]> git.proxmox.com Git - mirror_ovs.git/blame - lib/dpif.c
Add support for connection tracking.
[mirror_ovs.git] / lib / dpif.c
CommitLineData
064af421 1/*
c4ea7529 2 * Copyright (c) 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015 Nicira, Inc.
064af421 3 *
a14bc59f
BP
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at:
064af421 7 *
a14bc59f
BP
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
064af421
BP
15 */
16
17#include <config.h>
96fba48f 18#include "dpif-provider.h"
064af421 19
064af421
BP
20#include <ctype.h>
21#include <errno.h>
064af421 22#include <inttypes.h>
064af421
BP
23#include <stdlib.h>
24#include <string.h>
064af421
BP
25
26#include "coverage.h"
fceef209 27#include "dpctl.h"
e14deea0 28#include "dp-packet.h"
c4ea7529 29#include "dpif-netdev.h"
064af421
BP
30#include "dynamic-string.h"
31#include "flow.h"
c3827f61 32#include "netdev.h"
064af421 33#include "netlink.h"
7fd91025 34#include "odp-execute.h"
064af421 35#include "odp-util.h"
90bf1e07 36#include "ofp-errors.h"
064af421 37#include "ofp-print.h"
71ce9235 38#include "ofp-util.h"
064af421
BP
39#include "ofpbuf.h"
40#include "packets.h"
41#include "poll-loop.h"
1bc50ef3 42#include "route-table.h"
36f29fb1 43#include "seq.h"
999401aa 44#include "shash.h"
d0c23a1a 45#include "sset.h"
c97fb132 46#include "timeval.h"
a36de779
PS
47#include "tnl-arp-cache.h"
48#include "tnl-ports.h"
064af421 49#include "util.h"
78145f6e 50#include "uuid.h"
064af421 51#include "valgrind.h"
e6211adc 52#include "openvswitch/vlog.h"
5136ce49 53
d98e6007 54VLOG_DEFINE_THIS_MODULE(dpif);
064af421 55
d76f09ea
BP
56COVERAGE_DEFINE(dpif_destroy);
57COVERAGE_DEFINE(dpif_port_add);
58COVERAGE_DEFINE(dpif_port_del);
59COVERAGE_DEFINE(dpif_flow_flush);
60COVERAGE_DEFINE(dpif_flow_get);
61COVERAGE_DEFINE(dpif_flow_put);
62COVERAGE_DEFINE(dpif_flow_del);
d76f09ea
BP
63COVERAGE_DEFINE(dpif_execute);
64COVERAGE_DEFINE(dpif_purge);
7fd91025 65COVERAGE_DEFINE(dpif_execute_with_help);
d76f09ea 66
999401aa 67static const struct dpif_class *base_dpif_classes[] = {
93451a0a
AS
68#if defined(__linux__) || defined(_WIN32)
69 &dpif_netlink_class,
c83cdd30 70#endif
72865317 71 &dpif_netdev_class,
c228a364 72};
999401aa
JG
73
74struct registered_dpif_class {
d2d8fbeb 75 const struct dpif_class *dpif_class;
999401aa
JG
76 int refcount;
77};
78static struct shash dpif_classes = SHASH_INITIALIZER(&dpif_classes);
579a77e0 79static struct sset dpif_blacklist = SSET_INITIALIZER(&dpif_blacklist);
c228a364 80
5703b15f 81/* Protects 'dpif_classes', including the refcount, and 'dpif_blacklist'. */
97be1538 82static struct ovs_mutex dpif_mutex = OVS_MUTEX_INITIALIZER;
5703b15f 83
064af421
BP
84/* Rate limit for individual messages going to or from the datapath, output at
85 * DBG level. This is very high because, if these are enabled, it is because
86 * we really need to see them. */
87static struct vlog_rate_limit dpmsg_rl = VLOG_RATE_LIMIT_INIT(600, 600);
88
89/* Not really much point in logging many dpif errors. */
e2781405 90static struct vlog_rate_limit error_rl = VLOG_RATE_LIMIT_INIT(60, 5);
064af421 91
feebdea2
BP
92static void log_flow_message(const struct dpif *dpif, int error,
93 const char *operation,
94 const struct nlattr *key, size_t key_len,
61fb711d 95 const struct nlattr *mask, size_t mask_len,
70e5ed6f 96 const ovs_u128 *ufid,
c97fb132 97 const struct dpif_flow_stats *stats,
feebdea2 98 const struct nlattr *actions, size_t actions_len);
96fba48f
BP
99static void log_operation(const struct dpif *, const char *operation,
100 int error);
96fba48f 101static bool should_log_flow_message(int error);
89625d1e
BP
102static void log_flow_put_message(struct dpif *, const struct dpif_flow_put *,
103 int error);
b99d3cee
BP
104static void log_flow_del_message(struct dpif *, const struct dpif_flow_del *,
105 int error);
89625d1e 106static void log_execute_message(struct dpif *, const struct dpif_execute *,
fc65bafc 107 bool subexecute, int error);
6fe09f8c
JS
108static void log_flow_get_message(const struct dpif *,
109 const struct dpif_flow_get *, int error);
064af421 110
36f29fb1
PS
111/* Incremented whenever tnl route, arp, etc changes. */
112struct seq *tnl_conf_seq;
113
999401aa
JG
114static void
115dp_initialize(void)
116{
eb8ed438 117 static struct ovsthread_once once = OVSTHREAD_ONCE_INITIALIZER;
999401aa 118
eb8ed438 119 if (ovsthread_once_start(&once)) {
999401aa
JG
120 int i;
121
36f29fb1 122 tnl_conf_seq = seq_create();
fceef209 123 dpctl_unixctl_register();
a36de779
PS
124 tnl_port_map_init();
125 tnl_arp_cache_init();
b772066f 126 route_table_init();
1bc50ef3 127
36f29fb1
PS
128 for (i = 0; i < ARRAY_SIZE(base_dpif_classes); i++) {
129 dp_register_provider(base_dpif_classes[i]);
130 }
131
1bc50ef3 132 ovsthread_once_done(&once);
999401aa
JG
133 }
134}
135
5703b15f
BP
136static int
137dp_register_provider__(const struct dpif_class *new_class)
999401aa
JG
138{
139 struct registered_dpif_class *registered_class;
c8973eb6 140 int error;
999401aa 141
579a77e0
EJ
142 if (sset_contains(&dpif_blacklist, new_class->type)) {
143 VLOG_DBG("attempted to register blacklisted provider: %s",
144 new_class->type);
145 return EINVAL;
146 }
147
999401aa
JG
148 if (shash_find(&dpif_classes, new_class->type)) {
149 VLOG_WARN("attempted to register duplicate datapath provider: %s",
150 new_class->type);
151 return EEXIST;
152 }
1a6f1e2a 153
c8973eb6
DDP
154 error = new_class->init ? new_class->init() : 0;
155 if (error) {
156 VLOG_WARN("failed to initialize %s datapath class: %s",
157 new_class->type, ovs_strerror(error));
158 return error;
159 }
160
999401aa 161 registered_class = xmalloc(sizeof *registered_class);
d2d8fbeb 162 registered_class->dpif_class = new_class;
999401aa
JG
163 registered_class->refcount = 0;
164
165 shash_add(&dpif_classes, new_class->type, registered_class);
166
167 return 0;
168}
169
5703b15f
BP
170/* Registers a new datapath provider. After successful registration, new
171 * datapaths of that type can be opened using dpif_open(). */
172int
173dp_register_provider(const struct dpif_class *new_class)
174{
175 int error;
176
97be1538 177 ovs_mutex_lock(&dpif_mutex);
5703b15f 178 error = dp_register_provider__(new_class);
97be1538 179 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
180
181 return error;
182}
183
999401aa
JG
184/* Unregisters a datapath provider. 'type' must have been previously
185 * registered and not currently be in use by any dpifs. After unregistration
186 * new datapaths of that type cannot be opened using dpif_open(). */
5703b15f
BP
187static int
188dp_unregister_provider__(const char *type)
999401aa
JG
189{
190 struct shash_node *node;
191 struct registered_dpif_class *registered_class;
192
193 node = shash_find(&dpif_classes, type);
194 if (!node) {
195 VLOG_WARN("attempted to unregister a datapath provider that is not "
196 "registered: %s", type);
197 return EAFNOSUPPORT;
198 }
199
200 registered_class = node->data;
201 if (registered_class->refcount) {
202 VLOG_WARN("attempted to unregister in use datapath provider: %s", type);
203 return EBUSY;
204 }
205
206 shash_delete(&dpif_classes, node);
207 free(registered_class);
208
209 return 0;
210}
211
5703b15f
BP
212/* Unregisters a datapath provider. 'type' must have been previously
213 * registered and not currently be in use by any dpifs. After unregistration
214 * new datapaths of that type cannot be opened using dpif_open(). */
215int
216dp_unregister_provider(const char *type)
217{
218 int error;
219
220 dp_initialize();
221
97be1538 222 ovs_mutex_lock(&dpif_mutex);
5703b15f 223 error = dp_unregister_provider__(type);
97be1538 224 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
225
226 return error;
227}
228
579a77e0
EJ
229/* Blacklists a provider. Causes future calls of dp_register_provider() with
230 * a dpif_class which implements 'type' to fail. */
231void
232dp_blacklist_provider(const char *type)
233{
97be1538 234 ovs_mutex_lock(&dpif_mutex);
579a77e0 235 sset_add(&dpif_blacklist, type);
97be1538 236 ovs_mutex_unlock(&dpif_mutex);
579a77e0
EJ
237}
238
5b5b11ea
BP
239/* Adds the types of all currently registered datapath providers to 'types'.
