsg || !genl || !ovs_header
|
|
|
|
|
|| nlmsg->nlmsg_type != ovs_vport_family
|
|
|
|
|
|| !nl_policy_parse(&b, 0, ovs_vport_policy, a,
|
|
|
|
|
ARRAY_SIZE(ovs_vport_policy))) {
|
2011-01-26 12:28:59 -08:00
|
|
|
|
return EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
2011-01-28 13:59:03 -08:00
|
|
|
|
vport->cmd = genl->cmd;
|
2011-08-18 10:35:40 -07:00
|
|
|
|
vport->dp_ifindex = ovs_header->dp_ifindex;
|
2013-06-19 16:58:44 -07:00
|
|
|
|
vport->port_no = nl_attr_get_odp_port(a[OVS_VPORT_ATTR_PORT_NO]);
|
2011-08-18 10:35:40 -07:00
|
|
|
|
vport->type = nl_attr_get_u32(a[OVS_VPORT_ATTR_TYPE]);
|
|
|
|
|
vport->name = nl_attr_get_string(a[OVS_VPORT_ATTR_NAME]);
|
2011-09-14 13:05:09 -07:00
|
|
|
|
if (a[OVS_VPORT_ATTR_UPCALL_PID]) {
|
2011-10-07 16:41:36 -07:00
|
|
|
|
vport->upcall_pid = nl_attr_get(a[OVS_VPORT_ATTR_UPCALL_PID]);
|
2011-09-14 13:05:09 -07:00
|
|
|
|
}
|
2011-08-18 10:35:40 -07:00
|
|
|
|
if (a[OVS_VPORT_ATTR_STATS]) {
|
|
|
|
|
vport->stats = nl_attr_get(a[OVS_VPORT_ATTR_STATS]);
|
|
|
|
|
}
|
|
|
|
|
if (a[OVS_VPORT_ATTR_OPTIONS]) {
|
|
|
|
|
vport->options = nl_attr_get(a[OVS_VPORT_ATTR_OPTIONS]);
|
|
|
|
|
vport->options_len = nl_attr_get_size(a[OVS_VPORT_ATTR_OPTIONS]);
|
2011-01-26 12:28:59 -08:00
|
|
|
|
}
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
/* Appends to 'buf' (which must initially be empty) a "struct ovs_header"
|
2011-01-26 12:28:59 -08:00
|
|
|
|
* followed by Netlink attributes corresponding to 'vport'. */
|
|
|
|
|
static void
|
|
|
|
|
dpif_linux_vport_to_ofpbuf(const struct dpif_linux_vport *vport,
|
|
|
|
|
struct ofpbuf *buf)
|
|
|
|
|
{
|
2011-08-18 10:35:40 -07:00
|
|
|
|
struct ovs_header *ovs_header;
|
2011-01-28 13:59:03 -08:00
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
nl_msg_put_genlmsghdr(buf, 0, ovs_vport_family, NLM_F_REQUEST | NLM_F_ECHO,
|
2011-10-22 18:22:18 -07:00
|
|
|
|
vport->cmd, OVS_VPORT_VERSION);
|
2011-01-26 12:28:59 -08:00
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
ovs_header = ofpbuf_put_uninit(buf, sizeof *ovs_header);
|
|
|
|
|
ovs_header->dp_ifindex = vport->dp_ifindex;
|
2011-01-26 12:28:59 -08:00
|
|
|
|
|
2013-06-19 16:58:44 -07:00
|
|
|
|
if (vport->port_no != ODPP_NONE) {
|
|
|
|
|
nl_msg_put_odp_port(buf, OVS_VPORT_ATTR_PORT_NO, vport->port_no);
|
2011-01-26 12:28:59 -08:00
|
|
|
|
}
|
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
if (vport->type != OVS_VPORT_TYPE_UNSPEC) {
|
|
|
|
|
nl_msg_put_u32(buf, OVS_VPORT_ATTR_TYPE, vport->type);
|
2011-01-26 12:28:59 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (vport->name) {
|
2011-08-18 10:35:40 -07:00
|
|
|
|
nl_msg_put_string(buf, OVS_VPORT_ATTR_NAME, vport->name);
|
2011-01-26 12:28:59 -08:00
|
|
|
|
}
|
|
|
|
|
|
2011-10-07 16:41:36 -07:00
|
|
|
|
if (vport->upcall_pid) {
|
|
|
|
|
nl_msg_put_u32(buf, OVS_VPORT_ATTR_UPCALL_PID, *vport->upcall_pid);
|
|
|
|
|
}
|
2011-09-14 13:05:09 -07:00
|
|
|
|
|
2011-01-26 12:28:59 -08:00
|
|
|
|
if (vport->stats) {
|
2011-08-18 10:35:40 -07:00
|
|
|
|
nl_msg_put_unspec(buf, OVS_VPORT_ATTR_STATS,
|
2011-01-26 12:28:59 -08:00
|
|
|
|
vport->stats, sizeof *vport->stats);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (vport->options) {
|
2011-08-18 10:35:40 -07:00
|
|
|
|
nl_msg_put_nested(buf, OVS_VPORT_ATTR_OPTIONS,
|
2011-01-26 12:28:59 -08:00
|
|
|
