]> git.proxmox.com Git - ovs.git/blame - lib/dpif.c
socket-util: Fix an inverted use of LINUX
[ovs.git] / lib / dpif.c
CommitLineData
064af421 1/*
2f51a7eb 2 * Copyright (c) 2008, 2009, 2010, 2011, 2012, 2013, 2014 Nicira, Inc.
064af421 3 *
a14bc59f
BP
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at:
064af421 7 *
a14bc59f
BP
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
064af421
BP
15 */
16
17#include <config.h>
96fba48f 18#include "dpif-provider.h"
064af421 19
064af421
BP
20#include <ctype.h>
21#include <errno.h>
064af421 22#include <inttypes.h>
064af421
BP
23#include <stdlib.h>
24#include <string.h>
064af421
BP
25
26#include "coverage.h"
27#include "dynamic-string.h"
28#include "flow.h"
c3827f61 29#include "netdev.h"
064af421 30#include "netlink.h"
7fd91025 31#include "odp-execute.h"
064af421 32#include "odp-util.h"
90bf1e07 33#include "ofp-errors.h"
064af421 34#include "ofp-print.h"
71ce9235 35#include "ofp-util.h"
064af421
BP
36#include "ofpbuf.h"
37#include "packets.h"
38#include "poll-loop.h"
999401aa 39#include "shash.h"
d0c23a1a 40#include "sset.h"
c97fb132 41#include "timeval.h"
064af421
BP
42#include "util.h"
43#include "valgrind.h"
064af421 44#include "vlog.h"
5136ce49 45
d98e6007 46VLOG_DEFINE_THIS_MODULE(dpif);
064af421 47
d76f09ea
BP
48COVERAGE_DEFINE(dpif_destroy);
49COVERAGE_DEFINE(dpif_port_add);
50COVERAGE_DEFINE(dpif_port_del);
51COVERAGE_DEFINE(dpif_flow_flush);
52COVERAGE_DEFINE(dpif_flow_get);
53COVERAGE_DEFINE(dpif_flow_put);
54COVERAGE_DEFINE(dpif_flow_del);
d76f09ea
BP
55COVERAGE_DEFINE(dpif_execute);
56COVERAGE_DEFINE(dpif_purge);
7fd91025 57COVERAGE_DEFINE(dpif_execute_with_help);
d76f09ea 58
999401aa 59static const struct dpif_class *base_dpif_classes[] = {
2f51a7eb 60#ifdef __linux__
96fba48f 61 &dpif_linux_class,
c83cdd30 62#endif
72865317 63 &dpif_netdev_class,
c228a364 64};
999401aa
JG
65
66struct registered_dpif_class {
d2d8fbeb 67 const struct dpif_class *dpif_class;
999401aa
JG
68 int refcount;
69};
70static struct shash dpif_classes = SHASH_INITIALIZER(&dpif_classes);
579a77e0 71static struct sset dpif_blacklist = SSET_INITIALIZER(&dpif_blacklist);
c228a364 72
5703b15f 73/* Protects 'dpif_classes', including the refcount, and 'dpif_blacklist'. */
97be1538 74static struct ovs_mutex dpif_mutex = OVS_MUTEX_INITIALIZER;
5703b15f 75
064af421
BP
76/* Rate limit for individual messages going to or from the datapath, output at
77 * DBG level. This is very high because, if these are enabled, it is because
78 * we really need to see them. */
79static struct vlog_rate_limit dpmsg_rl = VLOG_RATE_LIMIT_INIT(600, 600);
80
81/* Not really much point in logging many dpif errors. */
e2781405 82static struct vlog_rate_limit error_rl = VLOG_RATE_LIMIT_INIT(60, 5);
064af421 83
feebdea2
BP
84static void log_flow_message(const struct dpif *dpif, int error,
85 const char *operation,
86 const struct nlattr *key, size_t key_len,
61fb711d 87 const struct nlattr *mask, size_t mask_len,
c97fb132 88 const struct dpif_flow_stats *stats,
feebdea2 89 const struct nlattr *actions, size_t actions_len);
96fba48f
BP
90static void log_operation(const struct dpif *, const char *operation,
91 int error);
96fba48f 92static bool should_log_flow_message(int error);
89625d1e
BP
93static void log_flow_put_message(struct dpif *, const struct dpif_flow_put *,
94 int error);
b99d3cee
BP
95static void log_flow_del_message(struct dpif *, const struct dpif_flow_del *,
96 int error);
89625d1e
BP
97static void log_execute_message(struct dpif *, const struct dpif_execute *,
98 int error);
064af421 99
999401aa
JG
100static void
101dp_initialize(void)
102{
eb8ed438 103 static struct ovsthread_once once = OVSTHREAD_ONCE_INITIALIZER;
999401aa 104
eb8ed438 105 if (ovsthread_once_start(&once)) {
999401aa
JG
106 int i;
107
999401aa
JG
108 for (i = 0; i < ARRAY_SIZE(base_dpif_classes); i++) {
109 dp_register_provider(base_dpif_classes[i]);
110 }
eb8ed438 111 ovsthread_once_done(&once);
999401aa
JG
112 }
113}
114
5703b15f
BP
115static int
116dp_register_provider__(const struct dpif_class *new_class)
999401aa
JG
117{
118 struct registered_dpif_class *registered_class;
119
579a77e0
EJ
120 if (sset_contains(&dpif_blacklist, new_class->type)) {
121 VLOG_DBG("attempted to register blacklisted provider: %s",
122 new_class->type);
123 return EINVAL;
124 }
125
999401aa
JG
126 if (shash_find(&dpif_classes, new_class->type)) {
127 VLOG_WARN("attempted to register duplicate datapath provider: %s",
128 new_class->type);
129 return EEXIST;
130 }
1a6f1e2a 131
999401aa 132 registered_class = xmalloc(sizeof *registered_class);
d2d8fbeb 133 registered_class->dpif_class = new_class;
999401aa
JG
134 registered_class->refcount = 0;
135
136 shash_add(&dpif_classes, new_class->type, registered_class);
137
138 return 0;
139}
140
5703b15f
BP
141/* Registers a new datapath provider. After successful registration, new