240 * The caller must first initialize the sset. */
1a6f1e2a 241void
d0c23a1a 242dp_enumerate_types(struct sset *types)
1a6f1e2a 243{
999401aa 244 struct shash_node *node;
1a6f1e2a 245
999401aa 246 dp_initialize();
1a6f1e2a 247
97be1538 248 ovs_mutex_lock(&dpif_mutex);
999401aa
JG
249 SHASH_FOR_EACH(node, &dpif_classes) {
250 const struct registered_dpif_class *registered_class = node->data;
d0c23a1a 251 sset_add(types, registered_class->dpif_class->type);
1a6f1e2a 252 }
97be1538 253 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
254}
255
256static void
257dp_class_unref(struct registered_dpif_class *rc)
258{
97be1538 259 ovs_mutex_lock(&dpif_mutex);
5703b15f
BP
260 ovs_assert(rc->refcount);
261 rc->refcount--;
97be1538 262 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
263}
264
265static struct registered_dpif_class *
266dp_class_lookup(const char *type)
267{
268 struct registered_dpif_class *rc;
269
97be1538 270 ovs_mutex_lock(&dpif_mutex);
5703b15f
BP
271 rc = shash_find_data(&dpif_classes, type);
272 if (rc) {
273 rc->refcount++;
274 }
97be1538 275 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
276
277 return rc;
1a6f1e2a
JG
278}
279
280/* Clears 'names' and enumerates the names of all known created datapaths with
d0c23a1a 281 * the given 'type'. The caller must first initialize the sset. Returns 0 if
1a6f1e2a 282 * successful, otherwise a positive errno value.
d3d22744
BP
283 *
284 * Some kinds of datapaths might not be practically enumerable. This is not
285 * considered an error. */
286int
d0c23a1a 287dp_enumerate_names(const char *type, struct sset *names)
d3d22744 288{
5703b15f 289 struct registered_dpif_class *registered_class;
999401aa
JG
290 const struct dpif_class *dpif_class;
291 int error;
d3d22744 292
999401aa 293 dp_initialize();
d0c23a1a 294 sset_clear(names);
1a6f1e2a 295
5703b15f 296 registered_class = dp_class_lookup(type);
999401aa
JG
297 if (!registered_class) {
298 VLOG_WARN("could not enumerate unknown type: %s", type);
299 return EAFNOSUPPORT;
300 }
1a6f1e2a 301
d2d8fbeb 302 dpif_class = registered_class->dpif_class;
2240af25
DDP
303 error = (dpif_class->enumerate
304 ? dpif_class->enumerate(names, dpif_class)
305 : 0);
999401aa
JG
306 if (error) {
307 VLOG_WARN("failed to enumerate %s datapaths: %s", dpif_class->type,
10a89ef0 308 ovs_strerror(error));
d3d22744 309 }
5703b15f 310 dp_class_unref(registered_class);
1a6f1e2a 311
999401aa 312 return error;
1a6f1e2a
JG
313}
314
54ed8a5d
BP
315/* Parses 'datapath_name_', which is of the form [type@]name into its
316 * component pieces. 'name' and 'type' must be freed by the caller.
317 *
318 * The returned 'type' is normalized, as if by dpif_normalize_type(). */
1a6f1e2a
JG
319void
320dp_parse_name(const char *datapath_name_, char **name, char **type)
321{
322 char *datapath_name = xstrdup(datapath_name_);
323 char *separator;
324
325 separator = strchr(datapath_name, '@');
326 if (separator) {
327 *separator = '\0';
328 *type = datapath_name;
54ed8a5d 329 *name = xstrdup(dpif_normalize_type(separator + 1));
1a6f1e2a
JG
330 } else {
331 *name = datapath_name;
54ed8a5d 332 *type = xstrdup(dpif_normalize_type(NULL));
1a6f1e2a 333 }
d3d22744
BP
334}
335
96fba48f 336static int
1a6f1e2a 337do_open(const char *name, const char *type, bool create, struct dpif **dpifp)
064af421 338{
96fba48f 339 struct dpif *dpif = NULL;
064af421 340 int error;
999401aa
JG
341 struct registered_dpif_class *registered_class;
342
343 dp_initialize();
064af421 344
3a225db7 345 type = dpif_normalize_type(type);
5703b15f 346 registered_class = dp_class_lookup(type);
999401aa
JG
347 if (!registered_class) {
348 VLOG_WARN("could not create datapath %s of unknown type %s", name,
349 type);
350 error = EAFNOSUPPORT;
351 goto exit;
352 }
353
4a387741
BP
354 error = registered_class->dpif_class->open(registered_class->dpif_class,
355 name, create, &dpif);
999401aa 356 if (!error) {
cb22974d 357 ovs_assert(dpif->dpif_class == registered_class->dpif_class);
5703b15f
BP
358 } else {
359 dp_class_unref(registered_class);
064af421 360 }
064af421 361
96fba48f
BP
362exit:
363 *dpifp = error ? NULL : dpif;
364 return error;
064af421
BP
365}
366
1a6f1e2a
JG
367/* Tries to open an existing datapath named 'name' and type 'type'. Will fail
368 * if no datapath with 'name' and 'type' exists. 'type' may be either NULL or
369 * the empty string to specify the default system type. Returns 0 if
370 * successful, otherwise a positive errno value. On success stores a pointer
371 * to the datapath in '*dpifp', otherwise a null pointer. */
96fba48f 372int
1a6f1e2a 373dpif_open(const char *name, const char *type, struct dpif **dpifp)
064af421 374{
1a6f1e2a 375 return do_open(name, type, false, dpifp);
064af421
BP
376}
377
1a6f1e2a
JG
378/* Tries to create and open a new datapath with the given 'name' and 'type'.
379 * 'type' may be either NULL or the empty string to specify the default system
380 * type. Will fail if a datapath with 'name' and 'type' already exists.
381 * Returns 0 if successful, otherwise a positive errno value. On success
382 * stores a pointer to the datapath in '*dpifp', otherwise a null pointer. */
064af421 383int
1a6f1e2a 384dpif_create(const char *name, const char *type, struct dpif **dpifp)
064af421 385{
1a6f1e2a 386 return do_open(name, type, true, dpifp);
96fba48f 387}
064af421 388
1a6f1e2a
JG
389/* Tries to open a datapath with the given 'name' and 'type', creating it if it
390 * does not exist. 'type' may be either NULL or the empty string to specify
391 * the default system type. Returns 0 if successful, otherwise a positive
392 * errno value. On success stores a pointer to the datapath in '*dpifp',
393 * otherwise a null pointer. */
efacbce6 394int
1a6f1e2a 395dpif_create_and_open(const char *name, const char *type, struct dpif **dpifp)
efacbce6
BP
396{
397 int error;
398
1a6f1e2a 399 error = dpif_create(name, type, dpifp);
efacbce6 400 if (error == EEXIST || error == EBUSY) {
1a6f1e2a 401 error = dpif_open(name, type, dpifp);
efacbce6
BP
402 if (error) {
403 VLOG_WARN("datapath %s already exists but cannot be opened: %s",
10a89ef0 404 name, ovs_strerror(error));
efacbce6
BP
405 }
406 } else if (error) {
10a89ef0
BP
407 VLOG_WARN("failed to create datapath %s: %s",
408 name, ovs_strerror(error));
efacbce6
BP
409 }
410 return error;
411}
412
96fba48f
BP
413/* Closes and frees the connection to 'dpif'. Does not destroy the datapath
414 * itself; call dpif_delete() first, instead, if that is desirable. */
415void
416dpif_close(struct dpif *dpif)
417{
418 if (dpif) {
5703b15f 419 struct registered_dpif_class *rc;
999401aa 420
5703b15f 421 rc = shash_find_data(&dpif_classes, dpif->dpif_class->type);
999401aa 422 dpif_uninit(dpif, true);
5703b15f 423 dp_class_unref(rc);
064af421
BP
424 }
425}
426
640e1b20 427/* Performs periodic work needed by 'dpif'. */
a36de779 428bool
640e1b20
BP
429dpif_run(struct dpif *dpif)
430{
431 if (dpif->dpif_class->run) {
a36de779 432 return dpif->dpif_class->run(dpif);
640e1b20 433 }
a36de779 434 return false;
640e1b20
BP
435}
436
437/* Arranges for poll_block() to wake up when dp_run() needs to be called for
438 * 'dpif'. */
439void
440dpif_wait(struct dpif *dpif)
441{
442 if (dpif->dpif_class->wait) {
443 dpif->dpif_class->wait(dpif);
444 }
445}
446
1a6f1e2a
JG
447/* Returns the name of datapath 'dpif' prefixed with the type
448 * (for use in log messages). */
b29ba128
BP
449const char *
450dpif_name(const struct dpif *dpif)
451{
1a6f1e2a
JG
452 return dpif->full_name;
453}
454
455/* Returns the name of datapath 'dpif' without the type
456 * (for use in device names). */
457const char *
458dpif_base_name(const struct dpif *dpif)
459{
460 return dpif->base_name;
b29ba128
BP
461}
462
c7a26215
JP
463/* Returns the type of datapath 'dpif'. */
464const char *
465dpif_type(const struct dpif *dpif)
466{
467 return dpif->dpif_class->type;
468}
469
3a225db7
BP
470/* Returns the fully spelled out name for the given datapath 'type'.