|
vport->options, vport->options_len);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Clears 'vport' to "empty" values. */
|
|
|
|
|
void
|
|
|
|
|
dpif_linux_vport_init(struct dpif_linux_vport *vport)
|
|
|
|
|
{
|
|
|
|
|
memset(vport, 0, sizeof *vport);
|
2013-06-19 16:58:44 -07:00
|
|
|
|
vport->port_no = ODPP_NONE;
|
2011-01-26 12:28:59 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Executes 'request' in the kernel datapath. If the command fails, returns a
|
|
|
|
|
* positive errno value. Otherwise, if 'reply' and 'bufp' are null, returns 0
|
|
|
|
|
* without doing anything else. If 'reply' and 'bufp' are nonnull, then the
|
2011-08-18 10:35:40 -07:00
|
|
|
|
* result of the command is expected to be an ovs_vport also, which is decoded
|
2011-01-26 12:28:59 -08:00
|
|
|
|
* and stored in '*reply' and '*bufp'. The caller must free '*bufp' when the
|
|
|
|
|
* reply is no longer needed ('reply' will contain pointers into '*bufp'). */
|
|
|
|
|
int
|
|
|
|
|
dpif_linux_vport_transact(const struct dpif_linux_vport *request,
|
|
|
|
|
struct dpif_linux_vport *reply,
|
|
|
|
|
struct ofpbuf **bufp)
|
|
|
|
|
{
|
2011-01-28 13:59:03 -08:00
|
|
|
|
struct ofpbuf *request_buf;
|
2011-01-26 12:28:59 -08:00
|
|
|
|
int error;
|
|
|
|
|
|
2012-11-06 13:14:55 -08:00
|
|
|
|
ovs_assert((reply != NULL) == (bufp != NULL));
|
2011-01-26 12:28:59 -08:00
|
|
|
|
|
2011-04-08 16:37:22 -07:00
|
|
|
|
error = dpif_linux_init();
|
|
|
|
|
if (error) {
|
|
|
|
|
if (reply) {
|
|
|
|
|
*bufp = NULL;
|
|
|
|
|
dpif_linux_vport_init(reply);
|
|
|
|
|
}
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
2011-01-28 13:59:03 -08:00
|
|
|
|
request_buf = ofpbuf_new(1024);
|
|
|
|
|
dpif_linux_vport_to_ofpbuf(request, request_buf);
|
2013-04-29 13:57:50 -07:00
|
|
|
|
error = nl_transact(NETLINK_GENERIC, request_buf, bufp);
|
2011-01-28 13:59:03 -08:00
|
|
|
|
ofpbuf_delete(request_buf);
|
2011-01-26 12:28:59 -08:00
|
|
|
|
|
2011-01-28 13:59:03 -08:00
|
|
|
|
if (reply) {
|
|
|
|
|
if (!error) {
|
|
|
|
|
error = dpif_linux_vport_from_ofpbuf(reply, *bufp);
|
|
|
|
|
}
|
2011-01-26 12:28:59 -08:00
|
|
|
|
if (error) {
|
2011-01-28 13:59:03 -08:00
|
|
|
|
dpif_linux_vport_init(reply);
|
|
|
|
|
ofpbuf_delete(*bufp);
|
|
|
|
|
*bufp = NULL;
|
2011-01-26 12:28:59 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Obtains information about the kernel vport named 'name' and stores it into
|
|
|
|
|
* '*reply' and '*bufp'. The caller must free '*bufp' when the reply is no
|
|
|
|
|
* longer needed ('reply' will contain pointers into '*bufp'). */
|
|
|
|
|
int
|
|
|
|
|
dpif_linux_vport_get(const char *name, struct dpif_linux_vport *reply,
|
|
|
|
|
struct ofpbuf **bufp)
|
|
|
|
|
{
|
|
|
|
|
struct dpif_linux_vport request;
|
|
|
|
|
|
|
|
|
|
dpif_linux_vport_init(&request);
|
2011-08-18 10:35:40 -07:00
|
|
|
|
request.cmd = OVS_VPORT_CMD_GET;
|
2011-01-26 12:28:59 -08:00
|
|
|
|
request.name = name;
|
|
|
|
|
|
|
|
|
|
return dpif_linux_vport_transact(&request, reply, bufp);
|
|
|
|
|
}
|
2011-01-26 15:42:00 -08:00
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
/* Parses the contents of 'buf', which contains a "struct ovs_header" followed
|
2011-01-28 13:55:04 -08:00
|
|
|
|
* by Netlink attributes, into 'dp'. Returns 0 if successful, otherwise a
|
|
|
|
|
* positive errno value.