142 * datapaths of that type can be opened using dpif_open(). */
143int
144dp_register_provider(const struct dpif_class *new_class)
145{
146 int error;
147
97be1538 148 ovs_mutex_lock(&dpif_mutex);
5703b15f 149 error = dp_register_provider__(new_class);
97be1538 150 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
151
152 return error;
153}
154
999401aa
JG
155/* Unregisters a datapath provider. 'type' must have been previously
156 * registered and not currently be in use by any dpifs. After unregistration
157 * new datapaths of that type cannot be opened using dpif_open(). */
5703b15f
BP
158static int
159dp_unregister_provider__(const char *type)
999401aa
JG
160{
161 struct shash_node *node;
162 struct registered_dpif_class *registered_class;
163
164 node = shash_find(&dpif_classes, type);
165 if (!node) {
166 VLOG_WARN("attempted to unregister a datapath provider that is not "
167 "registered: %s", type);
168 return EAFNOSUPPORT;
169 }
170
171 registered_class = node->data;
172 if (registered_class->refcount) {
173 VLOG_WARN("attempted to unregister in use datapath provider: %s", type);
174 return EBUSY;
175 }
176
177 shash_delete(&dpif_classes, node);
178 free(registered_class);
179
180 return 0;
181}
182
5703b15f
BP
183/* Unregisters a datapath provider. 'type' must have been previously
184 * registered and not currently be in use by any dpifs. After unregistration
185 * new datapaths of that type cannot be opened using dpif_open(). */
186int
187dp_unregister_provider(const char *type)
188{
189 int error;
190
191 dp_initialize();
192
97be1538 193 ovs_mutex_lock(&dpif_mutex);
5703b15f 194 error = dp_unregister_provider__(type);
97be1538 195 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
196
197 return error;
198}
199
579a77e0
EJ
200/* Blacklists a provider. Causes future calls of dp_register_provider() with
201 * a dpif_class which implements 'type' to fail. */
202void
203dp_blacklist_provider(const char *type)
204{
97be1538 205 ovs_mutex_lock(&dpif_mutex);
579a77e0 206 sset_add(&dpif_blacklist, type);
97be1538 207 ovs_mutex_unlock(&dpif_mutex);
579a77e0
EJ
208}
209
999401aa 210/* Clears 'types' and enumerates the types of all currently registered datapath
d0c23a1a 211 * providers into it. The caller must first initialize the sset. */
1a6f1e2a 212void
d0c23a1a 213dp_enumerate_types(struct sset *types)
1a6f1e2a 214{
999401aa 215 struct shash_node *node;
1a6f1e2a 216
999401aa 217 dp_initialize();
d0c23a1a 218 sset_clear(types);
1a6f1e2a 219
97be1538 220 ovs_mutex_lock(&dpif_mutex);
999401aa
JG
221 SHASH_FOR_EACH(node, &dpif_classes) {
222 const struct registered_dpif_class *registered_class = node->data;
d0c23a1a 223 sset_add(types, registered_class->dpif_class->type);
1a6f1e2a 224 }
97be1538 225 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
226}
227
228static void
229dp_class_unref(struct registered_dpif_class *rc)
230{
97be1538 231 ovs_mutex_lock(&dpif_mutex);
5703b15f
BP
232 ovs_assert(rc->refcount);
233 rc->refcount--;
97be1538 234 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
235}
236
237static struct registered_dpif_class *
238dp_class_lookup(const char *type)
239{
240 struct registered_dpif_class *rc;
241
97be1538 242 ovs_mutex_lock(&dpif_mutex);
5703b15f
BP
243 rc = shash_find_data(&dpif_classes, type);
244 if (rc) {
245 rc->refcount++;
246 }
97be1538 247 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
248
249 return rc;
1a6f1e2a
JG
250}
251
252/* Clears 'names' and enumerates the names of all known created datapaths with
d0c23a1a 253 * the given 'type'. The caller must first initialize the sset. Returns 0 if
1a6f1e2a 254 * successful, otherwise a positive errno value.
d3d22744
BP
255 *
256 * Some kinds of datapaths might not be practically enumerable. This is not
257 * considered an error. */
258int
d0c23a1a 259dp_enumerate_names(const char *type, struct sset *names)
d3d22744 260{
5703b15f 261 struct registered_dpif_class *registered_class;
999401aa
JG
262 const struct dpif_class *dpif_class;
263 int error;
d3d22744 264
999401aa 265 dp_initialize();
d0c23a1a 266 sset_clear(names);
1a6f1e2a 267
5703b15f 268 registered_class = dp_class_lookup(type);
999401aa
JG
269 if (!registered_class) {
270 VLOG_WARN("could not enumerate unknown type: %s", type);
271 return EAFNOSUPPORT;
272 }
1a6f1e2a 273
d2d8fbeb 274 dpif_class = registered_class->dpif_class;
999401aa 275 error = dpif_class->enumerate ? dpif_class->enumerate(names) : 0;
999401aa
JG
276 if (error) {
277 VLOG_WARN("failed to enumerate %s datapaths: %s", dpif_class->type,
10a89ef0 278 ovs_strerror(error));
d3d22744 279 }
5703b15f 280 dp_class_unref(registered_class);
1a6f1e2a 281
999401aa 282 return error;
1a6f1e2a
JG
283}
284
54ed8a5d
BP
285/* Parses 'datapath_name_', which is of the form [type@]name into its
286 * component pieces. 'name' and 'type' must be freed by the caller.