471 *
472 * Normalized type string can be compared with strcmp(). Unnormalized type
473 * string might be the same even if they have different spellings. */
474const char *
475dpif_normalize_type(const char *type)
476{
477 return type && type[0] ? type : "system";
478}
479
96fba48f
BP
480/* Destroys the datapath that 'dpif' is connected to, first removing all of its
481 * ports. After calling this function, it does not make sense to pass 'dpif'
482 * to any functions other than dpif_name() or dpif_close(). */
064af421
BP
483int
484dpif_delete(struct dpif *dpif)
485{
96fba48f
BP
486 int error;
487
064af421 488 COVERAGE_INC(dpif_destroy);
96fba48f 489
1acb6baa 490 error = dpif->dpif_class->destroy(dpif);
96fba48f
BP
491 log_operation(dpif, "delete", error);
492 return error;
064af421
BP
493}
494
96fba48f
BP
495/* Retrieves statistics for 'dpif' into 'stats'. Returns 0 if successful,
496 * otherwise a positive errno value. */
064af421 497int
a8d9304d 498dpif_get_dp_stats(const struct dpif *dpif, struct dpif_dp_stats *stats)
064af421 499{
1acb6baa 500 int error = dpif->dpif_class->get_stats(dpif, stats);
96fba48f
BP
501 if (error) {
502 memset(stats, 0, sizeof *stats);
503 }
504 log_operation(dpif, "get_stats", error);
505 return error;
064af421
BP
506}
507
0aeaabc8
JP
508const char *
509dpif_port_open_type(const char *datapath_type, const char *port_type)
510{
5703b15f 511 struct registered_dpif_class *rc;
0aeaabc8
JP
512
513 datapath_type = dpif_normalize_type(datapath_type);
514
97be1538 515 ovs_mutex_lock(&dpif_mutex);
5703b15f
BP
516 rc = shash_find_data(&dpif_classes, datapath_type);
517 if (rc && rc->dpif_class->port_open_type) {
518 port_type = rc->dpif_class->port_open_type(rc->dpif_class, port_type);
0aeaabc8 519 }
97be1538 520 ovs_mutex_unlock(&dpif_mutex);
0aeaabc8 521
5703b15f 522 return port_type;
0aeaabc8
JP
523}
524
232dfa4a 525/* Attempts to add 'netdev' as a port on 'dpif'. If 'port_nop' is
4e022ec0 526 * non-null and its value is not ODPP_NONE, then attempts to use the
232dfa4a
JP
527 * value as the port number.
528 *
529 * If successful, returns 0 and sets '*port_nop' to the new port's port
530 * number (if 'port_nop' is non-null). On failure, returns a positive
4e022ec0 531 * errno value and sets '*port_nop' to ODPP_NONE (if 'port_nop' is
232dfa4a 532 * non-null). */
064af421 533int
4e022ec0 534dpif_port_add(struct dpif *dpif, struct netdev *netdev, odp_port_t *port_nop)
064af421 535{
c3827f61 536 const char *netdev_name = netdev_get_name(netdev);
4e022ec0 537 odp_port_t port_no = ODPP_NONE;
9ee3ae3e 538 int error;
064af421
BP
539
540 COVERAGE_INC(dpif_port_add);
9ee3ae3e 541
232dfa4a
JP
542 if (port_nop) {
543 port_no = *port_nop;
544 }
545
c3827f61 546 error = dpif->dpif_class->port_add(dpif, netdev, &port_no);
9ee3ae3e 547 if (!error) {
9b56fe13 548 VLOG_DBG_RL(&dpmsg_rl, "%s: added %s as port %"PRIu32,
c3827f61 549 dpif_name(dpif), netdev_name, port_no);
064af421 550 } else {
9ee3ae3e 551 VLOG_WARN_RL(&error_rl, "%s: failed to add %s as port: %s",
10a89ef0 552 dpif_name(dpif), netdev_name, ovs_strerror(error));
4e022ec0 553 port_no = ODPP_NONE;
9ee3ae3e
BP
554 }
555 if (port_nop) {
556 *port_nop = port_no;
064af421 557 }
9ee3ae3e 558 return error;
064af421
BP
559}
560
96fba48f
BP
561/* Attempts to remove 'dpif''s port number 'port_no'. Returns 0 if successful,
562 * otherwise a positive errno value. */
064af421 563int
4e022ec0 564dpif_port_del(struct dpif *dpif, odp_port_t port_no)
064af421 565{
96fba48f
BP
566 int error;
567
064af421 568 COVERAGE_INC(dpif_port_del);
96fba48f 569
1acb6baa 570 error = dpif->dpif_class->port_del(dpif, port_no);
a1811296 571 if (!error) {
9b56fe13 572 VLOG_DBG_RL(&dpmsg_rl, "%s: port_del(%"PRIu32")",
a1811296
BP
573 dpif_name(dpif), port_no);
574 } else {
575 log_operation(dpif, "port_del", error);
576 }
96fba48f 577 return error;
064af421
BP
578}
579
4c738a8d
BP
580/* Makes a deep copy of 'src' into 'dst'. */
581void
582dpif_port_clone(struct dpif_port *dst, const struct dpif_port *src)
583{
584 dst->name = xstrdup(src->name);
585 dst->type = xstrdup(src->type);
586 dst->port_no = src->port_no;
587}
588
589/* Frees memory allocated to members of 'dpif_port'.
590 *
591 * Do not call this function on a dpif_port obtained from
592 * dpif_port_dump_next(): that function retains ownership of the data in the
593 * dpif_port. */
594void
595dpif_port_destroy(struct dpif_port *dpif_port)
596{
597 free(dpif_port->name);
598 free(dpif_port->type);
599}
600
4afba28d
JP
601/* Checks if port named 'devname' exists in 'dpif'. If so, returns
602 * true; otherwise, returns false. */
603bool
604dpif_port_exists(const struct dpif *dpif, const char *devname)
605{
606 int error = dpif->dpif_class->port_query_by_name(dpif, devname, NULL);
bee6b8bc 607 if (error != 0 && error != ENOENT && error != ENODEV) {
4afba28d 608 VLOG_WARN_RL(&error_rl, "%s: failed to query port %s: %s",
10a89ef0 609 dpif_name(dpif), devname, ovs_strerror(error));
4afba28d
JP
610 }
611
612 return !error;
613}
614
96fba48f
BP
615/* Looks up port number 'port_no' in 'dpif'. On success, returns 0 and
616 * initializes '*port' appropriately; on failure, returns a positive errno
4c738a8d
BP
617 * value.
618 *
619 * The caller owns the data in 'port' and must free it with
620 * dpif_port_destroy() when it is no longer needed. */
064af421 621int
4e022ec0 622dpif_port_query_by_number(const struct dpif *dpif, odp_port_t port_no,
4c738a8d 623 struct dpif_port *port)
064af421 624{
1acb6baa 625 int error = dpif->dpif_class->port_query_by_number(dpif, port_no, port);
96fba48f 626 if (!error) {
9b56fe13 627 VLOG_DBG_RL(&dpmsg_rl, "%s: port %"PRIu32" is device %s",
4c738a8d 628 dpif_name(dpif), port_no, port->name);
064af421 629 } else {
96fba48f 630 memset(port, 0, sizeof *port);
9b56fe13 631 VLOG_WARN_RL(&error_rl, "%s: failed to query port %"PRIu32": %s",
10a89ef0 632 dpif_name(dpif), port_no, ovs_strerror(error));
064af421 633 }
96fba48f 634 return error;
064af421
BP
635}
636
96fba48f
BP
637/* Looks up port named 'devname' in 'dpif'. On success, returns 0 and
638 * initializes '*port' appropriately; on failure, returns a positive errno
4c738a8d
BP
639 * value.
640 *
641 * The caller owns the data in 'port' and must free it with
642 * dpif_port_destroy() when it is no longer needed. */
064af421
BP
643int
644dpif_port_query_by_name(const struct dpif *dpif, const char *devname,
4c738a8d 645 struct dpif_port *port)
064af421 646{
1acb6baa 647 int error = dpif->dpif_class->port_query_by_name(dpif, devname, port);
96fba48f 648 if (!error) {
9b56fe13 649 VLOG_DBG_RL(&dpmsg_rl, "%s: device %s is on port %"PRIu32,
4c738a8d 650 dpif_name(dpif), devname, port->port_no);
064af421 651 } else {
96fba48f
BP
652 memset(port, 0, sizeof *port);
653
d647f0a7
BP
654 /* For ENOENT or ENODEV we use DBG level because the caller is probably
655 * interested in whether 'dpif' actually has a port 'devname', so that
656 * it's not an issue worth logging if it doesn't. Other errors are
657 * uncommon and more likely to indicate a real problem. */
658 VLOG_RL(&error_rl,
659 error == ENOENT || error == ENODEV ? VLL_DBG : VLL_WARN,
660 "%s: failed to query port %s: %s",
10a89ef0 661 dpif_name(dpif), devname, ovs_strerror(error));
064af421 662 }
96fba48f 663 return error;
064af421
BP
664}
665
1954e6bb
AW
666/* Returns the Netlink PID value to supply in OVS_ACTION_ATTR_USERSPACE
667 * actions as the OVS_USERSPACE_ATTR_PID attribute's value, for use in
668 * flows whose packets arrived on port 'port_no'. In the case where the
669 * provider allocates multiple Netlink PIDs to a single port, it may use
670 * 'hash' to spread load among them. The caller need not use a particular
671 * hash function; a 5-tuple hash is suitable.
672 *
673 * (The datapath implementation might use some different hash function for
674 * distributing packets received via flow misses among PIDs. This means
675 * that packets received via flow misses might be reordered relative to
676 * packets received via userspace actions. This is not ordinarily a
677 * problem.)
98403001 678 *
4e022ec0 679 * A 'port_no' of ODPP_NONE is a special case: it returns a reserved PID, not
625b0720
BP
680 * allocated to any port, that the client may use for special purposes.