|
2011-01-26 15:42:00 -08:00
|
|
|
|
*
|
|
|
|
|
* 'dp' will contain pointers into 'buf', so the caller should not free 'buf'
|
|
|
|
|
* while 'dp' is still in use. */
|
|
|
|
|
static int
|
|
|
|
|
dpif_linux_dp_from_ofpbuf(struct dpif_linux_dp *dp, const struct ofpbuf *buf)
|
|
|
|
|
{
|
2011-08-18 10:35:40 -07:00
|
|
|
|
static const struct nl_policy ovs_datapath_policy[] = {
|
|
|
|
|
[OVS_DP_ATTR_NAME] = { .type = NL_A_STRING, .max_len = IFNAMSIZ },
|
2011-11-07 09:21:17 -08:00
|
|
|
|
[OVS_DP_ATTR_STATS] = { NL_POLICY_FOR(struct ovs_dp_stats),
|
2011-01-26 15:42:00 -08:00
|
|
|
|
.optional = true },
|
2013-10-21 14:37:34 -07:00
|
|
|
|
[OVS_DP_ATTR_MEGAFLOW_STATS] = {
|
|
|
|
|
NL_POLICY_FOR(struct ovs_dp_megaflow_stats),
|
|
|
|
|
.optional = true },
|
2011-01-26 15:42:00 -08:00
|
|
|
|
};
|
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
struct nlattr *a[ARRAY_SIZE(ovs_datapath_policy)];
|
|
|
|
|
struct ovs_header *ovs_header;
|
2011-01-28 13:55:04 -08:00
|
|
|
|
struct nlmsghdr *nlmsg;
|
|
|
|
|
struct genlmsghdr *genl;
|
|
|
|
|
struct ofpbuf b;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
|
|
|
|
|
dpif_linux_dp_init(dp);
|
|
|
|
|
|
2011-01-28 13:55:04 -08:00
|
|
|
|
ofpbuf_use_const(&b, buf->data, buf->size);
|
|
|
|
|
nlmsg = ofpbuf_try_pull(&b, sizeof *nlmsg);
|
|
|
|
|
genl = ofpbuf_try_pull(&b, sizeof *genl);
|
2011-08-18 10:35:40 -07:00
|
|
|
|
ovs_header = ofpbuf_try_pull(&b, sizeof *ovs_header);
|
|
|
|
|
if (!nlmsg || !genl || !ovs_header
|
|
|
|
|
|| nlmsg->nlmsg_type != ovs_datapath_family
|
|
|
|
|
|| !nl_policy_parse(&b, 0, ovs_datapath_policy, a,
|
|
|
|
|
ARRAY_SIZE(ovs_datapath_policy))) {
|
2011-01-26 15:42:00 -08:00
|
|
|
|
return EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
2011-01-28 13:55:04 -08:00
|
|
|
|
dp->cmd = genl->cmd;
|
2011-08-18 10:35:40 -07:00
|
|
|
|
dp->dp_ifindex = ovs_header->dp_ifindex;
|
|
|
|
|
dp->name = nl_attr_get_string(a[OVS_DP_ATTR_NAME]);
|
|
|
|
|
if (a[OVS_DP_ATTR_STATS]) {
|
2011-01-26 15:42:00 -08:00
|
|
|
|
/* Can't use structure assignment because Netlink doesn't ensure
|
|
|
|
|
* sufficient alignment for 64-bit members. */
|
2011-08-18 10:35:40 -07:00
|
|
|
|
memcpy(&dp->stats, nl_attr_get(a[OVS_DP_ATTR_STATS]),
|
2011-01-26 15:42:00 -08:00
|
|
|
|
sizeof dp->stats);
|
|
|
|
|
}
|
2011-01-26 13:41:54 -08:00
|
|
|
|
|
2013-10-21 14:37:34 -07:00
|
|
|
|
if (a[OVS_DP_ATTR_MEGAFLOW_STATS]) {
|
|
|
|
|
/* Can't use structure assignment because Netlink doesn't ensure
|
|
|
|
|
* sufficient alignment for 64-bit members. */
|
|
|
|
|
memcpy(&dp->megaflow_stats, nl_attr_get(a[OVS_DP_ATTR_MEGAFLOW_STATS]),
|
|
|
|
|
sizeof dp->megaflow_stats);
|
