2009-07-08 13:19:16 -07:00
|
|
|
|
/*
|
2010-01-22 14:37:10 -05:00
|
|
|
|
* Copyright (c) 2008, 2009, 2010 Nicira Networks.
|
2009-07-08 13:19:16 -07:00
|
|
|
|
*
|
2009-06-15 15:11:30 -07:00
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
|
* You may obtain a copy of the License at:
|
2009-07-08 13:19:16 -07:00
|
|
|
|
*
|
2009-06-15 15:11:30 -07:00
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
*
|
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
|
* limitations under the License.
|
2009-07-08 13:19:16 -07:00
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include <config.h>
|
2009-06-17 14:35:35 -07:00
|
|
|
|
#include "dpif-provider.h"
|
2009-07-08 13:19:16 -07:00
|
|
|
|
|
|
|
|
|
#include <assert.h>
|
|
|
|
|
#include <ctype.h>
|
|
|
|
|
#include <errno.h>
|
|
|
|
|
#include <inttypes.h>
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
|
|
#include "coverage.h"
|
|
|
|
|
#include "dynamic-string.h"
|
|
|
|
|
#include "flow.h"
|
|
|
|
|
#include "netlink.h"
|
|
|
|
|
#include "odp-util.h"
|
|
|
|
|
#include "ofp-print.h"
|
2010-10-19 09:55:40 -07:00
|
|
|
|
#include "ofp-util.h"
|
2009-07-08 13:19:16 -07:00
|
|
|
|
#include "ofpbuf.h"
|
|
|
|
|
#include "packets.h"
|
|
|
|
|
#include "poll-loop.h"
|
2010-02-01 11:36:01 -05:00
|
|
|
|
#include "shash.h"
|
2009-07-06 11:06:36 -07:00
|
|
|
|
#include "svec.h"
|
2009-07-08 13:19:16 -07:00
|
|
|
|
#include "util.h"
|
|
|
|
|
#include "valgrind.h"
|
|
|
|
|
#include "vlog.h"
|
2010-07-16 11:02:49 -07:00
|
|
|
|
|
2010-10-19 14:47:01 -07:00
|
|
|
|
VLOG_DEFINE_THIS_MODULE(dpif);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
|
2010-02-01 11:36:01 -05:00
|
|
|
|
static const struct dpif_class *base_dpif_classes[] = {
|
2010-05-26 10:38:52 -07:00
|
|
|
|
#ifdef HAVE_NETLINK
|
2009-06-17 14:35:35 -07:00
|
|
|
|
&dpif_linux_class,
|
2010-05-26 10:38:52 -07:00
|
|
|
|
#endif
|
2009-06-19 14:09:39 -07:00
|
|
|
|
&dpif_netdev_class,
|
2009-06-16 10:09:10 -07:00
|
|
|
|
};
|
2010-02-01 11:36:01 -05:00
|
|
|
|
|
|
|
|
|
struct registered_dpif_class {
|
2010-11-18 10:07:48 -08:00
|
|
|
|
const struct dpif_class *dpif_class;
|
2010-02-01 11:36:01 -05:00
|
|
|
|
int refcount;
|
|
|
|
|
};
|
|
|
|
|
static struct shash dpif_classes = SHASH_INITIALIZER(&dpif_classes);
|
2009-06-16 10:09:10 -07:00
|
|
|
|
|
2009-07-08 13:19:16 -07:00
|
|
|
|
/* Rate limit for individual messages going to or from the datapath, output at
|
|
|
|
|
* DBG level. This is very high because, if these are enabled, it is because
|
|
|
|
|
* we really need to see them. */
|
|
|
|
|
static struct vlog_rate_limit dpmsg_rl = VLOG_RATE_LIMIT_INIT(600, 600);
|
|
|
|
|
|
|
|
|
|
/* Not really much point in logging many dpif errors. */
|
2010-04-06 11:17:39 -07:00
|
|
|
|
static struct vlog_rate_limit error_rl = VLOG_RATE_LIMIT_INIT(60, 5);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
static void log_operation(const struct dpif *, const char *operation,
|
|
|
|
|
int error);
|
|
|
|
|
static void log_flow_operation(const struct dpif *, const char *operation,
|
|
|
|
|
int error, struct odp_flow *flow);
|
|
|
|
|
static void log_flow_put(struct dpif *, int error,
|
|
|
|
|
const struct odp_flow_put *);
|
|
|
|
|
static bool should_log_flow_message(int error);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
static void check_rw_odp_flow(struct odp_flow *);
|
|
|
|
|
|
2010-02-01 11:36:01 -05:00
|
|
|
|
static void
|
|
|
|
|
dp_initialize(void)
|
|
|
|
|
{
|
|
|
|
|
static int status = -1;
|
|
|
|
|
|
|
|
|
|
if (status < 0) {
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
status = 0;
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(base_dpif_classes); i++) {
|
|
|
|
|
dp_register_provider(base_dpif_classes[i]);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2009-06-19 14:09:09 -07:00
|
|
|
|
/* Performs periodic work needed by all the various kinds of dpifs.
|
|
|
|
|
*
|
2009-07-30 16:04:45 -07:00
|
|
|
|
* If your program opens any dpifs, it must call both this function and
|
|
|
|
|
* netdev_run() within its main poll loop. */
|
2009-06-19 14:09:09 -07:00
|
|
|
|
void
|
|
|
|
|
dp_run(void)
|
|
|
|
|
{
|
2010-02-01 11:36:01 -05:00
|
|
|
|
struct shash_node *node;
|
|
|
|
|
SHASH_FOR_EACH(node, &dpif_classes) {
|
|
|
|
|
const struct registered_dpif_class *registered_class = node->data;
|
2010-11-18 10:07:48 -08:00
|
|
|
|
if (registered_class->dpif_class->run) {
|
|
|
|
|
registered_class->dpif_class->run();
|
2009-06-19 14:09:09 -07:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Arranges for poll_block() to wake up when dp_run() needs to be called.
|
|
|
|
|
*
|
2009-07-30 16:04:45 -07:00
|
|
|
|
* If your program opens any dpifs, it must call both this function and
|
|
|
|
|
* netdev_wait() within its main poll loop. */
|
2009-06-19 14:09:09 -07:00
|
|
|
|
void
|
|
|
|
|
dp_wait(void)
|
|
|
|
|
{
|
2010-02-01 11:36:01 -05:00
|
|
|
|
struct shash_node *node;
|
|
|
|
|
SHASH_FOR_EACH(node, &dpif_classes) {
|
|
|
|
|
const struct registered_dpif_class *registered_class = node->data;
|
2010-11-18 10:07:48 -08:00
|
|
|
|
if (registered_class->dpif_class->wait) {
|
|
|
|
|
registered_class->dpif_class->wait();
|
2009-06-19 14:09:09 -07:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-02-01 11:36:01 -05:00
|
|
|
|
/* Registers a new datapath provider. After successful registration, new
|
|
|
|
|
* datapaths of that type can be opened using dpif_open(). */
|
|
|
|
|
int
|
|
|
|
|
dp_register_provider(const struct dpif_class *new_class)
|
|
|
|
|
{
|
|
|
|
|
struct registered_dpif_class *registered_class;
|
|
|
|
|
|
|
|
|
|
if (shash_find(&dpif_classes, new_class->type)) {
|
|
|
|
|
VLOG_WARN("attempted to register duplicate datapath provider: %s",
|
|
|
|
|
new_class->type);
|
|
|
|
|
return EEXIST;
|
|
|
|
|
}
|
2010-01-22 14:37:10 -05:00
|
|
|
|
|
2010-02-01 11:36:01 -05:00
|
|
|
|
registered_class = xmalloc(sizeof *registered_class);
|
2010-11-18 10:07:48 -08:00
|
|
|
|
registered_class->dpif_class = new_class;
|
2010-02-01 11:36:01 -05:00
|
|
|
|
registered_class->refcount = 0;
|
|
|
|
|
|
|
|
|
|
shash_add(&dpif_classes, new_class->type, registered_class);
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Unregisters a datapath provider. 'type' must have been previously
|
|
|
|
|
* registered and not currently be in use by any dpifs. After unregistration
|
|
|
|
|
* new datapaths of that type cannot be opened using dpif_open(). */
|
|
|
|
|
int
|
|
|
|
|
dp_unregister_provider(const char *type)
|
|
|
|
|
{
|
|
|
|
|
struct shash_node *node;
|
|
|
|
|
struct registered_dpif_class *registered_class;
|
|
|
|
|
|
|
|
|
|
node = shash_find(&dpif_classes, type);
|
|
|
|
|
if (!node) {
|
|
|
|
|
VLOG_WARN("attempted to unregister a datapath provider that is not "
|
|
|
|
|
"registered: %s", type);
|
|
|
|
|
return EAFNOSUPPORT;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
registered_class = node->data;
|
|
|
|
|
if (registered_class->refcount) {
|
|
|
|
|
VLOG_WARN("attempted to unregister in use datapath provider: %s", type);
|
|
|
|
|
return EBUSY;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
shash_delete(&dpif_classes, node);
|
|
|
|
|
free(registered_class);
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Clears 'types' and enumerates the types of all currently registered datapath
|
|
|
|
|
* providers into it. The caller must first initialize the svec. */
|
2010-01-22 14:37:10 -05:00
|
|
|
|
void
|
|
|
|
|
dp_enumerate_types(struct svec *types)
|
|
|
|
|
{
|
2010-02-01 11:36:01 -05:00
|
|
|
|
struct shash_node *node;
|
2010-01-22 14:37:10 -05:00
|
|
|
|
|
2010-02-01 11:36:01 -05:00
|
|
|
|
dp_initialize();
|
2010-01-22 14:37:10 -05:00
|
|
|
|
svec_clear(types);
|
|
|
|
|
|
2010-02-01 11:36:01 -05:00
|
|
|
|
SHASH_FOR_EACH(node, &dpif_classes) {
|
|
|
|
|
const struct registered_dpif_class *registered_class = node->data;
|
2010-11-18 10:07:48 -08:00
|
|
|
|
svec_add(types, registered_class->dpif_class->type);
|
2010-01-22 14:37:10 -05:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Clears 'names' and enumerates the names of all known created datapaths with
|
|
|
|
|
* the given 'type'. The caller must first initialize the svec. Returns 0 if
|
|
|
|
|
* successful, otherwise a positive errno value.