681 *
98403001
BP
682 * The return value is only meaningful when DPIF_UC_ACTION has been enabled in
683 * the 'dpif''s listen mask. It is allowed to change when DPIF_UC_ACTION is
684 * disabled and then re-enabled, so a client that does that must be prepared to
685 * update all of the flows that it installed that contain
686 * OVS_ACTION_ATTR_USERSPACE actions. */
687uint32_t
1954e6bb 688dpif_port_get_pid(const struct dpif *dpif, odp_port_t port_no, uint32_t hash)
98403001
BP
689{
690 return (dpif->dpif_class->port_get_pid
1954e6bb 691 ? (dpif->dpif_class->port_get_pid)(dpif, port_no, hash)
98403001
BP
692 : 0);
693}
694
96fba48f
BP
695/* Looks up port number 'port_no' in 'dpif'. On success, returns 0 and copies
696 * the port's name into the 'name_size' bytes in 'name', ensuring that the
697 * result is null-terminated. On failure, returns a positive errno value and
698 * makes 'name' the empty string. */
335562c0 699int
4e022ec0 700dpif_port_get_name(struct dpif *dpif, odp_port_t port_no,
335562c0
BP
701 char *name, size_t name_size)
702{
4c738a8d 703 struct dpif_port port;
335562c0
BP
704 int error;
705
cb22974d 706 ovs_assert(name_size > 0);
335562c0
BP
707
708 error = dpif_port_query_by_number(dpif, port_no, &port);
709 if (!error) {
4c738a8d
BP
710 ovs_strlcpy(name, port.name, name_size);
711 dpif_port_destroy(&port);
335562c0
BP
712 } else {
713 *name = '\0';
714 }
715 return error;
716}
717
b0ec0f27 718/* Initializes 'dump' to begin dumping the ports in a dpif.
96fba48f 719 *
b0ec0f27
BP
720 * This function provides no status indication. An error status for the entire
721 * dump operation is provided when it is completed by calling
722 * dpif_port_dump_done().
723 */
724void
725dpif_port_dump_start(struct dpif_port_dump *dump, const struct dpif *dpif)
726{
727 dump->dpif = dpif;
728 dump->error = dpif->dpif_class->port_dump_start(dpif, &dump->state);
729 log_operation(dpif, "port_dump_start", dump->error);
730}
731
732/* Attempts to retrieve another port from 'dump', which must have been
4c738a8d 733 * initialized with dpif_port_dump_start(). On success, stores a new dpif_port
b0ec0f27 734 * into 'port' and returns true. On failure, returns false.
96fba48f 735 *
b0ec0f27
BP
736 * Failure might indicate an actual error or merely that the last port has been
737 * dumped. An error status for the entire dump operation is provided when it
4c738a8d
BP
738 * is completed by calling dpif_port_dump_done().
739 *
740 * The dpif owns the data stored in 'port'. It will remain valid until at
741 * least the next time 'dump' is passed to dpif_port_dump_next() or
742 * dpif_port_dump_done(). */
b0ec0f27 743bool
4c738a8d 744dpif_port_dump_next(struct dpif_port_dump *dump, struct dpif_port *port)
064af421 745{
b0ec0f27 746 const struct dpif *dpif = dump->dpif;
064af421 747
b0ec0f27
BP
748 if (dump->error) {
749 return false;
750 }
f4ba4c4f 751
b0ec0f27
BP
752 dump->error = dpif->dpif_class->port_dump_next(dpif, dump->state, port);
753 if (dump->error == EOF) {
754 VLOG_DBG_RL(&dpmsg_rl, "%s: dumped all ports", dpif_name(dpif));
755 } else {
756 log_operation(dpif, "port_dump_next", dump->error);
757 }
064af421 758
b0ec0f27
BP
759 if (dump->error) {
760 dpif->dpif_class->port_dump_done(dpif, dump->state);
761 return false;
f4ba4c4f 762 }
b0ec0f27
BP
763 return true;
764}
064af421 765
b0ec0f27
BP
766/* Completes port table dump operation 'dump', which must have been initialized
767 * with dpif_port_dump_start(). Returns 0 if the dump operation was
768 * error-free, otherwise a positive errno value describing the problem. */
769int
770dpif_port_dump_done(struct dpif_port_dump *dump)
771{
772 const struct dpif *dpif = dump->dpif;
773 if (!dump->error) {
774 dump->error = dpif->dpif_class->port_dump_done(dpif, dump->state);
775 log_operation(dpif, "port_dump_done", dump->error);
f4ba4c4f 776 }
b0ec0f27 777 return dump->error == EOF ? 0 : dump->error;
064af421
BP
778}
779
e9e28be3
BP
780/* Polls for changes in the set of ports in 'dpif'. If the set of ports in
781 * 'dpif' has changed, this function does one of the following:
782 *
783 * - Stores the name of the device that was added to or deleted from 'dpif' in
784 * '*devnamep' and returns 0. The caller is responsible for freeing
785 * '*devnamep' (with free()) when it no longer needs it.
786 *
787 * - Returns ENOBUFS and sets '*devnamep' to NULL.
788 *
789 * This function may also return 'false positives', where it returns 0 and
790 * '*devnamep' names a device that was not actually added or deleted or it
791 * returns ENOBUFS without any change.
792 *
793 * Returns EAGAIN if the set of ports in 'dpif' has not changed. May also
794 * return other positive errno values to indicate that something has gone
795 * wrong. */
796int
797dpif_port_poll(const struct dpif *dpif, char **devnamep)
798{
1acb6baa 799 int error = dpif->dpif_class->port_poll(dpif, devnamep);
e9e28be3
BP
800 if (error) {
801 *devnamep = NULL;
802 }
803 return error;
804}
805
806/* Arranges for the poll loop to wake up when port_poll(dpif) will return a
807 * value other than EAGAIN. */
808void
809dpif_port_poll_wait(const struct dpif *dpif)
810{
1acb6baa 811 dpif->dpif_class->port_poll_wait(dpif);
e9e28be3
BP
812}
813
572b7068 814/* Extracts the flow stats for a packet. The 'flow' and 'packet'
a7752d4a
BP
815 * arguments must have been initialized through a call to flow_extract().
816 * 'used' is stored into stats->used. */
572b7068 817void
cf62fa4c 818dpif_flow_stats_extract(const struct flow *flow, const struct dp_packet *packet,
a7752d4a 819 long long int used, struct dpif_flow_stats *stats)
572b7068 820{
e0eecb1c 821 stats->tcp_flags = ntohs(flow->tcp_flags);
cf62fa4c 822 stats->n_bytes = dp_packet_size(packet);
572b7068 823 stats->n_packets = 1;
a7752d4a 824 stats->used = used;
572b7068
BP
825}
826
c97fb132
BP
827/* Appends a human-readable representation of 'stats' to 's'. */
828void
829dpif_flow_stats_format(const struct dpif_flow_stats *stats, struct ds *s)
830{
831 ds_put_format(s, "packets:%"PRIu64", bytes:%"PRIu64", used:",
832 stats->n_packets, stats->n_bytes);
833 if (stats->used) {
834 ds_put_format(s, "%.3fs", (time_msec() - stats->used) / 1000.0);
835 } else {
836 ds_put_format(s, "never");
837 }
7393104d
BP
838 if (stats->tcp_flags) {
839 ds_put_cstr(s, ", flags:");
840 packet_format_tcp_flags(s, stats->tcp_flags);
841 }
c97fb132
BP
842}
843
7af12bd7
JS
844/* Places the hash of the 'key_len' bytes starting at 'key' into '*hash'. */
845void
846dpif_flow_hash(const struct dpif *dpif OVS_UNUSED,
847 const void *key, size_t key_len, ovs_u128 *hash)
848{
849 static struct ovsthread_once once = OVSTHREAD_ONCE_INITIALIZER;
850 static uint32_t secret;
851
852 if (ovsthread_once_start(&once)) {
853 secret = random_uint32();
854 ovsthread_once_done(&once);
855 }
856 hash_bytes128(key, key_len, secret, hash);
78145f6e 857 uuid_set_bits_v4((struct uuid *)hash);
7af12bd7
JS
858}
859
96fba48f
BP
860/* Deletes all flows from 'dpif'. Returns 0 if successful, otherwise a
861 * positive errno value. */
862int
863dpif_flow_flush(struct dpif *dpif)
064af421 864{
96fba48f
BP
865 int error;
866
867 COVERAGE_INC(dpif_flow_flush);
868
1acb6baa 869 error = dpif->dpif_class->flow_flush(dpif);
96fba48f
BP
870 log_operation(dpif, "flow_flush", error);
871 return error;
064af421
BP
872}
873
2c85851f
JS
874/* Attempts to install 'key' into the datapath, fetches it, then deletes it.
875 * Returns true if the datapath supported installing 'flow', false otherwise.