|
|
|
|
}
|
|
|
|
|
|
2011-01-26 15:42:00 -08:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2011-01-28 13:55:04 -08:00
|
|
|
|
/* Appends to 'buf' the Generic Netlink message described by 'dp'. */
|
2011-01-26 15:42:00 -08:00
|
|
|
|
static void
|
|
|
|
|
dpif_linux_dp_to_ofpbuf(const struct dpif_linux_dp *dp, struct ofpbuf *buf)
|
|
|
|
|
{
|
2011-08-18 10:35:40 -07:00
|
|
|
|
struct ovs_header *ovs_header;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
nl_msg_put_genlmsghdr(buf, 0, ovs_datapath_family,
|
2011-10-22 18:22:18 -07:00
|
|
|
|
NLM_F_REQUEST | NLM_F_ECHO, dp->cmd,
|
|
|
|
|
OVS_DATAPATH_VERSION);
|
2011-01-28 13:55:04 -08:00
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
ovs_header = ofpbuf_put_uninit(buf, sizeof *ovs_header);
|
|
|
|
|
ovs_header->dp_ifindex = dp->dp_ifindex;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
|
|
|
|
|
if (dp->name) {
|
2011-08-18 10:35:40 -07:00
|
|
|
|
nl_msg_put_string(buf, OVS_DP_ATTR_NAME, dp->name);
|
2011-01-26 15:42:00 -08:00
|
|
|
|
}
|
|
|
|
|
|
2011-10-07 16:41:36 -07:00
|
|
|
|
if (dp->upcall_pid) {
|
|
|
|
|
nl_msg_put_u32(buf, OVS_DP_ATTR_UPCALL_PID, *dp->upcall_pid);
|
|
|
|
|
}
|
2011-09-14 13:05:09 -07:00
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
/* Skip OVS_DP_ATTR_STATS since we never have a reason to serialize it. */
|
2011-01-26 15:42:00 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Clears 'dp' to "empty" values. */
|
2011-05-04 13:58:10 -07:00
|
|
|
|
static void
|
2011-01-26 15:42:00 -08:00
|
|
|
|
dpif_linux_dp_init(struct dpif_linux_dp *dp)
|
|
|
|
|
{
|
|
|
|
|
memset(dp, 0, sizeof *dp);
|
2013-10-21 14:37:34 -07:00
|
|
|
|
dp->megaflow_stats.n_masks = UINT32_MAX;
|
|
|
|
|
dp->megaflow_stats.n_mask_hit = UINT64_MAX;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
}
|
|
|
|
|
|
2011-01-28 13:55:04 -08:00
|
|
|
|
static void
|
|
|
|
|
dpif_linux_dp_dump_start(struct nl_dump *dump)
|
|
|
|
|
{
|
|
|
|
|
struct dpif_linux_dp request;
|
|
|
|
|
struct ofpbuf *buf;
|
|
|
|
|
|
|
|
|
|
dpif_linux_dp_init(&request);
|
2011-08-18 10:35:40 -07:00
|
|
|
|
request.cmd = OVS_DP_CMD_GET;
|
2011-01-28 13:55:04 -08:00
|
|
|
|
|
|
|
|
|
buf = ofpbuf_new(1024);
|
|
|
|
|
dpif_linux_dp_to_ofpbuf(&request, buf);
|
2013-04-29 13:57:50 -07:00
|
|
|
|
nl_dump_start(dump, NETLINK_GENERIC, buf);
|
2011-01-28 13:55:04 -08:00
|
|
|
|
ofpbuf_delete(buf);
|
|
|
|
|
}
|
|
|
|
|
|
2011-01-26 15:42:00 -08:00
|
|
|
|
/* Executes 'request' in the kernel datapath. If the command fails, returns a
|
|
|
|
|
* positive errno value. Otherwise, if 'reply' and 'bufp' are null, returns 0
|
|
|
|
|
* without doing anything else. If 'reply' and 'bufp' are nonnull, then the