|
2009-07-06 11:06:36 -07:00
|
|
|
|
*
|
|
|
|
|
* Some kinds of datapaths might not be practically enumerable. This is not
|
|
|
|
|
* considered an error. */
|
|
|
|
|
int
|
2010-01-22 14:37:10 -05:00
|
|
|
|
dp_enumerate_names(const char *type, struct svec *names)
|
2009-07-06 11:06:36 -07:00
|
|
|
|
{
|
2010-02-01 11:36:01 -05:00
|
|
|
|
const struct registered_dpif_class *registered_class;
|
|
|
|
|
const struct dpif_class *dpif_class;
|
|
|
|
|
int error;
|
2009-07-06 11:06:36 -07:00
|
|
|
|
|
2010-02-01 11:36:01 -05:00
|
|
|
|
dp_initialize();
|
2010-01-22 14:37:10 -05:00
|
|
|
|
svec_clear(names);
|
|
|
|
|
|
2010-02-01 11:36:01 -05:00
|
|
|
|
registered_class = shash_find_data(&dpif_classes, type);
|
|
|
|
|
if (!registered_class) {
|
|
|
|
|
VLOG_WARN("could not enumerate unknown type: %s", type);
|
|
|
|
|
return EAFNOSUPPORT;
|
|
|
|
|
}
|
2010-01-22 14:37:10 -05:00
|
|
|
|
|
2010-11-18 10:07:48 -08:00
|
|
|
|
dpif_class = registered_class->dpif_class;
|
2010-02-01 11:36:01 -05:00
|
|
|
|
error = dpif_class->enumerate ? dpif_class->enumerate(names) : 0;
|
2010-01-22 14:37:10 -05:00
|
|
|
|
|
2010-02-01 11:36:01 -05:00
|
|
|
|
if (error) {
|
|
|
|
|
VLOG_WARN("failed to enumerate %s datapaths: %s", dpif_class->type,
|
|
|
|
|
strerror(error));
|
2009-07-06 11:06:36 -07:00
|
|
|
|
}
|
2010-01-22 14:37:10 -05:00
|
|
|
|
|
2010-02-01 11:36:01 -05:00
|
|
|
|
return error;
|
2010-01-22 14:37:10 -05:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Parses 'datapath name', which is of the form type@name into its
|
|
|
|
|
* component pieces. 'name' and 'type' must be freed by the caller. */
|
|
|
|
|
void
|
|
|
|
|
dp_parse_name(const char *datapath_name_, char **name, char **type)
|
|
|
|
|
{
|
|
|
|
|
char *datapath_name = xstrdup(datapath_name_);
|
|
|
|
|
char *separator;
|
|
|
|
|
|
|
|
|
|
separator = strchr(datapath_name, '@');
|
|
|
|
|
if (separator) {
|
|
|
|
|
*separator = '\0';
|
|
|
|
|
*type = datapath_name;
|
|
|
|
|
*name = xstrdup(separator + 1);
|
|
|
|
|
} else {
|
|
|
|
|
*name = datapath_name;
|
|
|
|
|
*type = NULL;
|
|
|
|
|
}
|
2009-07-06 11:06:36 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
static int
|
2010-01-22 14:37:10 -05:00
|
|
|
|
do_open(const char *name, const char *type, bool create, struct dpif **dpifp)
|
2009-07-08 13:19:16 -07:00
|
|
|
|
{
|
2009-06-17 14:35:35 -07:00
|
|
|
|
struct dpif *dpif = NULL;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
int error;
|
2010-02-01 11:36:01 -05:00
|
|
|
|
struct registered_dpif_class *registered_class;
|
|
|
|
|
|
|
|
|
|
dp_initialize();
|
2009-07-08 13:19:16 -07:00
|
|
|
|
|
2010-01-22 14:37:10 -05:00
|
|
|
|
if (!type || *type == '\0') {
|
|
|
|
|
type = "system";
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
|
2010-02-01 11:36:01 -05:00
|
|
|
|
registered_class = shash_find_data(&dpif_classes, type);
|
|
|
|
|
if (!registered_class) {
|
|
|
|
|
VLOG_WARN("could not create datapath %s of unknown type %s", name,
|
|
|
|
|
type);
|
|
|
|
|
error = EAFNOSUPPORT;
|
|
|
|
|
goto exit;
|
|
|
|
|
}
|
|
|
|
|
|
2010-11-18 10:06:41 -08:00
|
|
|
|
error = registered_class->dpif_class->open(registered_class->dpif_class,
|
|
|
|
|
name, create, &dpif);
|
2010-02-01 11:36:01 -05:00
|
|
|
|
if (!error) {
|
2010-11-18 10:06:41 -08:00
|
|
|
|
assert(dpif->dpif_class == registered_class->dpif_class);
|
2010-02-01 11:36:01 -05:00
|
|
|
|
registered_class->refcount++;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
exit:
|
|
|
|
|
*dpifp = error ? NULL : dpif;
|
|
|
|
|
return error;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
|
2010-01-22 14:37:10 -05:00
|
|
|
|
/* Tries to open an existing datapath named 'name' and type 'type'. Will fail
|
|
|
|
|
* if no datapath with 'name' and 'type' exists. 'type' may be either NULL or
|
|
|
|
|
* the empty string to specify the default system type. Returns 0 if
|
|
|
|
|
* successful, otherwise a positive errno value. On success stores a pointer
|
|
|
|
|
* to the datapath in '*dpifp', otherwise a null pointer. */
|
2009-06-17 14:35:35 -07:00
|
|
|
|
int
|
2010-01-22 14:37:10 -05:00
|
|
|
|
dpif_open(const char *name, const char *type, struct dpif **dpifp)
|
2009-07-08 13:19:16 -07:00
|
|
|
|
{
|
2010-01-22 14:37:10 -05:00
|
|
|
|
return do_open(name, type, false, dpifp);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
|
2010-01-22 14:37:10 -05:00
|
|
|
|
/* Tries to create and open a new datapath with the given 'name' and 'type'.
|
|
|
|
|
* 'type' may be either NULL or the empty string to specify the default system
|
|
|
|
|
* type. Will fail if a datapath with 'name' and 'type' already exists.