287 *
288 * The returned 'type' is normalized, as if by dpif_normalize_type(). */
1a6f1e2a
JG
289void
290dp_parse_name(const char *datapath_name_, char **name, char **type)
291{
292 char *datapath_name = xstrdup(datapath_name_);
293 char *separator;
294
295 separator = strchr(datapath_name, '@');
296 if (separator) {
297 *separator = '\0';
298 *type = datapath_name;
54ed8a5d 299 *name = xstrdup(dpif_normalize_type(separator + 1));
1a6f1e2a
JG
300 } else {
301 *name = datapath_name;
54ed8a5d 302 *type = xstrdup(dpif_normalize_type(NULL));
1a6f1e2a 303 }
d3d22744
BP
304}
305
96fba48f 306static int
1a6f1e2a 307do_open(const char *name, const char *type, bool create, struct dpif **dpifp)
064af421 308{
96fba48f 309 struct dpif *dpif = NULL;
064af421 310 int error;
999401aa
JG
311 struct registered_dpif_class *registered_class;
312
313 dp_initialize();
064af421 314
3a225db7 315 type = dpif_normalize_type(type);
5703b15f 316 registered_class = dp_class_lookup(type);
999401aa
JG
317 if (!registered_class) {
318 VLOG_WARN("could not create datapath %s of unknown type %s", name,
319 type);
320 error = EAFNOSUPPORT;
321 goto exit;
322 }
323
4a387741
BP
324 error = registered_class->dpif_class->open(registered_class->dpif_class,
325 name, create, &dpif);
999401aa 326 if (!error) {
cb22974d 327 ovs_assert(dpif->dpif_class == registered_class->dpif_class);
5703b15f
BP
328 } else {
329 dp_class_unref(registered_class);
064af421 330 }
064af421 331
96fba48f
BP
332exit:
333 *dpifp = error ? NULL : dpif;
334 return error;
064af421
BP
335}
336
1a6f1e2a
JG
337/* Tries to open an existing datapath named 'name' and type 'type'. Will fail
338 * if no datapath with 'name' and 'type' exists. 'type' may be either NULL or
339 * the empty string to specify the default system type. Returns 0 if
340 * successful, otherwise a positive errno value. On success stores a pointer
341 * to the datapath in '*dpifp', otherwise a null pointer. */
96fba48f 342int
1a6f1e2a 343dpif_open(const char *name, const char *type, struct dpif **dpifp)
064af421 344{
1a6f1e2a 345 return do_open(name, type, false, dpifp);
064af421
BP
346}
347
1a6f1e2a
JG
348/* Tries to create and open a new datapath with the given 'name' and 'type'.
349 * 'type' may be either NULL or the empty string to specify the default system
350 * type. Will fail if a datapath with 'name' and 'type' already exists.
351 * Returns 0 if successful, otherwise a positive errno value. On success
352 * stores a pointer to the datapath in '*dpifp', otherwise a null pointer. */
064af421 353int
1a6f1e2a 354dpif_create(const char *name, const char *type, struct dpif **dpifp)
064af421 355{
1a6f1e2a 356 return do_open(name, type, true, dpifp);
96fba48f 357}
064af421 358
1a6f1e2a
JG
359/* Tries to open a datapath with the given 'name' and 'type', creating it if it
360 * does not exist. 'type' may be either NULL or the empty string to specify
361 * the default system type. Returns 0 if successful, otherwise a positive
362 * errno value. On success stores a pointer to the datapath in '*dpifp',
363 * otherwise a null pointer. */
efacbce6 364int
1a6f1e2a 365dpif_create_and_open(const char *name, const char *type, struct dpif **dpifp)
efacbce6
BP
366{
367 int error;
368
1a6f1e2a 369 error = dpif_create(name, type, dpifp);
efacbce6 370 if (error == EEXIST || error == EBUSY) {
1a6f1e2a 371 error = dpif_open(name, type, dpifp);
efacbce6
BP
372 if (error) {
373 VLOG_WARN("datapath %s already exists but cannot be opened: %s",
10a89ef0 374 name, ovs_strerror(error));
efacbce6
BP
375 }
376 } else if (error) {
10a89ef0
BP
377 VLOG_WARN("failed to create datapath %s: %s",
378 name, ovs_strerror(error));
efacbce6
BP
379 }
380 return error;
381}
382
96fba48f
BP
383/* Closes and frees the connection to 'dpif'. Does not destroy the datapath
384 * itself; call dpif_delete() first, instead, if that is desirable. */
385void
386dpif_close(struct dpif *dpif)
387{
388 if (dpif) {
5703b15f 389 struct registered_dpif_class *rc;
999401aa 390
5703b15f 391 rc = shash_find_data(&dpif_classes, dpif->dpif_class->type);
999401aa 392 dpif_uninit(dpif, true);
5703b15f 393 dp_class_unref(rc);
064af421
BP
394 }
395}
396
640e1b20
BP
397/* Performs periodic work needed by 'dpif'. */
398void
399dpif_run(struct dpif *dpif)
400{
401 if (dpif->dpif_class->run) {
402 dpif->dpif_class->run(dpif);
403 }
404}
405
406/* Arranges for poll_block() to wake up when dp_run() needs to be called for
407 * 'dpif'. */
408void
409dpif_wait(struct dpif *dpif)
410{
411 if (dpif->dpif_class->wait) {
412 dpif->dpif_class->wait(dpif);
413 }
414}
415
1a6f1e2a
JG
416/* Returns the name of datapath 'dpif' prefixed with the type
417 * (for use in log messages). */
b29ba128
BP
418const char *
419dpif_name(const struct dpif *dpif)
420{
1a6f1e2a
JG
421 return dpif->full_name;
422}
423
424/* Returns the name of datapath 'dpif' without the type
425 * (for use in device names). */
426const char *
427dpif_base_name(const struct dpif *dpif)
428{
429 return dpif->base_name;
b29ba128
BP
430}
431
c7a26215
JP
432/* Returns the type of datapath 'dpif'. */
433const char *
434dpif_type(const struct dpif *dpif)
435{
436 return dpif->dpif_class->type;
437}
438
3a225db7
BP
439/* Returns the fully spelled out name for the given datapath 'type'.