876 */
877bool
878dpif_probe_feature(struct dpif *dpif, const char *name,
879 const struct ofpbuf *key, const ovs_u128 *ufid)
880{
881 struct dpif_flow flow;
882 struct ofpbuf reply;
883 uint64_t stub[DPIF_FLOW_BUFSIZE / 8];
884 bool enable_feature = false;
885 int error;
886
9ab0fce1
JS
887 /* Use DPIF_FP_MODIFY to cover the case where ovs-vswitchd is killed (and
888 * restarted) at just the right time such that feature probes from the
889 * previous run are still present in the datapath. */
890 error = dpif_flow_put(dpif, DPIF_FP_CREATE | DPIF_FP_MODIFY | DPIF_FP_PROBE,
6fd6ed71 891 key->data, key->size, NULL, 0, NULL, 0,
1c1e46ed 892 ufid, PMD_ID_NULL, NULL);
9ab0fce1 893 if (error) {
2c85851f
JS
894 if (error != EINVAL) {
895 VLOG_WARN("%s: %s flow probe failed (%s)",
896 dpif_name(dpif), name, ovs_strerror(error));
897 }
898 return false;
899 }
900
901 ofpbuf_use_stack(&reply, &stub, sizeof stub);
6fd6ed71 902 error = dpif_flow_get(dpif, key->data, key->size, ufid,
1c1e46ed 903 PMD_ID_NULL, &reply, &flow);
2c85851f 904 if (!error
bdd7ecf5
JS
905 && (!ufid || (flow.ufid_present
906 && ovs_u128_equals(ufid, &flow.ufid)))) {
2c85851f
JS
907 enable_feature = true;
908 }
909
6fd6ed71 910 error = dpif_flow_del(dpif, key->data, key->size, ufid,
1c1e46ed 911 PMD_ID_NULL, NULL);
2c85851f
JS
912 if (error) {
913 VLOG_WARN("%s: failed to delete %s feature probe flow",
914 dpif_name(dpif), name);
915 }
916
917 return enable_feature;
918}
919
6fe09f8c 920/* A dpif_operate() wrapper for performing a single DPIF_OP_FLOW_GET. */
96fba48f 921int
6fe09f8c 922dpif_flow_get(struct dpif *dpif,
70e5ed6f 923 const struct nlattr *key, size_t key_len, const ovs_u128 *ufid,
bd5131ba 924 const unsigned pmd_id, struct ofpbuf *buf, struct dpif_flow *flow)
064af421 925{
6fe09f8c
JS
926 struct dpif_op *opp;
927 struct dpif_op op;
96fba48f 928
6fe09f8c
JS
929 op.type = DPIF_OP_FLOW_GET;
930 op.u.flow_get.key = key;
931 op.u.flow_get.key_len = key_len;
70e5ed6f 932 op.u.flow_get.ufid = ufid;
1c1e46ed 933 op.u.flow_get.pmd_id = pmd_id;
6fe09f8c 934 op.u.flow_get.buffer = buf;
70e5ed6f
JS
935
936 memset(flow, 0, sizeof *flow);
6fe09f8c
JS
937 op.u.flow_get.flow = flow;
938 op.u.flow_get.flow->key = key;
939 op.u.flow_get.flow->key_len = key_len;
96fba48f 940
6fe09f8c
JS
941 opp = &op;
942 dpif_operate(dpif, &opp, 1);
943
944 return op.error;
064af421
BP
945}
946
1a0c894a 947/* A dpif_operate() wrapper for performing a single DPIF_OP_FLOW_PUT. */
064af421 948int
ba25b8f4 949dpif_flow_put(struct dpif *dpif, enum dpif_flow_put_flags flags,
feebdea2 950 const struct nlattr *key, size_t key_len,
e6cc0bab 951 const struct nlattr *mask, size_t mask_len,
feebdea2 952 const struct nlattr *actions, size_t actions_len,
bd5131ba 953 const ovs_u128 *ufid, const unsigned pmd_id,
1c1e46ed 954 struct dpif_flow_stats *stats)
064af421 955{
1a0c894a
BP
956 struct dpif_op *opp;
957 struct dpif_op op;
958
959 op.type = DPIF_OP_FLOW_PUT;
960 op.u.flow_put.flags = flags;
961 op.u.flow_put.key = key;
962 op.u.flow_put.key_len = key_len;
963 op.u.flow_put.mask = mask;
964 op.u.flow_put.mask_len = mask_len;
965 op.u.flow_put.actions = actions;
966 op.u.flow_put.actions_len = actions_len;
70e5ed6f 967 op.u.flow_put.ufid = ufid;
1c1e46ed 968 op.u.flow_put.pmd_id = pmd_id;
1a0c894a
BP
969 op.u.flow_put.stats = stats;
970
971 opp = &op;
972 dpif_operate(dpif, &opp, 1);
973
974 return op.error;
064af421
BP
975}
976
1a0c894a 977/* A dpif_operate() wrapper for performing a single DPIF_OP_FLOW_DEL. */
064af421 978int
feebdea2 979dpif_flow_del(struct dpif *dpif,
70e5ed6f 980 const struct nlattr *key, size_t key_len, const ovs_u128 *ufid,
bd5131ba 981 const unsigned pmd_id, struct dpif_flow_stats *stats)
064af421 982{
1a0c894a
BP
983 struct dpif_op *opp;
984 struct dpif_op op;
985
986 op.type = DPIF_OP_FLOW_DEL;
987 op.u.flow_del.key = key;
988 op.u.flow_del.key_len = key_len;
70e5ed6f 989 op.u.flow_del.ufid = ufid;
1c1e46ed 990 op.u.flow_del.pmd_id = pmd_id;
1a0c894a 991 op.u.flow_del.stats = stats;
8e1ffd75 992 op.u.flow_del.terse = false;
f1aa2072 993
1a0c894a
BP
994 opp = &op;
995 dpif_operate(dpif, &opp, 1);
996
997 return op.error;
064af421
BP
998}
999
ac64794a 1000/* Creates and returns a new 'struct dpif_flow_dump' for iterating through the
64bb477f
JS
1001 * flows in 'dpif'. If 'terse' is true, then only UFID and statistics will
1002 * be returned in the dump. Otherwise, all fields will be returned.
ac64794a
BP
1003 *
1004 * This function always successfully returns a dpif_flow_dump. Error
1005 * reporting is deferred to dpif_flow_dump_destroy(). */
1006struct dpif_flow_dump *
64bb477f 1007dpif_flow_dump_create(const struct dpif *dpif, bool terse)
e723fd32 1008{
64bb477f 1009 return dpif->dpif_class->flow_dump_create(dpif, terse);
e723fd32
JS
1010}
1011
ac64794a
BP
1012/* Destroys 'dump', which must have been created with dpif_flow_dump_create().
1013 * All dpif_flow_dump_thread structures previously created for 'dump' must
1014 * previously have been destroyed.
1015 *
1016 * Returns 0 if the dump operation was error-free, otherwise a positive errno
1017 * value describing the problem. */
1018int
1019dpif_flow_dump_destroy(struct dpif_flow_dump *dump)
e723fd32 1020{
ac64794a
BP
1021 const struct dpif *dpif = dump->dpif;
1022 int error = dpif->dpif_class->flow_dump_destroy(dump);
1023 log_operation(dpif, "flow_dump_destroy", error);
1024 return error == EOF ? 0 : error;
e723fd32
JS
1025}
1026
ac64794a
BP
1027/* Returns new thread-local state for use with dpif_flow_dump_next(). */
1028struct dpif_flow_dump_thread *
1029dpif_flow_dump_thread_create(struct dpif_flow_dump *dump)
064af421 1030{
ac64794a 1031 return dump->dpif->dpif_class->flow_dump_thread_create(dump);
064af421
BP
1032}
1033
ac64794a
BP
1034/* Releases 'thread'. */
1035void
1036dpif_flow_dump_thread_destroy(struct dpif_flow_dump_thread *thread)
704a1e09 1037{
ac64794a 1038 thread->dpif->dpif_class->flow_dump_thread_destroy(thread);
704a1e09
BP
1039}
1040
ac64794a
BP
1041/* Attempts to retrieve up to 'max_flows' more flows from 'thread'. Returns 0
1042 * if and only if no flows remained to be retrieved, otherwise a positive
1043 * number reflecting the number of elements in 'flows[]' that were updated.
1044 * The number of flows returned might be less than 'max_flows' because
1045 * fewer than 'max_flows' remained, because this particular datapath does not
1046 * benefit from batching, or because an error occurred partway through
1047 * retrieval. Thus, the caller should continue calling until a 0 return value,
1048 * even if intermediate return values are less than 'max_flows'.
bdeadfdd 1049 *
ac64794a
BP
1050 * No error status is immediately provided. An error status for the entire
1051 * dump operation is provided when it is completed by calling
1052 * dpif_flow_dump_destroy().