|
|
|
|
|
* Returns 0 if successful, otherwise a positive errno value. On success
|
|
|
|
|
* stores a pointer to the datapath in '*dpifp', otherwise a null pointer. */
|
2009-07-08 13:19:16 -07:00
|
|
|
|
int
|
2010-01-22 14:37:10 -05:00
|
|
|
|
dpif_create(const char *name, const char *type, struct dpif **dpifp)
|
2009-07-08 13:19:16 -07:00
|
|
|
|
{
|
2010-01-22 14:37:10 -05:00
|
|
|
|
return do_open(name, type, true, dpifp);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
2009-07-08 13:19:16 -07:00
|
|
|
|
|
2010-01-22 14:37:10 -05:00
|
|
|
|
/* Tries to open a datapath with the given 'name' and 'type', creating it if it
|
|
|
|
|
* does not exist. 'type' may be either NULL or the empty string to specify
|
|
|
|
|
* the default system type. Returns 0 if successful, otherwise a positive
|
|
|
|
|
* errno value. On success stores a pointer to the datapath in '*dpifp',
|
|
|
|
|
* otherwise a null pointer. */
|
2009-11-23 11:09:19 -08:00
|
|
|
|
int
|
2010-01-22 14:37:10 -05:00
|
|
|
|
dpif_create_and_open(const char *name, const char *type, struct dpif **dpifp)
|
2009-11-23 11:09:19 -08:00
|
|
|
|
{
|
|
|
|
|
int error;
|
|
|
|
|
|
2010-01-22 14:37:10 -05:00
|
|
|
|
error = dpif_create(name, type, dpifp);
|
2009-11-23 11:09:19 -08:00
|
|
|
|
if (error == EEXIST || error == EBUSY) {
|
2010-01-22 14:37:10 -05:00
|
|
|
|
error = dpif_open(name, type, dpifp);
|
2009-11-23 11:09:19 -08:00
|
|
|
|
if (error) {
|
|
|
|
|
VLOG_WARN("datapath %s already exists but cannot be opened: %s",
|
|
|
|
|
name, strerror(error));
|
|
|
|
|
}
|
|
|
|
|
} else if (error) {
|
|
|
|
|
VLOG_WARN("failed to create datapath %s: %s", name, strerror(error));
|
|
|
|
|
}
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Closes and frees the connection to 'dpif'. Does not destroy the datapath
|
|
|
|
|
* itself; call dpif_delete() first, instead, if that is desirable. */
|
|
|
|
|
void
|
|
|
|
|
dpif_close(struct dpif *dpif)
|
|
|
|
|
{
|
|
|
|
|
if (dpif) {
|
2010-02-01 11:36:01 -05:00
|
|
|
|
struct registered_dpif_class *registered_class;
|
|
|
|
|
|
2010-08-30 00:24:53 -07:00
|
|
|
|
registered_class = shash_find_data(&dpif_classes,
|
2010-02-05 15:58:27 -08:00
|
|
|
|
dpif->dpif_class->type);
|
2010-02-01 11:36:01 -05:00
|
|
|
|
assert(registered_class);
|
|
|
|
|
assert(registered_class->refcount);
|
|
|
|
|
|
|
|
|
|
registered_class->refcount--;
|
|
|
|
|
dpif_uninit(dpif, true);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-22 14:37:10 -05:00
|
|
|
|
/* Returns the name of datapath 'dpif' prefixed with the type
|
|
|
|
|
* (for use in log messages). */
|
2009-06-16 11:00:22 -07:00
|
|
|
|
const char *
|
|
|
|
|
dpif_name(const struct dpif *dpif)
|
|
|
|
|
{
|
2010-01-22 14:37:10 -05:00
|
|
|
|
return dpif->full_name;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Returns the name of datapath 'dpif' without the type
|
|
|
|
|
* (for use in device names). */
|
|
|
|
|
const char *
|
|
|
|
|
dpif_base_name(const struct dpif *dpif)
|
|
|
|
|
{
|
|
|
|
|
return dpif->base_name;
|
2009-06-16 11:00:22 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-07-06 11:06:36 -07:00
|
|
|
|
/* Enumerates all names that may be used to open 'dpif' into 'all_names'. The
|
|
|
|
|
* Linux datapath, for example, supports opening a datapath both by number,
|
|
|
|
|
* e.g. "dp0", and by the name of the datapath's local port. For some
|
|
|
|
|
* datapaths, this might be an infinite set (e.g. in a file name, slashes may
|
|
|
|
|
* be duplicated any number of times), in which case only the names most likely
|
|
|
|
|
* to be used will be enumerated.
|
|
|
|
|
*
|
|
|
|
|
* The caller must already have initialized 'all_names'. Any existing names in
|
|
|
|
|
* 'all_names' will not be disturbed. */
|
|
|
|
|
int
|
|
|
|
|
dpif_get_all_names(const struct dpif *dpif, struct svec *all_names)
|
|
|
|
|
{
|
2010-01-22 15:14:01 -08:00
|
|
|
|
if (dpif->dpif_class->get_all_names) {
|
|
|
|
|
int error = dpif->dpif_class->get_all_names(dpif, all_names);
|
2009-07-06 11:06:36 -07:00
|
|
|
|
if (error) {
|
|
|
|
|
VLOG_WARN_RL(&error_rl,
|
|
|
|
|
"failed to retrieve names for datpath %s: %s",
|
|
|
|
|
dpif_name(dpif), strerror(error));
|
|
|
|
|
}
|
|
|
|
|
return error;
|
|
|
|
|
} else {
|
2010-01-22 14:37:10 -05:00
|
|
|
|
svec_add(all_names, dpif_base_name(dpif));
|
2009-07-06 11:06:36 -07:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Destroys the datapath that 'dpif' is connected to, first removing all of its
|
|
|
|
|
* ports. After calling this function, it does not make sense to pass 'dpif'
|
|
|
|
|
* to any functions other than dpif_name() or dpif_close(). */
|
2009-07-08 13:19:16 -07:00
|
|
|
|
int
|
|
|
|
|
dpif_delete(struct dpif *dpif)
|
|
|
|
|
{
|
2009-06-17 14:35:35 -07:00
|
|
|
|
int error;
|
|
|
|
|
|
2009-07-08 13:19:16 -07:00
|
|
|
|
COVERAGE_INC(dpif_destroy);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
|
2010-01-22 15:14:01 -08:00
|
|
|
|
error = dpif->dpif_class->destroy(dpif);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
log_operation(dpif, "delete", error);
|
|
|
|
|
return error;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Retrieves statistics for 'dpif' into 'stats'. Returns 0 if successful,
|
|
|
|
|
* otherwise a positive errno value. */
|
2009-07-08 13:19:16 -07:00
|
|
|
|
int
|
|
|
|
|
dpif_get_dp_stats(const struct dpif *dpif, struct odp_stats *stats)
|
|
|
|
|
{
|
2010-01-22 15:14:01 -08:00
|
|
|
|
int error = dpif->dpif_class->get_stats(dpif, stats);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
if (error) {
|
|
|
|
|
memset(stats, 0, sizeof *stats);
|
|
|
|
|
}
|
|
|
|
|
log_operation(dpif, "get_stats", error);
|
|
|
|
|
return error;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Retrieves the current IP fragment handling policy for 'dpif' into
|
|
|
|
|
* '*drop_frags': true indicates that fragments are dropped, false indicates
|
|
|
|
|
* that fragments are treated in the same way as other IP packets (except that
|
|
|
|
|
* the L4 header cannot be read). Returns 0 if successful, otherwise a
|
|
|
|
|
* positive errno value. */
|
2009-07-08 13:19:16 -07:00
|
|
|
|
int
|
|
|
|
|
dpif_get_drop_frags(const struct dpif *dpif, bool *drop_frags)
|
|
|
|
|
{
|
2010-01-22 15:14:01 -08:00
|
|
|
|
int error = dpif->dpif_class->get_drop_frags(dpif, drop_frags);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
if (error) {
|
|
|
|
|
*drop_frags = false;
|
|
|
|
|
}
|
|
|
|
|
log_operation(dpif, "get_drop_frags", error);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Changes 'dpif''s treatment of IP fragments to 'drop_frags', whose meaning is
|
|
|
|
|
* the same as for the get_drop_frags member function. Returns 0 if
|
|
|
|
|
* successful, otherwise a positive errno value. */
|
2009-07-08 13:19:16 -07:00
|
|
|
|
int
|
|
|
|
|
dpif_set_drop_frags(struct dpif *dpif, bool drop_frags)
|
|
|
|
|
{
|
2010-01-22 15:14:01 -08:00
|
|
|
|
int error = dpif->dpif_class->set_drop_frags(dpif, drop_frags);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
log_operation(dpif, "set_drop_frags", error);
|
|
|
|
|
return error;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Attempts to add 'devname' as a port on 'dpif', given the combination of
|
|
|
|
|
* ODP_PORT_* flags in 'flags'. If successful, returns 0 and sets '*port_nop'
|
|
|
|
|
* to the new port's port number (if 'port_nop' is non-null). On failure,
|
|
|
|
|
* returns a positive errno value and sets '*port_nop' to UINT16_MAX (if
|
|
|
|
|
* 'port_nop' is non-null). */
|
2009-07-08 13:19:16 -07:00
|
|
|
|
int
|
2009-06-17 14:26:19 -07:00
|
|
|
|
dpif_port_add(struct dpif *dpif, const char *devname, uint16_t flags,
|
|
|
|
|
uint16_t *port_nop)
|
2009-07-08 13:19:16 -07:00
|
|
|
|
{
|
2009-06-17 14:26:19 -07:00
|
|
|
|
uint16_t port_no;
|
|
|
|
|
int error;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