440 *
441 * Normalized type string can be compared with strcmp(). Unnormalized type
442 * string might be the same even if they have different spellings. */
443const char *
444dpif_normalize_type(const char *type)
445{
446 return type && type[0] ? type : "system";
447}
448
96fba48f
BP
449/* Destroys the datapath that 'dpif' is connected to, first removing all of its
450 * ports. After calling this function, it does not make sense to pass 'dpif'
451 * to any functions other than dpif_name() or dpif_close(). */
064af421
BP
452int
453dpif_delete(struct dpif *dpif)
454{
96fba48f
BP
455 int error;
456
064af421 457 COVERAGE_INC(dpif_destroy);
96fba48f 458
1acb6baa 459 error = dpif->dpif_class->destroy(dpif);
96fba48f
BP
460 log_operation(dpif, "delete", error);
461 return error;
064af421
BP
462}
463
96fba48f
BP
464/* Retrieves statistics for 'dpif' into 'stats'. Returns 0 if successful,
465 * otherwise a positive errno value. */
064af421 466int
a8d9304d 467dpif_get_dp_stats(const struct dpif *dpif, struct dpif_dp_stats *stats)
064af421 468{
1acb6baa 469 int error = dpif->dpif_class->get_stats(dpif, stats);
96fba48f
BP
470 if (error) {
471 memset(stats, 0, sizeof *stats);
472 }
473 log_operation(dpif, "get_stats", error);
474 return error;
064af421
BP
475}
476
0aeaabc8
JP
477const char *
478dpif_port_open_type(const char *datapath_type, const char *port_type)
479{
5703b15f 480 struct registered_dpif_class *rc;
0aeaabc8
JP
481
482 datapath_type = dpif_normalize_type(datapath_type);
483
97be1538 484 ovs_mutex_lock(&dpif_mutex);
5703b15f
BP
485 rc = shash_find_data(&dpif_classes, datapath_type);
486 if (rc && rc->dpif_class->port_open_type) {
487 port_type = rc->dpif_class->port_open_type(rc->dpif_class, port_type);
0aeaabc8 488 }
97be1538 489 ovs_mutex_unlock(&dpif_mutex);
0aeaabc8 490
5703b15f 491 return port_type;
0aeaabc8
JP
492}
493
232dfa4a 494/* Attempts to add 'netdev' as a port on 'dpif'. If 'port_nop' is
4e022ec0 495 * non-null and its value is not ODPP_NONE, then attempts to use the
232dfa4a
JP
496 * value as the port number.
497 *
498 * If successful, returns 0 and sets '*port_nop' to the new port's port
499 * number (if 'port_nop' is non-null). On failure, returns a positive
4e022ec0 500 * errno value and sets '*port_nop' to ODPP_NONE (if 'port_nop' is
232dfa4a 501 * non-null). */
064af421 502int
4e022ec0 503dpif_port_add(struct dpif *dpif, struct netdev *netdev, odp_port_t *port_nop)
064af421 504{
c3827f61 505 const char *netdev_name = netdev_get_name(netdev);
4e022ec0 506 odp_port_t port_no = ODPP_NONE;
9ee3ae3e 507 int error;
064af421
BP
508
509 COVERAGE_INC(dpif_port_add);
9ee3ae3e 510
232dfa4a
JP
511 if (port_nop) {
512 port_no = *port_nop;
513 }
514
c3827f61 515 error = dpif->dpif_class->port_add(dpif, netdev, &port_no);
9ee3ae3e 516 if (!error) {
9b56fe13 517 VLOG_DBG_RL(&dpmsg_rl, "%s: added %s as port %"PRIu32,
c3827f61 518 dpif_name(dpif), netdev_name, port_no);
064af421 519 } else {
9ee3ae3e 520 VLOG_WARN_RL(&error_rl, "%s: failed to add %s as port: %s",
10a89ef0 521 dpif_name(dpif), netdev_name, ovs_strerror(error));
4e022ec0 522 port_no = ODPP_NONE;
9ee3ae3e
BP
523 }
524 if (port_nop) {
525 *port_nop = port_no;
064af421 526 }
9ee3ae3e 527 return error;
064af421
BP
528}
529
96fba48f
BP
530/* Attempts to remove 'dpif''s port number 'port_no'. Returns 0 if successful,
531 * otherwise a positive errno value. */
064af421 532int
4e022ec0 533dpif_port_del(struct dpif *dpif, odp_port_t port_no)
064af421 534{
96fba48f
BP
535 int error;
536
064af421 537 COVERAGE_INC(dpif_port_del);
96fba48f 538
1acb6baa 539 error = dpif->dpif_class->port_del(dpif, port_no);
a1811296 540 if (!error) {
9b56fe13 541 VLOG_DBG_RL(&dpmsg_rl, "%s: port_del(%"PRIu32")",
a1811296
BP
542 dpif_name(dpif), port_no);
543 } else {
544 log_operation(dpif, "port_del", error);
545 }
96fba48f 546 return error;
064af421
BP
547}
548
4c738a8d
BP
549/* Makes a deep copy of 'src' into 'dst'. */
550void
551dpif_port_clone(struct dpif_port *dst, const struct dpif_port *src)
552{
553 dst->name = xstrdup(src->name);
554 dst->type = xstrdup(src->type);
555 dst->port_no = src->port_no;
556}
557
558/* Frees memory allocated to members of 'dpif_port'.