|
2011-01-28 13:55:04 -08:00
|
|
|
|
* result of the command is expected to be of the same form, which is decoded
|
|
|
|
|
* and stored in '*reply' and '*bufp'. The caller must free '*bufp' when the
|
|
|
|
|
* reply is no longer needed ('reply' will contain pointers into '*bufp'). */
|
2011-05-04 13:58:10 -07:00
|
|
|
|
static int
|
2011-01-26 15:42:00 -08:00
|
|
|
|
dpif_linux_dp_transact(const struct dpif_linux_dp *request,
|
|
|
|
|
struct dpif_linux_dp *reply, struct ofpbuf **bufp)
|
|
|
|
|
{
|
2011-01-28 13:55:04 -08:00
|
|
|
|
struct ofpbuf *request_buf;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
int error;
|
|
|
|
|
|
2012-11-06 13:14:55 -08:00
|
|
|
|
ovs_assert((reply != NULL) == (bufp != NULL));
|
2011-01-26 15:42:00 -08:00
|
|
|
|
|
2011-01-28 13:55:04 -08:00
|
|
|
|
request_buf = ofpbuf_new(1024);
|
|
|
|
|
dpif_linux_dp_to_ofpbuf(request, request_buf);
|
2013-04-29 13:57:50 -07:00
|
|
|
|
error = nl_transact(NETLINK_GENERIC, request_buf, bufp);
|
2011-01-28 13:55:04 -08:00
|
|
|
|
ofpbuf_delete(request_buf);
|
2011-01-26 15:42:00 -08:00
|
|
|
|
|
2011-01-28 13:55:04 -08:00
|
|
|
|
if (reply) {
|
2013-10-21 14:37:34 -07:00
|
|
|
|
dpif_linux_dp_init(reply);
|
2011-01-28 13:55:04 -08:00
|
|
|
|
if (!error) {
|
|
|
|
|
error = dpif_linux_dp_from_ofpbuf(reply, *bufp);
|
|
|
|
|
}
|
2011-01-26 15:42:00 -08:00
|
|
|
|
if (error) {
|
2011-01-28 13:55:04 -08:00
|
|
|
|
ofpbuf_delete(*bufp);
|
|
|
|
|
*bufp = NULL;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Obtains information about 'dpif_' and stores it into '*reply' and '*bufp'.
|
|
|
|
|
* The caller must free '*bufp' when the reply is no longer needed ('reply'
|
|
|
|
|
* will contain pointers into '*bufp'). */
|
2011-05-04 13:58:10 -07:00
|
|
|
|
static int
|
2011-01-26 15:42:00 -08:00
|
|
|
|
dpif_linux_dp_get(const struct dpif *dpif_, struct dpif_linux_dp *reply,
|
|
|
|
|
struct ofpbuf **bufp)
|
|
|
|
|
{
|
|
|
|
|
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
|
|
|
|
struct dpif_linux_dp request;
|
|
|
|
|
|
|
|
|
|
dpif_linux_dp_init(&request);
|
2011-08-18 10:35:40 -07:00
|
|
|
|
request.cmd = OVS_DP_CMD_GET;
|
2011-01-21 17:01:56 -08:00
|
|
|
|
request.dp_ifindex = dpif->dp_ifindex;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
|
|
|
|
|
return dpif_linux_dp_transact(&request, reply, bufp);
|
|
|
|
|
}
|
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
/* Parses the contents of 'buf', which contains a "struct ovs_header" followed
|
2011-01-28 14:00:51 -08:00
|
|
|
|
* by Netlink attributes, into 'flow'. Returns 0 if successful, otherwise a
|
2011-01-26 15:42:00 -08:00
|
|
|
|
* positive errno value.