|
|
|
|
|
COVERAGE_INC(dpif_port_add);
|
2009-06-17 14:26:19 -07:00
|
|
|
|
|
2010-01-22 15:14:01 -08:00
|
|
|
|
error = dpif->dpif_class->port_add(dpif, devname, flags, &port_no);
|
2009-06-17 14:26:19 -07:00
|
|
|
|
if (!error) {
|
2009-06-16 11:00:22 -07:00
|
|
|
|
VLOG_DBG_RL(&dpmsg_rl, "%s: added %s as port %"PRIu16,
|
|
|
|
|
dpif_name(dpif), devname, port_no);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
} else {
|
2009-06-17 14:26:19 -07:00
|
|
|
|
VLOG_WARN_RL(&error_rl, "%s: failed to add %s as port: %s",
|
2009-06-17 14:35:35 -07:00
|
|
|
|
dpif_name(dpif), devname, strerror(error));
|
|
|
|
|
port_no = UINT16_MAX;
|
2009-06-17 14:26:19 -07:00
|
|
|
|
}
|
|
|
|
|
if (port_nop) {
|
|
|
|
|
*port_nop = port_no;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
2009-06-17 14:26:19 -07:00
|
|
|
|
return error;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Attempts to remove 'dpif''s port number 'port_no'. Returns 0 if successful,
|
|
|
|
|
* otherwise a positive errno value. */
|
2009-07-08 13:19:16 -07:00
|
|
|
|
int
|
|
|
|
|
dpif_port_del(struct dpif *dpif, uint16_t port_no)
|
|
|
|
|
{
|
2009-06-17 14:35:35 -07:00
|
|
|
|
int error;
|
|
|
|
|
|
2009-07-08 13:19:16 -07:00
|
|
|
|
COVERAGE_INC(dpif_port_del);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
|
2010-01-22 15:14:01 -08:00
|
|
|
|
error = dpif->dpif_class->port_del(dpif, port_no);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
log_operation(dpif, "port_del", error);
|
|
|
|
|
return error;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Looks up port number 'port_no' in 'dpif'. On success, returns 0 and
|
|
|
|
|
* initializes '*port' appropriately; on failure, returns a positive errno
|
|
|
|
|
* value. */
|
2009-07-08 13:19:16 -07:00
|
|
|
|
int
|
|
|
|
|
dpif_port_query_by_number(const struct dpif *dpif, uint16_t port_no,
|
|
|
|
|
struct odp_port *port)
|
|
|
|
|
{
|
2010-01-22 15:14:01 -08:00
|
|
|
|
int error = dpif->dpif_class->port_query_by_number(dpif, port_no, port);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
if (!error) {
|
2009-06-16 11:00:22 -07:00
|
|
|
|
VLOG_DBG_RL(&dpmsg_rl, "%s: port %"PRIu16" is device %s",
|
|
|
|
|
dpif_name(dpif), port_no, port->devname);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
} else {
|
2009-06-17 14:35:35 -07:00
|
|
|
|
memset(port, 0, sizeof *port);
|
2009-06-16 11:00:22 -07:00
|
|
|
|
VLOG_WARN_RL(&error_rl, "%s: failed to query port %"PRIu16": %s",
|
2009-06-17 14:35:35 -07:00
|
|
|
|
dpif_name(dpif), port_no, strerror(error));
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
2009-06-17 14:35:35 -07:00
|
|
|
|
return error;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Looks up port named 'devname' in 'dpif'. On success, returns 0 and
|
|
|
|
|
* initializes '*port' appropriately; on failure, returns a positive errno
|
|
|
|
|
* value. */
|
2009-07-08 13:19:16 -07:00
|
|
|
|
int
|
|
|
|
|
dpif_port_query_by_name(const struct dpif *dpif, const char *devname,
|
|
|
|
|
struct odp_port *port)
|
|
|
|
|
{
|
2010-01-22 15:14:01 -08:00
|
|
|
|
int error = dpif->dpif_class->port_query_by_name(dpif, devname, port);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
if (!error) {
|
2009-06-16 11:00:22 -07:00
|
|
|
|
VLOG_DBG_RL(&dpmsg_rl, "%s: device %s is on port %"PRIu16,
|
|
|
|
|
dpif_name(dpif), devname, port->port);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
} else {
|
2009-06-17 14:35:35 -07:00
|
|
|
|
memset(port, 0, sizeof *port);
|
|
|
|
|
|
2009-06-16 10:01:04 -07:00
|
|
|
|
/* Log level is DBG here because all the current callers are interested
|
|
|
|
|
* in whether 'dpif' actually has a port 'devname', so that it's not an
|
|
|
|
|
* issue worth logging if it doesn't. */
|
|
|
|
|
VLOG_DBG_RL(&error_rl, "%s: failed to query port %s: %s",
|
2009-06-17 14:35:35 -07:00
|
|
|
|
dpif_name(dpif), devname, strerror(error));
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
2009-06-17 14:35:35 -07:00
|
|
|
|
return error;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Looks up port number 'port_no' in 'dpif'. On success, returns 0 and copies
|
|
|
|
|
* the port's name into the 'name_size' bytes in 'name', ensuring that the
|
|
|
|
|
* result is null-terminated. On failure, returns a positive errno value and
|
|
|
|
|
* makes 'name' the empty string. */
|
2009-06-15 16:51:46 -07:00
|
|
|
|
int
|
|
|
|
|
dpif_port_get_name(struct dpif *dpif, uint16_t port_no,
|
|
|
|
|
char *name, size_t name_size)
|
|
|
|
|
{
|
|
|
|
|
struct odp_port port;
|
|
|
|
|
int error;
|
|
|
|
|
|
|
|
|
|
assert(name_size > 0);
|
|
|
|
|
|
|
|
|
|
error = dpif_port_query_by_number(dpif, port_no, &port);
|
|
|
|
|
if (!error) {
|
|
|
|
|
ovs_strlcpy(name, port.devname, name_size);
|
|
|
|
|
} else {
|
|
|
|
|
*name = '\0';
|
|
|
|
|
}
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Obtains a list of all the ports in 'dpif'.
|
|
|
|
|
*
|
|
|
|
|
* If successful, returns 0 and sets '*portsp' to point to an array of
|
|
|
|
|
* appropriately initialized port structures and '*n_portsp' to the number of
|
|
|
|
|
* ports in the array. The caller is responsible for freeing '*portp' by
|
|
|
|
|
* calling free().
|
|
|
|
|
*
|
|
|
|
|
* On failure, returns a positive errno value and sets '*portsp' to NULL and
|
|
|
|
|
* '*n_portsp' to 0. */
|
2009-07-08 13:19:16 -07:00
|
|
|
|
int
|
|
|
|
|
dpif_port_list(const struct dpif *dpif,
|
2009-06-17 14:28:07 -07:00
|
|
|
|
struct odp_port **portsp, size_t *n_portsp)
|
2009-07-08 13:19:16 -07:00
|
|
|
|
{
|
2009-06-17 14:28:07 -07:00
|
|
|
|
struct odp_port *ports;
|
2009-08-25 16:26:36 -07:00
|
|
|
|
size_t n_ports = 0;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
int error;
|
|
|
|
|
|
2009-06-17 14:28:07 -07:00
|
|
|
|
for (;;) {
|
|
|
|
|
struct odp_stats stats;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
int retval;
|
2009-06-17 14:28:07 -07:00
|
|
|
|
|
2009-07-08 13:19:16 -07:00
|
|
|
|
error = dpif_get_dp_stats(dpif, &stats);
|
|
|
|
|
if (error) {
|
2009-06-17 14:28:07 -07:00
|
|
|
|
goto exit;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:28:07 -07:00
|
|
|
|
ports = xcalloc(stats.n_ports, sizeof *ports);
|
2010-01-22 15:14:01 -08:00
|
|
|
|
retval = dpif->dpif_class->port_list(dpif, ports, stats.n_ports);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
if (retval < 0) {
|
2009-06-17 14:28:07 -07:00
|
|
|
|
/* Hard error. */
|
2009-06-17 14:35:35 -07:00
|
|
|
|
error = -retval;
|
2009-06-17 14:28:07 -07:00
|
|
|
|
free(ports);
|
|
|
|
|
goto exit;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
} else if (retval <= stats.n_ports) {
|
2009-06-17 14:28:07 -07:00
|
|
|
|
/* Success. */
|
|
|
|
|
error = 0;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
n_ports = retval;
|
2009-06-17 14:28:07 -07:00
|
|
|
|
goto exit;
|
|
|
|
|
} else {
|
|
|
|
|
/* Soft error: port count increased behind our back. Try again. */
|
|
|
|
|
free(ports);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
2009-06-17 14:28:07 -07:00
|
|
|
|
}
|
2009-07-08 13:19:16 -07:00
|
|
|
|
|
2009-06-17 14:28:07 -07:00
|
|
|
|
exit:
|
|
|
|
|
if (error) {
|
|
|
|
|
*portsp = NULL;
|
|
|
|
|
*n_portsp = 0;
|
|
|
|
|
} else {
|
|
|
|
|
*portsp = ports;
|
|
|
|
|
*n_portsp = n_ports;
|
|
|
|
|
}
|
2009-06-17 14:35:35 -07:00
|
|
|
|
log_operation(dpif, "port_list", error);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
2009-06-24 10:24:09 -07:00
|
|
|
|
/* Polls for changes in the set of ports in 'dpif'. If the set of ports in
|
|
|
|
|
* 'dpif' has changed, this function does one of the following:
|
|
|
|
|
*
|
|
|
|
|
* - Stores the name of the device that was added to or deleted from 'dpif' in
|
|
|
|
|
* '*devnamep' and returns 0. The caller is responsible for freeing
|
|
|
|
|
* '*devnamep' (with free()) when it no longer needs it.