559 *
560 * Do not call this function on a dpif_port obtained from
561 * dpif_port_dump_next(): that function retains ownership of the data in the
562 * dpif_port. */
563void
564dpif_port_destroy(struct dpif_port *dpif_port)
565{
566 free(dpif_port->name);
567 free(dpif_port->type);
568}
569
4afba28d
JP
570/* Checks if port named 'devname' exists in 'dpif'. If so, returns
571 * true; otherwise, returns false. */
572bool
573dpif_port_exists(const struct dpif *dpif, const char *devname)
574{
575 int error = dpif->dpif_class->port_query_by_name(dpif, devname, NULL);
bee6b8bc 576 if (error != 0 && error != ENOENT && error != ENODEV) {
4afba28d 577 VLOG_WARN_RL(&error_rl, "%s: failed to query port %s: %s",
10a89ef0 578 dpif_name(dpif), devname, ovs_strerror(error));
4afba28d
JP
579 }
580
581 return !error;
582}
583
96fba48f
BP
584/* Looks up port number 'port_no' in 'dpif'. On success, returns 0 and
585 * initializes '*port' appropriately; on failure, returns a positive errno
4c738a8d
BP
586 * value.
587 *
588 * The caller owns the data in 'port' and must free it with
589 * dpif_port_destroy() when it is no longer needed. */
064af421 590int
4e022ec0 591dpif_port_query_by_number(const struct dpif *dpif, odp_port_t port_no,
4c738a8d 592 struct dpif_port *port)
064af421 593{
1acb6baa 594 int error = dpif->dpif_class->port_query_by_number(dpif, port_no, port);
96fba48f 595 if (!error) {
9b56fe13 596 VLOG_DBG_RL(&dpmsg_rl, "%s: port %"PRIu32" is device %s",
4c738a8d 597 dpif_name(dpif), port_no, port->name);
064af421 598 } else {
96fba48f 599 memset(port, 0, sizeof *port);
9b56fe13 600 VLOG_WARN_RL(&error_rl, "%s: failed to query port %"PRIu32": %s",
10a89ef0 601 dpif_name(dpif), port_no, ovs_strerror(error));
064af421 602 }
96fba48f 603 return error;
064af421
BP
604}
605
96fba48f
BP
606/* Looks up port named 'devname' in 'dpif'. On success, returns 0 and
607 * initializes '*port' appropriately; on failure, returns a positive errno
4c738a8d
BP
608 * value.
609 *
610 * The caller owns the data in 'port' and must free it with
611 * dpif_port_destroy() when it is no longer needed. */
064af421
BP
612int
613dpif_port_query_by_name(const struct dpif *dpif, const char *devname,
4c738a8d 614 struct dpif_port *port)
064af421 615{
1acb6baa 616 int error = dpif->dpif_class->port_query_by_name(dpif, devname, port);
96fba48f 617 if (!error) {
9b56fe13 618 VLOG_DBG_RL(&dpmsg_rl, "%s: device %s is on port %"PRIu32,
4c738a8d 619 dpif_name(dpif), devname, port->port_no);
064af421 620 } else {
96fba48f
BP
621 memset(port, 0, sizeof *port);
622
d647f0a7
BP
623 /* For ENOENT or ENODEV we use DBG level because the caller is probably
624 * interested in whether 'dpif' actually has a port 'devname', so that
625 * it's not an issue worth logging if it doesn't. Other errors are
626 * uncommon and more likely to indicate a real problem. */
627 VLOG_RL(&error_rl,
628 error == ENOENT || error == ENODEV ? VLL_DBG : VLL_WARN,
629 "%s: failed to query port %s: %s",
10a89ef0 630 dpif_name(dpif), devname, ovs_strerror(error));
064af421 631 }
96fba48f 632 return error;
064af421
BP
633}
634
98403001
BP
635/* Returns the Netlink PID value to supply in OVS_ACTION_ATTR_USERSPACE actions
636 * as the OVS_USERSPACE_ATTR_PID attribute's value, for use in flows whose
637 * packets arrived on port 'port_no'.