|
|
|
|
|
*
|
|
|
|
|
* 'flow' will contain pointers into 'buf', so the caller should not free 'buf'
|
|
|
|
|
* while 'flow' is still in use. */
|
|
|
|
|
static int
|
|
|
|
|
dpif_linux_flow_from_ofpbuf(struct dpif_linux_flow *flow,
|
|
|
|
|
const struct ofpbuf *buf)
|
|
|
|
|
{
|
2011-08-18 10:35:40 -07:00
|
|
|
|
static const struct nl_policy ovs_flow_policy[] = {
|
|
|
|
|
[OVS_FLOW_ATTR_KEY] = { .type = NL_A_NESTED },
|
2013-06-19 07:15:10 +00:00
|
|
|
|
[OVS_FLOW_ATTR_MASK] = { .type = NL_A_NESTED, .optional = true },
|
2011-08-18 10:35:40 -07:00
|
|
|
|
[OVS_FLOW_ATTR_ACTIONS] = { .type = NL_A_NESTED, .optional = true },
|
2011-11-07 09:21:17 -08:00
|
|
|
|
[OVS_FLOW_ATTR_STATS] = { NL_POLICY_FOR(struct ovs_flow_stats),
|
2011-01-26 15:42:00 -08:00
|
|
|
|
.optional = true },
|
2011-08-18 10:35:40 -07:00
|
|
|
|
[OVS_FLOW_ATTR_TCP_FLAGS] = { .type = NL_A_U8, .optional = true },
|
|
|
|
|
[OVS_FLOW_ATTR_USED] = { .type = NL_A_U64, .optional = true },
|
|
|
|
|
/* The kernel never uses OVS_FLOW_ATTR_CLEAR. */
|
2011-01-26 15:42:00 -08:00
|
|
|
|
};
|
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
struct nlattr *a[ARRAY_SIZE(ovs_flow_policy)];
|
|
|
|
|
struct ovs_header *ovs_header;
|
2011-01-28 14:00:51 -08:00
|
|
|
|
struct nlmsghdr *nlmsg;
|
|
|
|
|
struct genlmsghdr *genl;
|
|
|
|
|
struct ofpbuf b;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
|
|
|
|
|
dpif_linux_flow_init(flow);
|
|
|
|
|
|
2011-01-28 14:00:51 -08:00
|
|
|
|
ofpbuf_use_const(&b, buf->data, buf->size);
|
|
|
|
|
nlmsg = ofpbuf_try_pull(&b, sizeof *nlmsg);
|
|
|
|
|
genl = ofpbuf_try_pull(&b, sizeof *genl);
|
2011-08-18 10:35:40 -07:00
|
|
|
|
ovs_header = ofpbuf_try_pull(&b, sizeof *ovs_header);
|
|
|
|
|
if (!nlmsg || !genl || !ovs_header
|
|
|
|
|
|| nlmsg->nlmsg_type != ovs_flow_family
|
|
|
|
|
|| !nl_policy_parse(&b, 0, ovs_flow_policy, a,
|
|
|
|
|
ARRAY_SIZE(ovs_flow_policy))) {
|
2011-01-26 15:42:00 -08:00
|
|
|
|
return EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
2011-01-28 14:00:51 -08:00
|
|
|
|
flow->nlmsg_flags = nlmsg->nlmsg_flags;
|
2011-08-18 10:35:40 -07:00
|
|
|
|
flow->dp_ifindex = ovs_header->dp_ifindex;
|
|
|
|
|
flow->key = nl_attr_get(a[OVS_FLOW_ATTR_KEY]);
|
|
|
|
|
flow->key_len = nl_attr_get_size(a[OVS_FLOW_ATTR_KEY]);
|
2013-06-19 07:15:10 +00:00
|
|
|
|
|
|
|
|
|
if (a[OVS_FLOW_ATTR_MASK]) {
|
|
|
|
|
flow->mask = nl_attr_get(a[OVS_FLOW_ATTR_MASK]);
|
|
|
|
|
flow->mask_len = nl_attr_get_size(a[OVS_FLOW_ATTR_MASK]);
|
|
|
|
|
}
|
2011-08-18 10:35:40 -07:00
|
|
|
|
if (a[OVS_FLOW_ATTR_ACTIONS]) {
|
|
|
|
|
flow->actions = nl_attr_get(a[OVS_FLOW_ATTR_ACTIONS]);
|
|
|
|
|
flow->actions_len = nl_attr_get_size(a[OVS_FLOW_ATTR_ACTIONS]);
|
2011-01-26 15:42:00 -08:00
|
|
|
|
}
|
2011-08-18 10:35:40 -07:00
|
|
|
|
if (a[OVS_FLOW_ATTR_STATS]) {
|
|
|
|
|
flow->stats = nl_attr_get(a[OVS_FLOW_ATTR_STATS]);
|
2011-01-26 15:42:00 -08:00
|
|
|
|
}
|
2011-08-18 10:35:40 -07:00
|
|
|
|
if (a[OVS_FLOW_ATTR_TCP_FLAGS]) {