bdeadfdd 1053 *
ac64794a
BP
1054 * All of the data stored into 'flows' is owned by the datapath, not by the
1055 * caller, and the caller must not modify or free it. The datapath guarantees
58df55ce
JS
1056 * that it remains accessible and unchanged until the first of:
1057 * - The next call to dpif_flow_dump_next() for 'thread', or
1058 * - The next rcu quiescent period. */
704a1e09 1059int
ac64794a
BP
1060dpif_flow_dump_next(struct dpif_flow_dump_thread *thread,
1061 struct dpif_flow *flows, int max_flows)
704a1e09 1062{
ac64794a
BP
1063 struct dpif *dpif = thread->dpif;
1064 int n;
1065
1066 ovs_assert(max_flows > 0);
1067 n = dpif->dpif_class->flow_dump_next(thread, flows, max_flows);
1068 if (n > 0) {
1069 struct dpif_flow *f;
1070
1071 for (f = flows; f < &flows[n] && should_log_flow_message(0); f++) {
1072 log_flow_message(dpif, 0, "flow_dump",
1073 f->key, f->key_len, f->mask, f->mask_len,
70e5ed6f 1074 &f->ufid, &f->stats, f->actions, f->actions_len);
ac64794a
BP
1075 }
1076 } else {
1077 VLOG_DBG_RL(&dpmsg_rl, "%s: dumped all flows", dpif_name(dpif));
1078 }
1079 return n;
064af421
BP
1080}
1081
7fd91025
BP
1082struct dpif_execute_helper_aux {
1083 struct dpif *dpif;
1084 int error;
1085};
1086
09f9da0b
JR
1087/* This is called for actions that need the context of the datapath to be
1088 * meaningful. */
7fd91025 1089static void
e14deea0 1090dpif_execute_helper_cb(void *aux_, struct dp_packet **packets, int cnt,
09f9da0b 1091 const struct nlattr *action, bool may_steal OVS_UNUSED)
7fd91025 1092{
758c456d 1093 struct dpif_execute_helper_aux *aux = aux_;
09f9da0b 1094 int type = nl_attr_type(action);
cf62fa4c 1095 struct dp_packet *packet = *packets;
8cbf4f47
DDP
1096
1097 ovs_assert(cnt == 1);
758c456d 1098
09f9da0b 1099 switch ((enum ovs_action_attr)type) {
07659514 1100 case OVS_ACTION_ATTR_CT:
09f9da0b 1101 case OVS_ACTION_ATTR_OUTPUT:
a36de779
PS
1102 case OVS_ACTION_ATTR_TUNNEL_PUSH:
1103 case OVS_ACTION_ATTR_TUNNEL_POP:
09f9da0b 1104 case OVS_ACTION_ATTR_USERSPACE:
2b651e44
BP
1105 case OVS_ACTION_ATTR_RECIRC: {
1106 struct dpif_execute execute;
1107 struct ofpbuf execute_actions;
1108 uint64_t stub[256 / 8];
cf62fa4c 1109 struct pkt_metadata *md = &packet->md;
2b651e44
BP
1110
1111 if (md->tunnel.ip_dst) {
1112 /* The Linux kernel datapath throws away the tunnel information
1113 * that we supply as metadata. We have to use a "set" action to
1114 * supply it. */
1115 ofpbuf_use_stub(&execute_actions, stub, sizeof stub);
1116 odp_put_tunnel_action(&md->tunnel, &execute_actions);
1117 ofpbuf_put(&execute_actions, action, NLA_ALIGN(action->nla_len));
1118
6fd6ed71
PS
1119 execute.actions = execute_actions.data;
1120 execute.actions_len = execute_actions.size;
2b651e44
BP
1121 } else {
1122 execute.actions = action;
1123 execute.actions_len = NLA_ALIGN(action->nla_len);
1124 }
1125
8cbf4f47 1126 execute.packet = packet;
758c456d 1127 execute.needs_help = false;
43f9ac0a 1128 execute.probe = false;
1a0c894a 1129 aux->error = dpif_execute(aux->dpif, &execute);
fc65bafc
BP
1130 log_execute_message(aux->dpif, &execute, true, aux->error);
1131
2b651e44
BP
1132 if (md->tunnel.ip_dst) {
1133 ofpbuf_uninit(&execute_actions);
1134 }
09f9da0b 1135 break;
2b651e44 1136 }
758c456d 1137
c6bf49f3 1138 case OVS_ACTION_ATTR_HASH:
09f9da0b
JR
1139 case OVS_ACTION_ATTR_PUSH_VLAN:
1140 case OVS_ACTION_ATTR_POP_VLAN:
1141 case OVS_ACTION_ATTR_PUSH_MPLS:
1142 case OVS_ACTION_ATTR_POP_MPLS:
1143 case OVS_ACTION_ATTR_SET:
6d670e7f 1144 case OVS_ACTION_ATTR_SET_MASKED:
09f9da0b
JR
1145 case OVS_ACTION_ATTR_SAMPLE:
1146 case OVS_ACTION_ATTR_UNSPEC:
1147 case __OVS_ACTION_ATTR_MAX:
1148 OVS_NOT_REACHED();
1149 }
7fd91025
BP
1150}
1151
1152/* Executes 'execute' by performing most of the actions in userspace and
1153 * passing the fully constructed packets to 'dpif' for output and userspace
1154 * actions.
1155 *
1156 * This helps with actions that a given 'dpif' doesn't implement directly. */
1157static int
758c456d 1158dpif_execute_with_help(struct dpif *dpif, struct dpif_execute *execute)
7fd91025 1159{
758c456d 1160 struct dpif_execute_helper_aux aux = {dpif, 0};
cf62fa4c 1161 struct dp_packet *pp;
7fd91025
BP
1162
1163 COVERAGE_INC(dpif_execute_with_help);
1164
cf62fa4c 1165 pp = execute->packet;
41ccaa24 1166 odp_execute_actions(&aux, &pp, 1, false, execute->actions,
91088554 1167 execute->actions_len, dpif_execute_helper_cb);
7fd91025
BP
1168 return aux.error;
1169}
1170
87e5119b
BP
1171/* Returns true if the datapath needs help executing 'execute'. */
1172static bool
1173dpif_execute_needs_help(const struct dpif_execute *execute)
1174{
1175 return execute->needs_help || nl_attr_oversized(execute->actions_len);
1176}
1177
1a0c894a 1178/* A dpif_operate() wrapper for performing a single DPIF_OP_EXECUTE. */
758c456d
JR
1179int
1180dpif_execute(struct dpif *dpif, struct dpif_execute *execute)
89625d1e 1181{
1a0c894a
BP
1182 if (execute->actions_len) {
1183 struct dpif_op *opp;
1184 struct dpif_op op;
89625d1e 1185
1a0c894a
BP
1186 op.type = DPIF_OP_EXECUTE;
1187 op.u.execute = *execute;
89625d1e 1188
1a0c894a
BP
1189 opp = &op;
1190 dpif_operate(dpif, &opp, 1);
89625d1e 1191
1a0c894a
BP
1192 return op.error;
1193 } else {
1194 return 0;
1195 }
89625d1e
BP
1196}
1197
6bc60024 1198/* Executes each of the 'n_ops' operations in 'ops' on 'dpif', in the order in
1a0c894a
BP
1199 * which they are specified. Places each operation's results in the "output"
1200 * members documented in comments, and 0 in the 'error' member on success or a
1201 * positive errno on failure. */
6bc60024 1202void
c2b565b5 1203dpif_operate(struct dpif *dpif, struct dpif_op **ops, size_t n_ops)
6bc60024 1204{
1a0c894a
BP
1205 while (n_ops > 0) {
1206 size_t chunk;
7fd91025 1207
1a0c894a
BP
1208 /* Count 'chunk', the number of ops that can be executed without
1209 * needing any help. Ops that need help should be rare, so we
1210 * expect this to ordinarily be 'n_ops', that is, all the ops. */
1211 for (chunk = 0; chunk < n_ops; chunk++) {
1212 struct dpif_op *op = ops[chunk];
1213
1214 if (op->type == DPIF_OP_EXECUTE
1215 && dpif_execute_needs_help(&op->u.execute)) {
1216 break;
1217 }
1218 }
7fd91025 1219
1a0c894a
BP
1220 if (chunk) {
1221 /* Execute a chunk full of ops that the dpif provider can
1222 * handle itself, without help. */
1223 size_t i;
7fd91025 1224
1a0c894a 1225 dpif->dpif_class->operate(dpif, ops, chunk);
7fd91025 1226
1a0c894a
BP
1227 for (i = 0; i < chunk; i++) {
1228 struct dpif_op *op = ops[i];
1229 int error = op->error;
7fd91025 1230
1a0c894a
BP
1231 switch (op->type) {
1232 case DPIF_OP_FLOW_PUT: {
1233 struct dpif_flow_put *put = &op->u.flow_put;
7fd91025 1234
1a0c894a
BP
1235 COVERAGE_INC(dpif_flow_put);
1236 log_flow_put_message(dpif, put, error);
1237 if (error && put->stats) {
1238 memset(put->stats, 0, sizeof *put->stats);
7fd91025 1239 }
1a0c894a 1240 break;
7fd91025
BP
1241 }
1242
6fe09f8c
JS
1243 case DPIF_OP_FLOW_GET: {
1244 struct dpif_flow_get *get = &op->u.flow_get;
1245
1246 COVERAGE_INC(dpif_flow_get);
6fe09f8c
JS
1247 if (error) {
1248 memset(get->flow, 0, sizeof *get->flow);
1249 }
72d52166
MC
1250 log_flow_get_message(dpif, get, error);
1251
6fe09f8c
JS
1252 break;
1253 }
1254
1a0c894a
BP
1255 case DPIF_OP_FLOW_DEL: {
1256 struct dpif_flow_del *del = &op->u.flow_del;
7fd91025 1257
1a0c894a
BP
1258 COVERAGE_INC(dpif_flow_del);
1259 log_flow_del_message(dpif, del, error);
1260 if (error && del->stats) {
1261 memset(del->stats, 0, sizeof *del->stats);
1262 }
1263 break;
1264 }
f23d2845 1265
1a0c894a
BP
1266 case DPIF_OP_EXECUTE:
1267 COVERAGE_INC(dpif_execute);
1268 log_execute_message(dpif, &op->u.execute, false, error);
1269 break;
1270 }
1271 }
b99d3cee 1272
1a0c894a
BP
1273 ops += chunk;
1274 n_ops -= chunk;
1275 } else {
1276 /* Help the dpif provider to execute one op. */
1277 struct dpif_op *op = ops[0];
b99d3cee 1278
1a0c894a
BP
1279 COVERAGE_INC(dpif_execute);
1280 op->error = dpif_execute_with_help(dpif, &op->u.execute);
1281 ops++;
1282 n_ops--;
6bc60024
BP
1283 }
1284 }
1285}
1286
01545c1a
BP
1287/* Returns a string that represents 'type', for use in log messages. */
1288const char *
1289dpif_upcall_type_to_string(enum dpif_upcall_type type)
1290{
1291 switch (type) {
1292 case DPIF_UC_MISS: return "miss";
1293 case DPIF_UC_ACTION: return "action";
01545c1a
BP
1294 case DPIF_N_UC_TYPES: default: return "<unknown>";
1295 }
1296}
1297
a12b3ead
BP
1298/* Enables or disables receiving packets with dpif_recv() on 'dpif'. Returns 0
1299 * if successful, otherwise a positive errno value.