638 *
4e022ec0 639 * A 'port_no' of ODPP_NONE is a special case: it returns a reserved PID, not
625b0720
BP
640 * allocated to any port, that the client may use for special purposes.
641 *
98403001
BP
642 * The return value is only meaningful when DPIF_UC_ACTION has been enabled in
643 * the 'dpif''s listen mask. It is allowed to change when DPIF_UC_ACTION is
644 * disabled and then re-enabled, so a client that does that must be prepared to
645 * update all of the flows that it installed that contain
646 * OVS_ACTION_ATTR_USERSPACE actions. */
647uint32_t
4e022ec0 648dpif_port_get_pid(const struct dpif *dpif, odp_port_t port_no)
98403001
BP
649{
650 return (dpif->dpif_class->port_get_pid
651 ? (dpif->dpif_class->port_get_pid)(dpif, port_no)
652 : 0);
653}
654
96fba48f
BP
655/* Looks up port number 'port_no' in 'dpif'. On success, returns 0 and copies
656 * the port's name into the 'name_size' bytes in 'name', ensuring that the
657 * result is null-terminated. On failure, returns a positive errno value and
658 * makes 'name' the empty string. */
335562c0 659int
4e022ec0 660dpif_port_get_name(struct dpif *dpif, odp_port_t port_no,
335562c0
BP
661 char *name, size_t name_size)
662{
4c738a8d 663 struct dpif_port port;
335562c0
BP
664 int error;
665
cb22974d 666 ovs_assert(name_size > 0);
335562c0
BP
667
668 error = dpif_port_query_by_number(dpif, port_no, &port);
669 if (!error) {
4c738a8d
BP
670 ovs_strlcpy(name, port.name, name_size);
671 dpif_port_destroy(&port);
335562c0
BP
672 } else {
673 *name = '\0';
674 }
675 return error;
676}
677
b0ec0f27 678/* Initializes 'dump' to begin dumping the ports in a dpif.
96fba48f 679 *
b0ec0f27
BP
680 * This function provides no status indication. An error status for the entire
681 * dump operation is provided when it is completed by calling
682 * dpif_port_dump_done().
683 */
684void
685dpif_port_dump_start(struct dpif_port_dump *dump, const struct dpif *dpif)
686{
687 dump->dpif = dpif;
688 dump->error = dpif->dpif_class->port_dump_start(dpif, &dump->state);
689 log_operation(dpif, "port_dump_start", dump->error);
690}
691
692/* Attempts to retrieve another port from 'dump', which must have been
4c738a8d 693 * initialized with dpif_port_dump_start(). On success, stores a new dpif_port
b0ec0f27 694 * into 'port' and returns true. On failure, returns false.
96fba48f 695 *
b0ec0f27
BP
696 * Failure might indicate an actual error or merely that the last port has been
697 * dumped. An error status for the entire dump operation is provided when it
4c738a8d
BP
698 * is completed by calling dpif_port_dump_done().
699 *
700 * The dpif owns the data stored in 'port'. It will remain valid until at
701 * least the next time 'dump' is passed to dpif_port_dump_next() or
702 * dpif_port_dump_done(). */
b0ec0f27 703bool
4c738a8d 704dpif_port_dump_next(struct dpif_port_dump *dump, struct dpif_port *port)
064af421 705{
b0ec0f27 706 const struct dpif *dpif = dump->dpif;
064af421 707
b0ec0f27
BP
708 if (dump->error) {
709 return false;
710 }
f4ba4c4f 711
b0ec0f27
BP
712 dump->error = dpif->dpif_class->port_dump_next(dpif, dump->state, port);
713 if (dump->error == EOF) {
714 VLOG_DBG_RL(&dpmsg_rl, "%s: dumped all ports", dpif_name(dpif));
715 } else {
716 log_operation(dpif, "port_dump_next", dump->error);
717 }
064af421 718
b0ec0f27
BP
719 if (dump->error) {
720 dpif->dpif_class->port_dump_done(dpif, dump->state);
721 return false;
f4ba4c4f 722 }
b0ec0f27
BP
723 return true;
724}
064af421 725
b0ec0f27
BP
726/* Completes port table dump operation 'dump', which must have been initialized
727 * with dpif_port_dump_start(). Returns 0 if the dump operation was
728 * error-free, otherwise a positive errno value describing the problem. */
729int
730dpif_port_dump_done(struct dpif_port_dump *dump)
731{
732 const struct dpif *dpif = dump->dpif;
733 if (!dump->error) {
734 dump->error = dpif->dpif_class->port_dump_done(dpif, dump->state);
735 log_operation(dpif, "port_dump_done", dump->error);
f4ba4c4f 736 }
b0ec0f27 737 return dump->error == EOF ? 0 : dump->error;
064af421
BP
738}
739
e9e28be3
BP
740/* Polls for changes in the set of ports in 'dpif'. If the set of ports in
741 * 'dpif' has changed, this function does one of the following:
742 *
743 * - Stores the name of the device that was added to or deleted from 'dpif' in
744 * '*devnamep' and returns 0. The caller is responsible for freeing
745 * '*devnamep' (with free()) when it no longer needs it.
746 *
747 * - Returns ENOBUFS and sets '*devnamep' to NULL.
748 *
749 * This function may also return 'false positives', where it returns 0 and
750 * '*devnamep' names a device that was not actually added or deleted or it
751 * returns ENOBUFS without any change.