|
|
|
|
|
*
|
|
|
|
|
* - Returns ENOBUFS and sets '*devnamep' to NULL.
|
|
|
|
|
*
|
|
|
|
|
* This function may also return 'false positives', where it returns 0 and
|
|
|
|
|
* '*devnamep' names a device that was not actually added or deleted or it
|
|
|
|
|
* returns ENOBUFS without any change.
|
|
|
|
|
*
|
|
|
|
|
* Returns EAGAIN if the set of ports in 'dpif' has not changed. May also
|
|
|
|
|
* return other positive errno values to indicate that something has gone
|
|
|
|
|
* wrong. */
|
|
|
|
|
int
|
|
|
|
|
dpif_port_poll(const struct dpif *dpif, char **devnamep)
|
|
|
|
|
{
|
2010-01-22 15:14:01 -08:00
|
|
|
|
int error = dpif->dpif_class->port_poll(dpif, devnamep);
|
2009-06-24 10:24:09 -07:00
|
|
|
|
if (error) {
|
|
|
|
|
*devnamep = NULL;
|
|
|
|
|
}
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Arranges for the poll loop to wake up when port_poll(dpif) will return a
|
|
|
|
|
* value other than EAGAIN. */
|
|
|
|
|
void
|
|
|
|
|
dpif_port_poll_wait(const struct dpif *dpif)
|
|
|
|
|
{
|
2010-01-22 15:14:01 -08:00
|
|
|
|
dpif->dpif_class->port_poll_wait(dpif);
|
2009-06-24 10:24:09 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Deletes all flows from 'dpif'. Returns 0 if successful, otherwise a
|
|
|
|
|
* positive errno value. */
|
|
|
|
|
int
|
|
|
|
|
dpif_flow_flush(struct dpif *dpif)
|
2009-07-08 13:19:16 -07:00
|
|
|
|
{
|
2009-06-17 14:35:35 -07:00
|
|
|
|
int error;
|
|
|
|
|
|
|
|
|
|
COVERAGE_INC(dpif_flow_flush);
|
|
|
|
|
|
2010-01-22 15:14:01 -08:00
|
|
|
|
error = dpif->dpif_class->flow_flush(dpif);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
log_operation(dpif, "flow_flush", error);
|
|
|
|
|
return error;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Queries 'dpif' for a flow entry matching 'flow->key'.
|
|
|
|
|
*
|
|
|
|
|
* If a flow matching 'flow->key' exists in 'dpif', stores statistics for the
|
|
|
|
|
* flow into 'flow->stats'. If 'flow->n_actions' is zero, then 'flow->actions'
|
|
|
|
|
* is ignored. If 'flow->n_actions' is nonzero, then 'flow->actions' should
|
|
|
|
|
* point to an array of the specified number of actions. At most that many of
|
|
|
|
|
* the flow's actions will be copied into that array. 'flow->n_actions' will
|
|
|
|
|
* be updated to the number of actions actually present in the flow, which may
|
|
|
|
|
* be greater than the number stored if the flow has more actions than space
|
|
|
|
|
* available in the array.
|
|
|
|
|
*
|
|
|
|
|
* If no flow matching 'flow->key' exists in 'dpif', returns ENOENT. On other
|
|
|
|
|
* failure, returns a positive errno value. */
|
|
|
|
|
int
|
|
|
|
|
dpif_flow_get(const struct dpif *dpif, struct odp_flow *flow)
|
2009-07-08 13:19:16 -07:00
|
|
|
|
{
|
2009-06-17 14:35:35 -07:00
|
|
|
|
int error;
|
|
|
|
|
|
|
|
|
|
COVERAGE_INC(dpif_flow_get);
|
|
|
|
|
|
|
|
|
|
check_rw_odp_flow(flow);
|
2010-01-22 15:14:01 -08:00
|
|
|
|
error = dpif->dpif_class->flow_get(dpif, flow, 1);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
if (!error) {
|
|
|
|
|
error = flow->stats.error;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
2010-04-13 16:49:22 -07:00
|
|
|
|
if (error) {
|
|
|
|
|
/* Make the results predictable on error. */
|
|
|
|
|
memset(&flow->stats, 0, sizeof flow->stats);
|
|
|
|
|
flow->n_actions = 0;
|
|
|
|
|
}
|
2009-06-17 14:35:35 -07:00
|
|
|
|
if (should_log_flow_message(error)) {
|
|
|
|
|
log_flow_operation(dpif, "flow_get", error, flow);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
2009-06-17 14:35:35 -07:00
|
|
|
|
return error;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* For each flow 'flow' in the 'n' flows in 'flows':
|
|
|
|
|
*
|
|
|
|
|
* - If a flow matching 'flow->key' exists in 'dpif':
|
|
|
|
|
*
|
|
|
|
|
* Stores 0 into 'flow->stats.error' and stores statistics for the flow
|
|
|
|
|
* into 'flow->stats'.
|
|
|
|
|
*
|
|
|
|
|
* If 'flow->n_actions' is zero, then 'flow->actions' is ignored. If
|
|
|
|
|
* 'flow->n_actions' is nonzero, then 'flow->actions' should point to an
|
|
|
|
|
* array of the specified number of actions. At most that many of the
|
|
|
|
|
* flow's actions will be copied into that array. 'flow->n_actions' will
|
|
|
|
|
* be updated to the number of actions actually present in the flow, which
|
|
|
|
|
* may be greater than the number stored if the flow has more actions than
|
|
|
|
|
* space available in the array.
|
|
|
|
|
*
|
|
|
|
|
* - Flow-specific errors are indicated by a positive errno value in
|
|
|
|
|
* 'flow->stats.error'. In particular, ENOENT indicates that no flow
|
|
|
|
|
* matching 'flow->key' exists in 'dpif'. When an error value is stored, the
|
|
|
|
|
* contents of 'flow->key' are preserved but other members of 'flow' should
|
|
|
|
|
* be treated as indeterminate.
|
|
|
|
|
*
|
|
|
|
|
* Returns 0 if all 'n' flows in 'flows' were updated (whether they were
|
|
|
|
|
* individually successful or not is indicated by 'flow->stats.error',
|
|
|
|
|
* however). Returns a positive errno value if an error that prevented this
|
|
|
|
|
* update occurred, in which the caller must not depend on any elements in
|
|
|
|
|
* 'flows' being updated or not updated.
|
|
|
|
|
*/
|
|
|
|
|
int
|
|
|
|
|
dpif_flow_get_multiple(const struct dpif *dpif,
|
|
|
|
|
struct odp_flow flows[], size_t n)
|
2009-07-08 13:19:16 -07:00
|
|
|
|
{
|
2009-06-17 14:35:35 -07:00
|
|
|
|
int error;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
COVERAGE_ADD(dpif_flow_get, n);
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < n; i++) {
|
|
|
|
|
check_rw_odp_flow(&flows[i]);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
2009-06-17 14:35:35 -07:00
|
|
|
|
|
2010-01-22 15:14:01 -08:00
|
|
|
|
error = dpif->dpif_class->flow_get(dpif, flows, n);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
log_operation(dpif, "flow_get_multiple", error);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Adds or modifies a flow in 'dpif' as specified in 'put':
|
|
|
|
|
*
|
|
|
|
|
* - If the flow specified in 'put->flow' does not exist in 'dpif', then
|
|
|
|
|
* behavior depends on whether ODPPF_CREATE is specified in 'put->flags': if
|
|
|
|
|
* it is, the flow will be added, otherwise the operation will fail with
|
|
|
|
|
* ENOENT.
|
|
|
|
|
*
|
|
|
|
|
* - Otherwise, the flow specified in 'put->flow' does exist in 'dpif'.
|
|
|
|
|
* Behavior in this case depends on whether ODPPF_MODIFY is specified in
|
|
|
|
|
* 'put->flags': if it is, the flow's actions will be updated, otherwise the
|
|
|
|
|
* operation will fail with EEXIST. If the flow's actions are updated, then
|
|
|
|
|
* its statistics will be zeroed if ODPPF_ZERO_STATS is set in 'put->flags',
|
|
|
|
|
* left as-is otherwise.
|
|
|
|
|
*
|
|
|
|
|
* Returns 0 if successful, otherwise a positive errno value.
|
|
|
|
|
*/
|
2009-07-08 13:19:16 -07:00
|
|
|
|
int
|
|
|
|
|
dpif_flow_put(struct dpif *dpif, struct odp_flow_put *put)
|
|
|
|
|
{
|
2009-06-17 14:35:35 -07:00
|
|
|
|
int error;
|
|
|
|
|
|
2009-07-08 13:19:16 -07:00
|
|
|
|
COVERAGE_INC(dpif_flow_put);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
|
2010-01-22 15:14:01 -08:00
|
|
|
|
error = dpif->dpif_class->flow_put(dpif, put);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
if (should_log_flow_message(error)) {
|
2009-06-17 14:35:35 -07:00
|
|
|
|
log_flow_put(dpif, error, put);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Deletes a flow matching 'flow->key' from 'dpif' or returns ENOENT if 'dpif'
|
|
|
|
|
* does not contain such a flow.