|
|
|
|
|
flow->tcp_flags = nl_attr_get(a[OVS_FLOW_ATTR_TCP_FLAGS]);
|
2011-01-26 15:42:00 -08:00
|
|
|
|
}
|
2011-08-18 10:35:40 -07:00
|
|
|
|
if (a[OVS_FLOW_ATTR_USED]) {
|
|
|
|
|
flow->used = nl_attr_get(a[OVS_FLOW_ATTR_USED]);
|
2011-01-29 09:41:59 -08:00
|
|
|
|
}
|
2011-01-26 15:42:00 -08:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
/* Appends to 'buf' (which must initially be empty) a "struct ovs_header"
|
2011-01-26 15:42:00 -08:00
|
|
|
|
* followed by Netlink attributes corresponding to 'flow'. */
|
|
|
|
|
static void
|
|
|
|
|
dpif_linux_flow_to_ofpbuf(const struct dpif_linux_flow *flow,
|
|
|
|
|
struct ofpbuf *buf)
|
|
|
|
|
{
|
2011-08-18 10:35:40 -07:00
|
|
|
|
struct ovs_header *ovs_header;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
nl_msg_put_genlmsghdr(buf, 0, ovs_flow_family,
|
2011-09-27 16:07:23 -07:00
|
|
|
|
NLM_F_REQUEST | flow->nlmsg_flags,
|
2011-10-22 18:22:18 -07:00
|
|
|
|
flow->cmd, OVS_FLOW_VERSION);
|
2011-01-28 14:00:51 -08:00
|
|
|
|
|
2011-08-18 10:35:40 -07:00
|
|
|
|
ovs_header = ofpbuf_put_uninit(buf, sizeof *ovs_header);
|
|
|
|
|
ovs_header->dp_ifindex = flow->dp_ifindex;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
|
|
|
|
|
if (flow->key_len) {
|
2011-08-18 10:35:40 -07:00
|
|
|
|
nl_msg_put_unspec(buf, OVS_FLOW_ATTR_KEY, flow->key, flow->key_len);
|
2011-01-26 15:42:00 -08:00
|
|
|
|
}
|
|
|
|
|
|
2013-06-19 07:15:10 +00:00
|
|
|
|
if (flow->mask_len) {
|
|
|
|
|
nl_msg_put_unspec(buf, OVS_FLOW_ATTR_MASK, flow->mask, flow->mask_len);
|
|
|
|
|
}
|
|
|
|
|
|
2011-01-31 15:46:03 -08:00
|
|
|
|
if (flow->actions || flow->actions_len) {
|
2011-08-18 10:35:40 -07:00
|
|
|
|
nl_msg_put_unspec(buf, OVS_FLOW_ATTR_ACTIONS,
|
2011-01-26 15:42:00 -08:00
|
|
|
|
flow->actions, flow->actions_len);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* We never need to send these to the kernel. */
|
2012-11-06 13:14:55 -08:00
|
|
|
|
ovs_assert(!flow->stats);
|
|
|
|
|
ovs_assert(!flow->tcp_flags);
|
|
|
|
|
ovs_assert(!flow->used);
|
2011-01-26 15:42:00 -08:00
|
|
|
|
|
|
|
|
|
if (flow->clear) {
|
2011-08-18 10:35:40 -07:00
|
|
|
|
nl_msg_put_flag(buf, OVS_FLOW_ATTR_CLEAR);
|
2011-01-26 15:42:00 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Clears 'flow' to "empty" values. */
|
2011-05-04 13:58:10 -07:00
|
|
|
|
static void
|
2011-01-26 15:42:00 -08:00
|
|
|
|
dpif_linux_flow_init(struct dpif_linux_flow *flow)
|
|
|
|
|
{
|
|
|
|
|
memset(flow, 0, sizeof *flow);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Executes 'request' in the kernel datapath. If the command fails, returns a
|
|
|
|
|
* positive errno value. Otherwise, if 'reply' and 'bufp' are null, returns 0
|
|
|
|
|
* without doing anything else. If 'reply' and 'bufp' are nonnull, then the
|
2011-01-28 14:00:51 -08:00
|
|
|
|
* result of the command is expected to be a flow also, which is decoded and
|
|
|
|
|
* stored in '*reply' and '*bufp'. The caller must free '*bufp' when the reply