752 *
753 * Returns EAGAIN if the set of ports in 'dpif' has not changed. May also
754 * return other positive errno values to indicate that something has gone
755 * wrong. */
756int
757dpif_port_poll(const struct dpif *dpif, char **devnamep)
758{
1acb6baa 759 int error = dpif->dpif_class->port_poll(dpif, devnamep);
e9e28be3
BP
760 if (error) {
761 *devnamep = NULL;
762 }
763 return error;
764}
765
766/* Arranges for the poll loop to wake up when port_poll(dpif) will return a
767 * value other than EAGAIN. */
768void
769dpif_port_poll_wait(const struct dpif *dpif)
770{
1acb6baa 771 dpif->dpif_class->port_poll_wait(dpif);
e9e28be3
BP
772}
773
572b7068 774/* Extracts the flow stats for a packet. The 'flow' and 'packet'
a7752d4a
BP
775 * arguments must have been initialized through a call to flow_extract().
776 * 'used' is stored into stats->used. */
572b7068 777void
a39edbd4 778dpif_flow_stats_extract(const struct flow *flow, const struct ofpbuf *packet,
a7752d4a 779 long long int used, struct dpif_flow_stats *stats)
572b7068 780{
e0eecb1c 781 stats->tcp_flags = ntohs(flow->tcp_flags);
572b7068
BP
782 stats->n_bytes = packet->size;
783 stats->n_packets = 1;
a7752d4a 784 stats->used = used;
572b7068
BP
785}
786
c97fb132
BP
787/* Appends a human-readable representation of 'stats' to 's'. */
788void
789dpif_flow_stats_format(const struct dpif_flow_stats *stats, struct ds *s)
790{
791 ds_put_format(s, "packets:%"PRIu64", bytes:%"PRIu64", used:",
792 stats->n_packets, stats->n_bytes);
793 if (stats->used) {
794 ds_put_format(s, "%.3fs", (time_msec() - stats->used) / 1000.0);
795 } else {
796 ds_put_format(s, "never");
797 }
7393104d
BP
798 if (stats->tcp_flags) {
799 ds_put_cstr(s, ", flags:");
800 packet_format_tcp_flags(s, stats->tcp_flags);
801 }
c97fb132
BP
802}
803
96fba48f
BP
804/* Deletes all flows from 'dpif'. Returns 0 if successful, otherwise a
805 * positive errno value. */
806int
807dpif_flow_flush(struct dpif *dpif)
064af421 808{
96fba48f
BP
809 int error;
810
811 COVERAGE_INC(dpif_flow_flush);
812
1acb6baa 813 error = dpif->dpif_class->flow_flush(dpif);
96fba48f
BP
814 log_operation(dpif, "flow_flush", error);
815 return error;
064af421
BP
816}
817
feebdea2 818/* Queries 'dpif' for a flow entry. The flow is specified by the Netlink
df2c07f4 819 * attributes with types OVS_KEY_ATTR_* in the 'key_len' bytes starting at
feebdea2 820 * 'key'.
96fba48f 821 *
feebdea2
BP
822 * Returns 0 if successful. If no flow matches, returns ENOENT. On other
823 * failure, returns a positive errno value.
96fba48f 824 *
feebdea2
BP
825 * If 'actionsp' is nonnull, then on success '*actionsp' will be set to an
826 * ofpbuf owned by the caller that contains the Netlink attributes for the
827 * flow's actions. The caller must free the ofpbuf (with ofpbuf_delete()) when
828 * it is no longer needed.
829 *
830 * If 'stats' is nonnull, then on success it will be updated with the flow's
831 * statistics. */
96fba48f 832int
693c4a01 833dpif_flow_get(const struct dpif *dpif,
feebdea2 834 const struct nlattr *key, size_t key_len,
c97fb132 835 struct ofpbuf **actionsp, struct dpif_flow_stats *stats)
064af421 836{
96fba48f
BP
837 int error;
838
839 COVERAGE_INC(dpif_flow_get);
840
693c4a01 841 error = dpif->dpif_class->flow_get(dpif, key, key_len, actionsp, stats);
b843fa1b 842 if (error) {
feebdea2
BP
843 if (actionsp) {
844 *actionsp = NULL;
845 }
846 if (stats) {
847 memset(stats, 0, sizeof *stats);
848 }
b843fa1b 849 }
96fba48f 850 if (should_log_flow_message(error)) {
feebdea2
BP
851 const struct nlattr *actions;
852 size_t actions_len;
853
854 if (!error && actionsp) {
855 actions = (*actionsp)->data;
856 actions_len = (*actionsp)->size;
857 } else {
858 actions = NULL;
859 actions_len = 0;
860 }
61fb711d
JP
861 log_flow_message(dpif, error, "flow_get", key, key_len,
862 NULL, 0, stats, actions, actions_len);
064af421 863 }
96fba48f 864 return error;
064af421
BP
865}
866
89625d1e
BP
867static int
868dpif_flow_put__(struct dpif *dpif, const struct dpif_flow_put *put)
869{
870 int error;
871
872 COVERAGE_INC(dpif_flow_put);
cb22974d
BP
873 ovs_assert(!(put->flags & ~(DPIF_FP_CREATE | DPIF_FP_MODIFY
874 | DPIF_FP_ZERO_STATS)));
89625d1e
BP
875
876 error = dpif->dpif_class->flow_put(dpif, put);
877 if (error && put->stats) {
878 memset(put->stats, 0, sizeof *put->stats);
879 }
880 log_flow_put_message(dpif, put, error);
881 return error;
882}
883
feebdea2 884/* Adds or modifies a flow in 'dpif'. The flow is specified by the Netlink
e6cc0bab 885 * attribute OVS_FLOW_ATTR_KEY with types OVS_KEY_ATTR_* in the 'key_len' bytes
ee75c546
BP
886 * starting at 'key', and OVS_FLOW_ATTR_MASK with types of OVS_KEY_ATTR_* in
887 * the 'mask_len' bytes starting at 'mask'. The associated actions are
888 * specified by the Netlink attributes with types OVS_ACTION_ATTR_* in the
889 * 'actions_len' bytes starting at 'actions'.