|
|
|
|
|
*
|
|
|
|
|
* If successful, updates 'flow->stats', 'flow->n_actions', and 'flow->actions'
|
|
|
|
|
* as described for dpif_flow_get(). */
|
2009-07-08 13:19:16 -07:00
|
|
|
|
int
|
|
|
|
|
dpif_flow_del(struct dpif *dpif, struct odp_flow *flow)
|
|
|
|
|
{
|
2009-06-17 12:41:30 -07:00
|
|
|
|
int error;
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
COVERAGE_INC(dpif_flow_del);
|
2009-06-17 12:41:30 -07:00
|
|
|
|
|
2009-07-08 13:19:16 -07:00
|
|
|
|
check_rw_odp_flow(flow);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
memset(&flow->stats, 0, sizeof flow->stats);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
|
2010-01-22 15:14:01 -08:00
|
|
|
|
error = dpif->dpif_class->flow_del(dpif, flow);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
if (should_log_flow_message(error)) {
|
|
|
|
|
log_flow_operation(dpif, "delete flow", error, flow);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
2009-06-17 14:35:35 -07:00
|
|
|
|
return error;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Stores up to 'n' flows in 'dpif' into 'flows', including their statistics
|
|
|
|
|
* but not including any information about their actions. If successful,
|
|
|
|
|
* returns 0 and sets '*n_out' to the number of flows actually present in
|
|
|
|
|
* 'dpif', which might be greater than the number stored (if 'dpif' has more
|
|
|
|
|
* than 'n' flows). On failure, returns a negative errno value and sets
|
|
|
|
|
* '*n_out' to 0. */
|
2009-07-08 13:19:16 -07:00
|
|
|
|
int
|
|
|
|
|
dpif_flow_list(const struct dpif *dpif, struct odp_flow flows[], size_t n,
|
|
|
|
|
size_t *n_out)
|
|
|
|
|
{
|
|
|
|
|
uint32_t i;
|
2009-06-17 14:35:35 -07:00
|
|
|
|
int retval;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
|
|
|
|
|
COVERAGE_INC(dpif_flow_query_list);
|
|
|
|
|
if (RUNNING_ON_VALGRIND) {
|
|
|
|
|
memset(flows, 0, n * sizeof *flows);
|
|
|
|
|
} else {
|
|
|
|
|
for (i = 0; i < n; i++) {
|
|
|
|
|
flows[i].actions = NULL;
|
|
|
|
|
flows[i].n_actions = 0;
|
|
|
|
|
}
|
|
|
|
|
}
|
2010-01-22 15:14:01 -08:00
|
|
|
|
retval = dpif->dpif_class->flow_list(dpif, flows, n);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
if (retval < 0) {
|
2009-07-08 13:19:16 -07:00
|
|
|
|
*n_out = 0;
|
2009-06-16 11:00:22 -07:00
|
|
|
|
VLOG_WARN_RL(&error_rl, "%s: flow list failed (%s)",
|
2009-06-17 14:35:35 -07:00
|
|
|
|
dpif_name(dpif), strerror(-retval));
|
|
|
|
|
return -retval;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
} else {
|
2009-06-17 14:35:35 -07:00
|
|
|
|
COVERAGE_ADD(dpif_flow_query_list_n, retval);
|
|
|
|
|
*n_out = MIN(n, retval);
|
|
|
|
|
VLOG_DBG_RL(&dpmsg_rl, "%s: listed %zu flows (of %d)",
|
|
|
|
|
dpif_name(dpif), *n_out, retval);
|
|
|
|
|
return 0;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Retrieves all of the flows in 'dpif'.
|
|
|
|
|
*
|
|
|
|
|
* If successful, returns 0 and stores in '*flowsp' a pointer to a newly
|
|
|
|
|
* allocated array of flows, including their statistics but not including any
|
|
|
|
|
* information about their actions, and sets '*np' to the number of flows in
|
|
|
|
|
* '*flowsp'. The caller is responsible for freeing '*flowsp' by calling
|
|
|
|
|
* free().
|
|
|
|
|
*
|
|
|
|
|
* On failure, returns a positive errno value and sets '*flowsp' to NULL and
|
|
|
|
|
* '*np' to 0. */
|
2009-07-08 13:19:16 -07:00
|
|
|
|
int
|
|
|
|
|
dpif_flow_list_all(const struct dpif *dpif,
|
|
|
|
|
struct odp_flow **flowsp, size_t *np)
|
|
|
|
|
{
|
|
|
|
|
struct odp_stats stats;
|
|
|
|
|
struct odp_flow *flows;
|
|
|
|
|
size_t n_flows;
|
|
|
|
|
int error;
|
|
|
|
|
|
|
|
|
|
*flowsp = NULL;
|
|
|
|
|
*np = 0;
|
|
|
|
|
|
|
|
|
|
error = dpif_get_dp_stats(dpif, &stats);
|
|
|
|
|
if (error) {
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
flows = xmalloc(sizeof *flows * stats.n_flows);
|
|
|
|
|
error = dpif_flow_list(dpif, flows, stats.n_flows, &n_flows);
|
|
|
|
|
if (error) {
|
|
|
|
|
free(flows);
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (stats.n_flows != n_flows) {
|
2009-06-16 11:00:22 -07:00
|
|
|
|
VLOG_WARN_RL(&error_rl, "%s: datapath stats reported %"PRIu32" "
|
2009-07-08 13:19:16 -07:00
|
|
|
|
"flows but flow listing reported %zu",
|
2009-06-16 11:00:22 -07:00
|
|
|
|
dpif_name(dpif), stats.n_flows, n_flows);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
*flowsp = flows;
|
|
|
|
|
*np = n_flows;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Causes 'dpif' to perform the 'n_actions' actions in 'actions' on the
|
|
|
|
|
* Ethernet frame specified in 'packet'.
|
|
|
|
|
*
|
|
|
|
|
* Returns 0 if successful, otherwise a positive errno value. */
|
2009-07-08 13:19:16 -07:00
|
|
|
|
int
|
2010-10-08 16:36:13 -07:00
|
|
|
|
dpif_execute(struct dpif *dpif,
|
2009-07-08 13:19:16 -07:00
|
|
|
|
const union odp_action actions[], size_t n_actions,
|
|
|
|
|
const struct ofpbuf *buf)
|
|
|
|
|
{
|
|
|
|
|
int error;
|
|
|
|
|
|
|
|
|
|
COVERAGE_INC(dpif_execute);
|
|
|
|
|
if (n_actions > 0) {
|
2010-10-08 16:36:13 -07:00
|
|
|
|
error = dpif->dpif_class->execute(dpif, actions, n_actions, buf);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
} else {
|
|
|
|
|
error = 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!(error ? VLOG_DROP_WARN(&error_rl) : VLOG_DROP_DBG(&dpmsg_rl))) {
|
|
|
|
|
struct ds ds = DS_EMPTY_INITIALIZER;
|
|
|
|
|
char *packet = ofp_packet_to_string(buf->data, buf->size, buf->size);
|
2009-06-16 11:00:22 -07:00
|
|
|
|
ds_put_format(&ds, "%s: execute ", dpif_name(dpif));
|
2009-07-08 13:19:16 -07:00
|
|
|
|
format_odp_actions(&ds, actions, n_actions);
|
|
|
|
|
if (error) {
|
|
|
|
|
ds_put_format(&ds, " failed (%s)", strerror(error));
|
|
|
|
|
}
|
|
|
|
|
ds_put_format(&ds, " on packet %s", packet);
|
|
|
|
|
vlog(THIS_MODULE, error ? VLL_WARN : VLL_DBG, "%s", ds_cstr(&ds));
|
|
|
|
|
ds_destroy(&ds);
|
|
|
|
|
free(packet);
|
|
|
|
|
}
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Retrieves 'dpif''s "listen mask" into '*listen_mask'. Each ODPL_* bit set
|
|
|
|
|
* in '*listen_mask' indicates that dpif_recv() will receive messages of that
|
|
|
|
|
* type. Returns 0 if successful, otherwise a positive errno value. */
|
2009-06-17 14:18:10 -07:00
|
|
|
|
int
|
|
|
|
|
dpif_recv_get_mask(const struct dpif *dpif, int *listen_mask)
|
|
|
|
|
{
|
2010-01-22 15:14:01 -08:00
|
|
|
|
int error = dpif->dpif_class->recv_get_mask(dpif, listen_mask);
|
2009-06-17 14:18:10 -07:00
|
|
|
|
if (error) {
|
|
|
|
|
*listen_mask = 0;
|
|
|
|
|
}
|
2009-06-17 14:35:35 -07:00
|
|
|
|
log_operation(dpif, "recv_get_mask", error);
|
2009-06-17 14:18:10 -07:00
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Sets 'dpif''s "listen mask" to 'listen_mask'. Each ODPL_* bit set in
|
|
|
|
|
* '*listen_mask' requests that dpif_recv() receive messages of that type.