98403001 1300 *
a12b3ead 1301 * Turning packet receive off and then back on may change the Netlink PID
98403001
BP
1302 * assignments returned by dpif_port_get_pid(). If the client does this, it
1303 * must update all of the flows that have OVS_ACTION_ATTR_USERSPACE actions
1304 * using the new PID assignment. */
8f24562a 1305int
a12b3ead 1306dpif_recv_set(struct dpif *dpif, bool enable)
8f24562a 1307{
6b31e073
RW
1308 int error = 0;
1309
1310 if (dpif->dpif_class->recv_set) {
1311 error = dpif->dpif_class->recv_set(dpif, enable);
1312 log_operation(dpif, "recv_set", error);
1313 }
96fba48f 1314 return error;
8f24562a
BP
1315}
1316
1954e6bb
AW
1317/* Refreshes the poll loops and Netlink sockets associated to each port,
1318 * when the number of upcall handlers (upcall receiving thread) is changed
1319 * to 'n_handlers' and receiving packets for 'dpif' is enabled by
1320 * recv_set().
1321 *
1322 * Since multiple upcall handlers can read upcalls simultaneously from
1323 * 'dpif', each port can have multiple Netlink sockets, one per upcall
1324 * handler. So, handlers_set() is responsible for the following tasks:
1325 *
1326 * When receiving upcall is enabled, extends or creates the
1327 * configuration to support:
1328 *
1329 * - 'n_handlers' Netlink sockets for each port.
1330 *
1331 * - 'n_handlers' poll loops, one for each upcall handler.
1332 *
1333 * - registering the Netlink sockets for the same upcall handler to
1334 * the corresponding poll loop.
1335 *
1336 * Returns 0 if successful, otherwise a positive errno value. */
1337int
1338dpif_handlers_set(struct dpif *dpif, uint32_t n_handlers)
1339{
6b31e073
RW
1340 int error = 0;
1341
1342 if (dpif->dpif_class->handlers_set) {
1343 error = dpif->dpif_class->handlers_set(dpif, n_handlers);
1344 log_operation(dpif, "handlers_set", error);
1345 }
1954e6bb
AW
1346 return error;
1347}
1348
e4e74c3a
AW
1349void
1350dpif_register_dp_purge_cb(struct dpif *dpif, dp_purge_callback *cb, void *aux)
1351{
1352 if (dpif->dpif_class->register_dp_purge_cb) {
1353 dpif->dpif_class->register_dp_purge_cb(dpif, cb, aux);
1354 }
1355}
1356
6b31e073 1357void
623540e4 1358dpif_register_upcall_cb(struct dpif *dpif, upcall_callback *cb, void *aux)
6b31e073
RW
1359{
1360 if (dpif->dpif_class->register_upcall_cb) {
623540e4 1361 dpif->dpif_class->register_upcall_cb(dpif, cb, aux);
6b31e073
RW
1362 }
1363}
1364
1365void
1366dpif_enable_upcall(struct dpif *dpif)
1367{
1368 if (dpif->dpif_class->enable_upcall) {
1369 dpif->dpif_class->enable_upcall(dpif);
1370 }
1371}
1372
1373void
1374dpif_disable_upcall(struct dpif *dpif)
1375{
1376 if (dpif->dpif_class->disable_upcall) {
1377 dpif->dpif_class->disable_upcall(dpif);
1378 }
1379}
1380
1381void
1382dpif_print_packet(struct dpif *dpif, struct dpif_upcall *upcall)
1383{
1384 if (!VLOG_DROP_DBG(&dpmsg_rl)) {
1385 struct ds flow;
1386 char *packet;
1387
cf62fa4c
PS
1388 packet = ofp_packet_to_string(dp_packet_data(&upcall->packet),
1389 dp_packet_size(&upcall->packet));
6b31e073
RW
1390
1391 ds_init(&flow);
1392 odp_flow_key_format(upcall->key, upcall->key_len, &flow);
1393
1394 VLOG_DBG("%s: %s upcall:\n%s\n%s",
1395 dpif_name(dpif), dpif_upcall_type_to_string(upcall->type),
1396 ds_cstr(&flow), packet);
1397
1398 ds_destroy(&flow);
1399 free(packet);
1400 }
1401}
1402
f2eee189
AW
1403/* If 'dpif' creates its own I/O polling threads, refreshes poll threads
1404 * configuration. */
1405int
1406dpif_poll_threads_set(struct dpif *dpif, unsigned int n_rxqs,
1407 const char *cmask)
1408{
1409 int error = 0;
1410
1411 if (dpif->dpif_class->poll_threads_set) {
1412 error = dpif->dpif_class->poll_threads_set(dpif, n_rxqs, cmask);
1413 if (error) {
1414 log_operation(dpif, "poll_threads_set", error);
1415 }
1416 }
1417
1418 return error;
1419}
1420
1954e6bb
AW
1421/* Polls for an upcall from 'dpif' for an upcall handler. Since there
1422 * there can be multiple poll loops, 'handler_id' is needed as index to
1423 * identify the corresponding poll loop. If successful, stores the upcall
1424 * into '*upcall', using 'buf' for storage. Should only be called if
1425 * 'recv_set' has been used to enable receiving packets from 'dpif'.
96fba48f 1426 *
da546e07
JR
1427 * 'upcall->key' and 'upcall->userdata' point into data in the caller-provided
1428 * 'buf', so their memory cannot be freed separately from 'buf'.
856081f6 1429 *
837a88dc
JR
1430 * The caller owns the data of 'upcall->packet' and may modify it. If
1431 * packet's headroom is exhausted as it is manipulated, 'upcall->packet'
1432 * will be reallocated. This requires the data of 'upcall->packet' to be
1433 * released with ofpbuf_uninit() before 'upcall' is destroyed. However,
1434 * when an error is returned, the 'upcall->packet' may be uninitialized
1435 * and should not be released.
1436 *
96fba48f 1437 * Returns 0 if successful, otherwise a positive errno value. Returns EAGAIN
856081f6 1438 * if no upcall is immediately available. */
064af421 1439int
1954e6bb
AW
1440dpif_recv(struct dpif *dpif, uint32_t handler_id, struct dpif_upcall *upcall,
1441 struct ofpbuf *buf)
064af421 1442{
6b31e073 1443 int error = EAGAIN;
01545c1a 1444
6b31e073
RW
1445 if (dpif->dpif_class->recv) {
1446 error = dpif->dpif_class->recv(dpif, handler_id, upcall, buf);
1447 if (!error) {
1448 dpif_print_packet(dpif, upcall);
1449 } else if (error != EAGAIN) {
1450 log_operation(dpif, "recv", error);
1451 }
064af421 1452 }
064af421
BP
1453 return error;
1454}
1455
96fba48f 1456/* Discards all messages that would otherwise be received by dpif_recv() on
1ba530f4
BP
1457 * 'dpif'. */
1458void
96fba48f
BP
1459dpif_recv_purge(struct dpif *dpif)
1460{
96fba48f 1461 COVERAGE_INC(dpif_purge);
1ba530f4
BP
1462 if (dpif->dpif_class->recv_purge) {
1463 dpif->dpif_class->recv_purge(dpif);
96fba48f 1464 }
96fba48f
BP
1465}
1466
1954e6bb
AW
1467/* Arranges for the poll loop for an upcall handler to wake up when 'dpif'
1468 * 'dpif' has a message queued to be received with the recv member
1469 * function. Since there can be multiple poll loops, 'handler_id' is
1470 * needed as index to identify the corresponding poll loop. */
064af421 1471void
1954e6bb 1472dpif_recv_wait(struct dpif *dpif, uint32_t handler_id)
064af421 1473{
6b31e073
RW
1474 if (dpif->dpif_class->recv_wait) {
1475 dpif->dpif_class->recv_wait(dpif, handler_id);
1476 }
064af421 1477}
53a4218d 1478
b5cbbcf6
AZ
1479/*
1480 * Return the datapath version. Caller is responsible for freeing
1481 * the string.
1482 */
1483char *
1484dpif_get_dp_version(const struct dpif *dpif)
1485{
1486 char *version = NULL;
1487
1488 if (dpif->dpif_class->get_datapath_version) {
1489 version = dpif->dpif_class->get_datapath_version();
1490 }
1491
1492 return version;
1493}
1494
96fba48f
BP
1495/* Obtains the NetFlow engine type and engine ID for 'dpif' into '*engine_type'
1496 * and '*engine_id', respectively. */
53a4218d
BP
1497void
1498dpif_get_netflow_ids(const struct dpif *dpif,
1499 uint8_t *engine_type, uint8_t *engine_id)
1500{
96fba48f
BP
1501 *engine_type = dpif->netflow_engine_type;
1502 *engine_id = dpif->netflow_engine_id;
1503}
aae51f53
BP
1504
1505/* Translates OpenFlow queue ID 'queue_id' (in host byte order) into a priority
abff858b
PS
1506 * value used for setting packet priority.
1507 * On success, returns 0 and stores the priority into '*priority'.