|
|
|
|
|
* is no longer needed ('reply' will contain pointers into '*bufp'). */
|
2011-05-04 13:58:10 -07:00
|
|
|
|
static int
|
2011-09-27 16:07:23 -07:00
|
|
|
|
dpif_linux_flow_transact(struct dpif_linux_flow *request,
|
2011-01-26 15:42:00 -08:00
|
|
|
|
struct dpif_linux_flow *reply, struct ofpbuf **bufp)
|
|
|
|
|
{
|
2011-01-28 14:00:51 -08:00
|
|
|
|
struct ofpbuf *request_buf;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
int error;
|
|
|
|
|
|
2012-11-06 13:14:55 -08:00
|
|
|
|
ovs_assert((reply != NULL) == (bufp != NULL));
|
2011-01-26 15:42:00 -08:00
|
|
|
|
|
2011-09-27 16:07:23 -07:00
|
|
|
|
if (reply) {
|
|
|
|
|
request->nlmsg_flags |= NLM_F_ECHO;
|
|
|
|
|
}
|
|
|
|
|
|
2011-01-28 14:00:51 -08:00
|
|
|
|
request_buf = ofpbuf_new(1024);
|
|
|
|
|
dpif_linux_flow_to_ofpbuf(request, request_buf);
|
2013-04-29 13:57:50 -07:00
|
|
|
|
error = nl_transact(NETLINK_GENERIC, request_buf, bufp);
|
2011-01-28 14:00:51 -08:00
|
|
|
|
ofpbuf_delete(request_buf);
|
2011-01-26 15:42:00 -08:00
|
|
|
|
|
2011-01-28 14:00:51 -08:00
|
|
|
|
if (reply) {
|
|
|
|
|
if (!error) {
|
|
|
|
|
error = dpif_linux_flow_from_ofpbuf(reply, *bufp);
|
|
|
|
|
}
|
2011-01-26 15:42:00 -08:00
|
|
|
|
if (error) {
|
2011-01-28 14:00:51 -08:00
|
|
|
|
dpif_linux_flow_init(reply);
|
|
|
|
|
ofpbuf_delete(*bufp);
|
|
|
|
|
*bufp = NULL;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
dpif_linux_flow_get_stats(const struct dpif_linux_flow *flow,
|
|
|
|
|
struct dpif_flow_stats *stats)
|
|
|
|
|
{
|
|
|
|
|
if (flow->stats) {
|
|
|
|
|
stats->n_packets = get_unaligned_u64(&flow->stats->n_packets);
|
|
|
|
|
stats->n_bytes = get_unaligned_u64(&flow->stats->n_bytes);
|
|
|
|
|
} else {
|
|
|
|
|
stats->n_packets = 0;
|
|
|
|
|
stats->n_bytes = 0;
|
|
|
|
|
}
|
2011-10-04 15:25:14 -07:00
|
|
|
|
stats->used = flow->used ? get_32aligned_u64(flow->used) : 0;
|
2011-01-26 15:42:00 -08:00
|
|
|
|
stats->tcp_flags = flow->tcp_flags ? *flow->tcp_flags : 0;
|
|
|
|
|
}
|
2012-06-01 17:40:31 -04:00
|
|
|
|
|
|
|
|
|
/* Logs information about a packet that was recently lost in 'ch' (in
|
|
|
|
|
* 'dpif_'). */
|
|
|
|
|
static void
|
|
|
|
|
report_loss(struct dpif *dpif_, struct dpif_channel *ch)
|
|
|
|
|
{
|
|
|
|
|
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
|
|
|
|
|
static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(5, 5);
|
|
|
|
|
struct ds s;
|
|
|
|
|
|
2013-01-25 14:29:41 -08:00
|
|
|
|
if (VLOG_DROP_WARN(&rl)) {
|
2012-06-01 17:40:31 -04:00
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ds_init(&s);
|
|
|
|
|
if (ch->last_poll != LLONG_MIN) {
|
|
|
|
|
ds_put_format(&s, " (last polled %lld ms ago)",
|
|
|
|
|
time_msec() - ch->last_poll);
|
|
|
|
|
}
|
|
|
|
|
|
2013-11-25 23:38:48 -08:00
|
|
|
|
VLOG_WARN("%s: lost packet on channel %"PRIdPTR"%s",
|
2012-09-05 11:02:27 -07:00
|
|
|
|
dpif_name(dpif_), ch - dpif->channels, ds_cstr(&s));
|
2012-06-01 17:40:31 -04:00
|
|
|
|
ds_destroy(&s);
|
|
|
|
|
}
|