|
|
|
|
|
* Returns 0 if successful, otherwise a positive errno value. */
|
2009-06-17 14:18:10 -07:00
|
|
|
|
int
|
|
|
|
|
dpif_recv_set_mask(struct dpif *dpif, int listen_mask)
|
|
|
|
|
{
|
2010-01-22 15:14:01 -08:00
|
|
|
|
int error = dpif->dpif_class->recv_set_mask(dpif, listen_mask);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
log_operation(dpif, "recv_set_mask", error);
|
|
|
|
|
return error;
|
2009-06-17 14:18:10 -07:00
|
|
|
|
}
|
|
|
|
|
|
2010-01-08 16:44:43 -08:00
|
|
|
|
/* Retrieve the sFlow sampling probability. '*probability' is expressed as the
|
|
|
|
|
* number of packets out of UINT_MAX to sample, e.g. probability/UINT_MAX is
|
|
|
|
|
* the probability of sampling a given packet.
|
2010-01-04 13:08:37 -08:00
|
|
|
|
*
|
|
|
|
|
* Returns 0 if successful, otherwise a positive errno value. EOPNOTSUPP
|
|
|
|
|
* indicates that 'dpif' does not support sFlow sampling. */
|
|
|
|
|
int
|
|
|
|
|
dpif_get_sflow_probability(const struct dpif *dpif, uint32_t *probability)
|
|
|
|
|
{
|
2010-01-25 10:52:28 -08:00
|
|
|
|
int error = (dpif->dpif_class->get_sflow_probability
|
|
|
|
|
? dpif->dpif_class->get_sflow_probability(dpif, probability)
|
2010-01-04 13:08:37 -08:00
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
if (error) {
|
|
|
|
|
*probability = 0;
|
|
|
|
|
}
|
|
|
|
|
log_operation(dpif, "get_sflow_probability", error);
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-08 16:44:43 -08:00
|
|
|
|
/* Set the sFlow sampling probability. 'probability' is expressed as the
|
|
|
|
|
* number of packets out of UINT_MAX to sample, e.g. probability/UINT_MAX is
|
|
|
|
|
* the probability of sampling a given packet.
|
2010-01-04 13:08:37 -08:00
|
|
|
|
*
|
|
|
|
|
* Returns 0 if successful, otherwise a positive errno value. EOPNOTSUPP
|
|
|
|
|
* indicates that 'dpif' does not support sFlow sampling. */
|
|
|
|
|
int
|
|
|
|
|
dpif_set_sflow_probability(struct dpif *dpif, uint32_t probability)
|
|
|
|
|
{
|
2010-01-25 10:52:28 -08:00
|
|
|
|
int error = (dpif->dpif_class->set_sflow_probability
|
|
|
|
|
? dpif->dpif_class->set_sflow_probability(dpif, probability)
|
2010-01-04 13:08:37 -08:00
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
log_operation(dpif, "set_sflow_probability", error);
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Attempts to receive a message from 'dpif'. If successful, stores the
|
|
|
|
|
* message into '*packetp'. The message, if one is received, will begin with
|
2010-04-27 09:40:46 -07:00
|
|
|
|
* 'struct odp_msg' as a header, and will have at least DPIF_RECV_MSG_PADDING
|
|
|
|
|
* bytes of headroom. Only messages of the types selected with
|
2009-06-17 14:35:35 -07:00
|
|
|
|
* dpif_set_listen_mask() will ordinarily be received (but if a message type is
|
|
|
|
|
* enabled and then later disabled, some stragglers might pop up).
|
|
|
|
|
*
|
|
|
|
|
* Returns 0 if successful, otherwise a positive errno value. Returns EAGAIN
|
|
|
|
|
* if no message is immediately available. */
|
2009-07-08 13:19:16 -07:00
|
|
|
|
int
|
2009-06-17 14:35:35 -07:00
|
|
|
|
dpif_recv(struct dpif *dpif, struct ofpbuf **packetp)
|
2009-07-08 13:19:16 -07:00
|
|
|
|
{
|
2010-01-22 15:14:01 -08:00
|
|
|
|
int error = dpif->dpif_class->recv(dpif, packetp);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
if (!error) {
|
2010-04-27 09:40:46 -07:00
|
|
|
|
struct ofpbuf *buf = *packetp;
|
|
|
|
|
|
|
|
|
|
assert(ofpbuf_headroom(buf) >= DPIF_RECV_MSG_PADDING);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
if (VLOG_IS_DBG_ENABLED()) {
|
|
|
|
|
struct odp_msg *msg = buf->data;
|
|
|
|
|
void *payload = msg + 1;
|
|
|
|
|
size_t payload_len = buf->size - sizeof *msg;
|
|
|
|
|
char *s = ofp_packet_to_string(payload, payload_len, payload_len);
|
|
|
|
|
VLOG_DBG_RL(&dpmsg_rl, "%s: received %s message of length "
|
|
|
|
|
"%zu on port %"PRIu16": %s", dpif_name(dpif),
|
|
|
|
|
(msg->type == _ODPL_MISS_NR ? "miss"
|
|
|
|
|
: msg->type == _ODPL_ACTION_NR ? "action"
|
2010-01-04 13:08:37 -08:00
|
|
|
|
: msg->type == _ODPL_SFLOW_NR ? "sFlow"
|
2009-06-17 14:35:35 -07:00
|
|
|
|
: "<unknown>"),
|
|
|
|
|
payload_len, msg->port, s);
|
|
|
|
|
free(s);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
} else {
|
2009-06-17 14:35:35 -07:00
|
|
|
|
*packetp = NULL;
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Discards all messages that would otherwise be received by dpif_recv() on
|
|
|
|
|
* 'dpif'. Returns 0 if successful, otherwise a positive errno value. */
|
|
|
|
|
int
|
|
|
|
|
dpif_recv_purge(struct dpif *dpif)
|
|
|
|
|
{
|
|
|
|
|
struct odp_stats stats;
|
|
|
|
|
unsigned int i;
|
|
|
|
|
int error;
|
|
|
|
|
|
|
|
|
|
COVERAGE_INC(dpif_purge);
|
|
|
|
|
|
|
|
|
|
error = dpif_get_dp_stats(dpif, &stats);
|
|
|
|
|
if (error) {
|
|
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-04 13:08:37 -08:00
|
|
|
|
for (i = 0; i < stats.max_miss_queue + stats.max_action_queue + stats.max_sflow_queue; i++) {
|
2009-06-17 14:35:35 -07:00
|
|
|
|
struct ofpbuf *buf;
|
|
|
|
|
error = dpif_recv(dpif, &buf);
|
|
|
|
|
if (error) {
|
|
|
|
|
return error == EAGAIN ? 0 : error;
|
|
|
|
|
}
|
|
|
|
|
ofpbuf_delete(buf);
|
|
|
|
|
}
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Arranges for the poll loop to wake up when 'dpif' has a message queued to be
|
|
|
|
|
* received with dpif_recv(). */
|
2009-07-08 13:19:16 -07:00
|
|
|
|
void
|
|
|
|
|
dpif_recv_wait(struct dpif *dpif)
|
|
|
|
|
{
|
2010-01-22 15:14:01 -08:00
|
|
|
|
dpif->dpif_class->recv_wait(dpif);
|
2009-07-08 13:19:16 -07:00
|
|
|
|
}
|
2009-06-16 10:59:43 -07:00
|
|
|
|
|
2009-06-17 14:35:35 -07:00
|
|
|
|
/* Obtains the NetFlow engine type and engine ID for 'dpif' into '*engine_type'
|
|
|
|
|
* and '*engine_id', respectively. */
|
2009-06-16 10:59:43 -07:00
|
|
|
|
void
|
|
|
|
|
dpif_get_netflow_ids(const struct dpif *dpif,
|
|
|
|
|
uint8_t *engine_type, uint8_t *engine_id)
|
|
|
|
|
{
|
2009-06-17 14:35:35 -07:00
|
|
|
|
*engine_type = dpif->netflow_engine_type;
|
|
|
|
|
*engine_id = dpif->netflow_engine_id;
|
|
|
|
|
}
|
2010-07-20 11:23:21 -07:00
|
|
|
|
|
|
|
|
|
/* Translates OpenFlow queue ID 'queue_id' (in host byte order) into a priority
|
|
|
|
|
* value for use in the ODPAT_SET_PRIORITY action. On success, returns 0 and
|
|
|
|
|
* stores the priority into '*priority'. On failure, returns a positive errno
|
|
|
|
|
* value and stores 0 into '*priority'. */
|
|
|
|
|
int
|
|
|
|
|
dpif_queue_to_priority(const struct dpif *dpif, uint32_t queue_id,
|
|
|
|
|
uint32_t *priority)
|
|
|
|
|
{
|
|
|
|
|
int error = (dpif->dpif_class->queue_to_priority
|
|
|
|
|
? dpif->dpif_class->queue_to_priority(dpif, queue_id,
|
|
|
|
|
priority)
|
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
if (error) {
|
|
|
|
|
*priority = 0;
|
|
|
|
|
}
|
|
|
|
|
log_operation(dpif, "queue_to_priority", error);
|
|
|
|
|
return error;
|
|
|
|
|
}
|
2009-06-17 14:35:35 -07:00
|
|
|
|
|
|
|
|
|
void
|
2010-01-22 15:14:01 -08:00
|
|
|
|
dpif_init(struct dpif *dpif, const struct dpif_class *dpif_class,
|
|
|
|
|
const char *name,
|
2009-06-17 14:35:35 -07:00
|
|
|
|
uint8_t netflow_engine_type, uint8_t netflow_engine_id)
|
|
|
|
|
{
|
2010-01-22 15:14:01 -08:00
|
|
|
|
dpif->dpif_class = dpif_class;
|
2010-01-22 14:37:10 -05:00
|
|
|
|
dpif->base_name = xstrdup(name);
|
2010-02-05 15:58:27 -08:00
|
|
|
|
dpif->full_name = xasprintf("%s@%s", dpif_class->type, name);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
dpif->netflow_engine_type = netflow_engine_type;
|
|
|
|
|
dpif->netflow_engine_id = netflow_engine_id;
|
|
|
|
|
}
|
2010-02-01 11:36:01 -05:00
|
|
|
|
|
|
|
|
|
/* Undoes the results of initialization.