1508 * On failure, returns a positive errno value and stores 0 into '*priority'. */
aae51f53
BP
1509int
1510dpif_queue_to_priority(const struct dpif *dpif, uint32_t queue_id,
1511 uint32_t *priority)
1512{
1513 int error = (dpif->dpif_class->queue_to_priority
1514 ? dpif->dpif_class->queue_to_priority(dpif, queue_id,
1515 priority)
1516 : EOPNOTSUPP);
1517 if (error) {
1518 *priority = 0;
1519 }
1520 log_operation(dpif, "queue_to_priority", error);
1521 return error;
1522}
96fba48f
BP
1523\f
1524void
1acb6baa
BP
1525dpif_init(struct dpif *dpif, const struct dpif_class *dpif_class,
1526 const char *name,
96fba48f
BP
1527 uint8_t netflow_engine_type, uint8_t netflow_engine_id)
1528{
1acb6baa 1529 dpif->dpif_class = dpif_class;
1a6f1e2a 1530 dpif->base_name = xstrdup(name);
a4af0040 1531 dpif->full_name = xasprintf("%s@%s", dpif_class->type, name);
96fba48f
BP
1532 dpif->netflow_engine_type = netflow_engine_type;
1533 dpif->netflow_engine_id = netflow_engine_id;
1534}
999401aa
JG
1535
1536/* Undoes the results of initialization.
1537 *
1538 * Normally this function only needs to be called from dpif_close().
1539 * However, it may be called by providers due to an error on opening
1540 * that occurs after initialization. It this case dpif_close() would
1541 * never be called. */
1542void
1543dpif_uninit(struct dpif *dpif, bool close)
1544{
1545 char *base_name = dpif->base_name;
1546 char *full_name = dpif->full_name;
1547
1548 if (close) {
a4af0040 1549 dpif->dpif_class->close(dpif);
999401aa
JG
1550 }
1551
1552 free(base_name);
1553 free(full_name);
1554}
96fba48f
BP
1555\f
1556static void
1557log_operation(const struct dpif *dpif, const char *operation, int error)
1558{
1559 if (!error) {
1560 VLOG_DBG_RL(&dpmsg_rl, "%s: %s success", dpif_name(dpif), operation);
90bf1e07 1561 } else if (ofperr_is_valid(error)) {
96fba48f 1562 VLOG_WARN_RL(&error_rl, "%s: %s failed (%s)",
90bf1e07 1563 dpif_name(dpif), operation, ofperr_get_name(error));
71ce9235 1564 } else {
90bf1e07 1565 VLOG_WARN_RL(&error_rl, "%s: %s failed (%s)",
10a89ef0 1566 dpif_name(dpif), operation, ovs_strerror(error));
96fba48f
BP
1567 }
1568}
1569
1570static enum vlog_level
1571flow_message_log_level(int error)
1572{
9b1a48c2
JP
1573 /* If flows arrive in a batch, userspace may push down multiple
1574 * unique flow definitions that overlap when wildcards are applied.
1575 * Kernels that support flow wildcarding will reject these flows as
1576 * duplicates (EEXIST), so lower the log level to debug for these
1577 * types of messages. */
1578 return (error && error != EEXIST) ? VLL_WARN : VLL_DBG;
96fba48f
BP
1579}
1580
1581static bool
1582should_log_flow_message(int error)
1583{
1584 return !vlog_should_drop(THIS_MODULE, flow_message_log_level(error),
1585 error ? &error_rl : &dpmsg_rl);
1586}
1587
1588static void
1589log_flow_message(const struct dpif *dpif, int error, const char *operation,
36956a7d 1590 const struct nlattr *key, size_t key_len,
61fb711d 1591 const struct nlattr *mask, size_t mask_len,
70e5ed6f 1592 const ovs_u128 *ufid, const struct dpif_flow_stats *stats,
cf22f8cb 1593 const struct nlattr *actions, size_t actions_len)
96fba48f
BP
1594{
1595 struct ds ds = DS_EMPTY_INITIALIZER;
1596 ds_put_format(&ds, "%s: ", dpif_name(dpif));
1597 if (error) {
1598 ds_put_cstr(&ds, "failed to ");
1599 }
1600 ds_put_format(&ds, "%s ", operation);
1601 if (error) {
10a89ef0 1602 ds_put_format(&ds, "(%s) ", ovs_strerror(error));
96fba48f 1603 }
70e5ed6f
JS
1604 if (ufid) {
1605 odp_format_ufid(ufid, &ds);
1606 ds_put_cstr(&ds, " ");
1607 }
0a37839c 1608 odp_flow_format(key, key_len, mask, mask_len, NULL, &ds, true);
96fba48f
BP
1609 if (stats) {
1610 ds_put_cstr(&ds, ", ");
c97fb132 1611 dpif_flow_stats_format(stats, &ds);
96fba48f 1612 }
cdee00fd 1613 if (actions || actions_len) {
96fba48f 1614 ds_put_cstr(&ds, ", actions:");
cdee00fd 1615 format_odp_actions(&ds, actions, actions_len);
96fba48f
BP
1616 }
1617 vlog(THIS_MODULE, flow_message_log_level(error), "%s", ds_cstr(&ds));
1618 ds_destroy(&ds);
1619}
89625d1e
BP
1620
1621static void
1622log_flow_put_message(struct dpif *dpif, const struct dpif_flow_put *put,
1623 int error)
1624{
43f9ac0a 1625 if (should_log_flow_message(error) && !(put->flags & DPIF_FP_PROBE)) {
89625d1e
BP
1626 struct ds s;
1627
1628 ds_init(&s);
1629 ds_put_cstr(&s, "put");
1630 if (put->flags & DPIF_FP_CREATE) {
1631 ds_put_cstr(&s, "[create]");
1632 }
1633 if (put->flags & DPIF_FP_MODIFY) {
1634 ds_put_cstr(&s, "[modify]");
1635 }
1636 if (put->flags & DPIF_FP_ZERO_STATS) {
1637 ds_put_cstr(&s, "[zero]");
1638 }
1639 log_flow_message(dpif, error, ds_cstr(&s),
61fb711d 1640 put->key, put->key_len, put->mask, put->mask_len,
70e5ed6f
JS
1641 put->ufid, put->stats, put->actions,
1642 put->actions_len);
89625d1e
BP
1643 ds_destroy(&s);
1644 }
1645}
1646
b99d3cee
BP
1647static void
1648log_flow_del_message(struct dpif *dpif, const struct dpif_flow_del *del,
1649 int error)
1650{
1651 if (should_log_flow_message(error)) {
1652 log_flow_message(dpif, error, "flow_del", del->key, del->key_len,
70e5ed6f
JS
1653 NULL, 0, del->ufid, !error ? del->stats : NULL,
1654 NULL, 0);
b99d3cee
BP
1655 }
1656}
1657
f0fe12fc
BP
1658/* Logs that 'execute' was executed on 'dpif' and completed with errno 'error'
1659 * (0 for success). 'subexecute' should be true if the execution is a result
1660 * of breaking down a larger execution that needed help, false otherwise.
1661 *
1662 *
1663 * XXX In theory, the log message could be deceptive because this function is
1664 * called after the dpif_provider's '->execute' function, which is allowed to
1665 * modify execute->packet and execute->md. In practice, though:
1666 *
93451a0a 1667 * - dpif-netlink doesn't modify execute->packet or execute->md.
f0fe12fc
BP
1668 *
1669 * - dpif-netdev does modify them but it is less likely to have problems
1670 * because it is built into ovs-vswitchd and cannot have version skew,
1671 * etc.
1672 *
1673 * It would still be better to avoid the potential problem. I don't know of a
1674 * good way to do that, though, that isn't expensive. */
89625d1e
BP
1675static void
1676log_execute_message(struct dpif *dpif, const struct dpif_execute *execute,
fc65bafc 1677 bool subexecute, int error)
89625d1e 1678{
43f9ac0a
JR
1679 if (!(error ? VLOG_DROP_WARN(&error_rl) : VLOG_DROP_DBG(&dpmsg_rl))
1680 && !execute->probe) {
89625d1e
BP
1681 struct ds ds = DS_EMPTY_INITIALIZER;
1682 char *packet;
1683
cf62fa4c
PS
1684 packet = ofp_packet_to_string(dp_packet_data(execute->packet),
1685 dp_packet_size(execute->packet));
fc65bafc
BP
1686 ds_put_format(&ds, "%s: %sexecute ",
1687 dpif_name(dpif),
1688 (subexecute ? "sub-"
1689 : dpif_execute_needs_help(execute) ? "super-"
1690 : ""));
89625d1e
BP
1691 format_odp_actions(&ds, execute->actions, execute->actions_len);
1692 if (error) {
10a89ef0 1693 ds_put_format(&ds, " failed (%s)", ovs_strerror(error));
89625d1e
BP
1694 }
1695 ds_put_format(&ds, " on packet %s", packet);
1696 vlog(THIS_MODULE, error ? VLL_WARN : VLL_DBG, "%s", ds_cstr(&ds));
1697 ds_destroy(&ds);
1698 free(packet);
1699 }
1700}
6fe09f8c
JS
1701
1702static void
1703log_flow_get_message(const struct dpif *dpif, const struct dpif_flow_get *get,
1704 int error)
1705{
1706 if (should_log_flow_message(error)) {
1707 log_flow_message(dpif, error, "flow_get",
1708 get->key, get->key_len,
1709 get->flow->mask, get->flow->mask_len,
70e5ed6f 1710 get->ufid, &get->flow->stats,
6fe09f8c
JS
1711 get->flow->actions, get->flow->actions_len);
1712 }
1713}
a36de779
PS
1714
1715bool
1716dpif_supports_tnl_push_pop(const struct dpif *dpif)
1717{
c4ea7529 1718 return dpif_is_netdev(dpif);
a36de779 1719}