|
|
|
|
|
*
|
|
|
|
|
* Normally this function only needs to be called from dpif_close().
|
|
|
|
|
* However, it may be called by providers due to an error on opening
|
|
|
|
|
* that occurs after initialization. It this case dpif_close() would
|
|
|
|
|
* never be called. */
|
|
|
|
|
void
|
|
|
|
|
dpif_uninit(struct dpif *dpif, bool close)
|
|
|
|
|
{
|
|
|
|
|
char *base_name = dpif->base_name;
|
|
|
|
|
char *full_name = dpif->full_name;
|
|
|
|
|
|
|
|
|
|
if (close) {
|
2010-02-05 15:58:27 -08:00
|
|
|
|
dpif->dpif_class->close(dpif);
|
2010-02-01 11:36:01 -05:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
free(base_name);
|
|
|
|
|
free(full_name);
|
|
|
|
|
}
|
2009-06-17 14:35:35 -07:00
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
log_operation(const struct dpif *dpif, const char *operation, int error)
|
|
|
|
|
{
|
|
|
|
|
if (!error) {
|
|
|
|
|
VLOG_DBG_RL(&dpmsg_rl, "%s: %s success", dpif_name(dpif), operation);
|
2010-10-19 09:55:40 -07:00
|
|
|
|
} else if (is_errno(error)) {
|
2009-06-17 14:35:35 -07:00
|
|
|
|
VLOG_WARN_RL(&error_rl, "%s: %s failed (%s)",
|
|
|
|
|
dpif_name(dpif), operation, strerror(error));
|
2010-10-19 09:55:40 -07:00
|
|
|
|
} else {
|
|
|
|
|
VLOG_WARN_RL(&error_rl, "%s: %s failed (%d/%d)",
|
|
|
|
|
dpif_name(dpif), operation,
|
|
|
|
|
get_ofp_err_type(error), get_ofp_err_code(error));
|
2009-06-17 14:35:35 -07:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static enum vlog_level
|
|
|
|
|
flow_message_log_level(int error)
|
|
|
|
|
{
|
|
|
|
|
return error ? VLL_WARN : VLL_DBG;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static bool
|
|
|
|
|
should_log_flow_message(int error)
|
|
|
|
|
{
|
|
|
|
|
return !vlog_should_drop(THIS_MODULE, flow_message_log_level(error),
|
|
|
|
|
error ? &error_rl : &dpmsg_rl);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
log_flow_message(const struct dpif *dpif, int error, const char *operation,
|
2010-10-11 13:31:35 -07:00
|
|
|
|
const struct odp_flow_key *flow,
|
|
|
|
|
const struct odp_flow_stats *stats,
|
2009-06-17 14:35:35 -07:00
|
|
|
|
const union odp_action *actions, size_t n_actions)
|
|
|
|
|
{
|
|
|
|
|
struct ds ds = DS_EMPTY_INITIALIZER;
|
|
|
|
|
ds_put_format(&ds, "%s: ", dpif_name(dpif));
|
|
|
|
|
if (error) {
|
|
|
|
|
ds_put_cstr(&ds, "failed to ");
|
|
|
|
|
}
|
|
|
|
|
ds_put_format(&ds, "%s ", operation);
|
|
|
|
|
if (error) {
|
|
|
|
|
ds_put_format(&ds, "(%s) ", strerror(error));
|
|
|
|
|
}
|
2010-10-11 13:31:35 -07:00
|
|
|
|
format_odp_flow_key(&ds, flow);
|
2009-06-17 14:35:35 -07:00
|
|
|
|
if (stats) {
|
|
|
|
|
ds_put_cstr(&ds, ", ");
|
|
|
|
|
format_odp_flow_stats(&ds, stats);
|
|
|
|
|
}
|
|
|
|
|
if (actions || n_actions) {
|
|
|
|
|
ds_put_cstr(&ds, ", actions:");
|
|
|
|
|
format_odp_actions(&ds, actions, n_actions);
|
|
|
|
|
}
|
|
|
|
|
vlog(THIS_MODULE, flow_message_log_level(error), "%s", ds_cstr(&ds));
|
|
|
|
|
ds_destroy(&ds);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
log_flow_operation(const struct dpif *dpif, const char *operation, int error,
|
|
|
|
|
struct odp_flow *flow)
|
|
|
|
|
{
|
|
|
|
|
if (error) {
|
|
|
|
|
flow->n_actions = 0;
|
|
|
|
|
}
|
|
|
|
|
log_flow_message(dpif, error, operation, &flow->key,
|
|
|
|
|
!error ? &flow->stats : NULL,
|
|
|
|
|
flow->actions, flow->n_actions);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
log_flow_put(struct dpif *dpif, int error, const struct odp_flow_put *put)
|
|
|
|
|
{
|
|
|
|
|
enum { ODPPF_ALL = ODPPF_CREATE | ODPPF_MODIFY | ODPPF_ZERO_STATS };
|
|
|
|
|
struct ds s;
|
|
|
|
|
|
|
|
|
|
ds_init(&s);
|
|
|
|
|
ds_put_cstr(&s, "put");
|
|
|
|
|
if (put->flags & ODPPF_CREATE) {
|
|
|
|
|
ds_put_cstr(&s, "[create]");
|
|
|
|
|
}
|
|
|
|
|
if (put->flags & ODPPF_MODIFY) {
|
|
|
|
|
ds_put_cstr(&s, "[modify]");
|
|
|
|
|
}
|
|
|
|
|
if (put->flags & ODPPF_ZERO_STATS) {
|
|
|
|
|
ds_put_cstr(&s, "[zero]");
|
|
|
|
|
}
|
|
|
|
|
if (put->flags & ~ODPPF_ALL) {
|
|
|
|
|
ds_put_format(&s, "[%x]", put->flags & ~ODPPF_ALL);
|
|
|
|
|
}
|
|
|
|
|
log_flow_message(dpif, error, ds_cstr(&s), &put->flow.key,
|
|
|
|
|
!error ? &put->flow.stats : NULL,
|
|
|
|
|
put->flow.actions, put->flow.n_actions);
|
|
|
|
|
ds_destroy(&s);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* There is a tendency to construct odp_flow objects on the stack and to
|
|
|
|
|
* forget to properly initialize their "actions" and "n_actions" members.
|
|
|
|
|
* When this happens, we get memory corruption because the kernel
|
|
|
|
|
* writes through the random pointer that is in the "actions" member.
|
|
|
|
|
*
|
|
|
|
|
* This function attempts to combat the problem by:
|
|
|
|
|
*
|
|
|
|
|
* - Forcing a segfault if "actions" points to an invalid region (instead
|
|
|
|
|
* of just getting back EFAULT, which can be easily missed in the log).
|
|
|
|
|
*
|
|
|
|
|
* - Storing a distinctive value that is likely to cause an
|
|
|
|
|
* easy-to-identify error later if it is dereferenced, etc.
|
|
|
|
|
*
|
|
|
|
|
* - Triggering a warning on uninitialized memory from Valgrind if
|
|
|
|
|
* "actions" or "n_actions" was not initialized.
|
|
|
|
|
*/
|
|
|
|
|
static void
|
|
|
|
|
check_rw_odp_flow(struct odp_flow *flow)
|
|
|
|
|
{
|
|
|
|
|
if (flow->n_actions) {
|
|
|
|
|
memset(&flow->actions[0], 0xcc, sizeof flow->actions[0]);
|
|
|
|
|
}
|
2009-06-16 10:59:43 -07:00
|
|
|
|
}
|