96fba48f 890 *
feebdea2 891 * - If the flow's key does not exist in 'dpif', then the flow will be added if
ba25b8f4 892 * 'flags' includes DPIF_FP_CREATE. Otherwise the operation will fail with
96fba48f
BP
893 * ENOENT.
894 *
ee75c546
BP
895 * The datapath may reject attempts to insert overlapping flows with EINVAL
896 * or EEXIST, but clients should not rely on this: avoiding overlapping flows
897 * is primarily the client's responsibility.
898 *
feebdea2 899 * If the operation succeeds, then 'stats', if nonnull, will be zeroed.
96fba48f 900 *
feebdea2 901 * - If the flow's key does exist in 'dpif', then the flow's actions will be
ba25b8f4 902 * updated if 'flags' includes DPIF_FP_MODIFY. Otherwise the operation will
feebdea2 903 * fail with EEXIST. If the flow's actions are updated, then its statistics
ba25b8f4 904 * will be zeroed if 'flags' includes DPIF_FP_ZERO_STATS, and left as-is
feebdea2
BP
905 * otherwise.
906 *
907 * If the operation succeeds, then 'stats', if nonnull, will be set to the
908 * flow's statistics before the update.
96fba48f 909 */
064af421 910int
ba25b8f4 911dpif_flow_put(struct dpif *dpif, enum dpif_flow_put_flags flags,
feebdea2 912 const struct nlattr *key, size_t key_len,
e6cc0bab 913 const struct nlattr *mask, size_t mask_len,
feebdea2 914 const struct nlattr *actions, size_t actions_len,
c97fb132 915 struct dpif_flow_stats *stats)
064af421 916{
89625d1e
BP
917 struct dpif_flow_put put;
918
919 put.flags = flags;
920 put.key = key;
921 put.key_len = key_len;
e6cc0bab
AZ
922 put.mask = mask;
923 put.mask_len = mask_len;
89625d1e
BP
924 put.actions = actions;
925 put.actions_len = actions_len;
926 put.stats = stats;
927 return dpif_flow_put__(dpif, &put);
064af421
BP
928}
929
b99d3cee
BP
930static int
931dpif_flow_del__(struct dpif *dpif, struct dpif_flow_del *del)
932{
933 int error;
934
935 COVERAGE_INC(dpif_flow_del);
936
937 error = dpif->dpif_class->flow_del(dpif, del);
938 if (error && del->stats) {
939 memset(del->stats, 0, sizeof *del->stats);
940 }
941 log_flow_del_message(dpif, del, error);
942 return error;
943}
944
feebdea2
BP
945/* Deletes a flow from 'dpif' and returns 0, or returns ENOENT if 'dpif' does
946 * not contain such a flow. The flow is specified by the Netlink attributes
df2c07f4 947 * with types OVS_KEY_ATTR_* in the 'key_len' bytes starting at 'key'.
96fba48f 948 *
feebdea2
BP
949 * If the operation succeeds, then 'stats', if nonnull, will be set to the
950 * flow's statistics before its deletion. */
064af421 951int
feebdea2
BP
952dpif_flow_del(struct dpif *dpif,
953 const struct nlattr *key, size_t key_len,
c97fb132 954 struct dpif_flow_stats *stats)
064af421 955{
b99d3cee 956 struct dpif_flow_del del;
f1aa2072 957
b99d3cee
BP
958 del.key = key;
959 del.key_len = key_len;
960 del.stats = stats;
961 return dpif_flow_del__(dpif, &del);
064af421
BP
962}
963
e723fd32
JS
964/* Allocates thread-local state for use with the 'flow_dump_next' function for
965 * 'dpif'. On return, initializes '*statep' with any private data needed for
966 * iteration. */
967void
968dpif_flow_dump_state_init(const struct dpif *dpif, void **statep)
969{
970 dpif->dpif_class->flow_dump_state_init(statep);
971}
972
973/* Releases 'state' which was initialized by a call to the
974 * 'flow_dump_state_init' function for 'dpif'. */
975void
976dpif_flow_dump_state_uninit(const struct dpif *dpif, void *state)
977{
978 dpif->dpif_class->flow_dump_state_uninit(state);
979}
980
938eaa50
JS
981/* Initializes 'dump' to begin dumping the flows in a dpif. On sucess,
982 * initializes 'dump' with any data needed for iteration and returns 0.
983 * Otherwise, returns a positive errno value describing the problem. */
984int
704a1e09 985dpif_flow_dump_start(struct dpif_flow_dump *dump, const struct dpif *dpif)
064af421 986{
938eaa50 987 int error;
704a1e09 988 dump->dpif = dpif;
938eaa50
JS
989 error = dpif->dpif_class->flow_dump_start(dpif, &dump->iter);
990 log_operation(dpif, "flow_dump_start", error);
991 return error;
064af421
BP
992}
993
d2ad7ef1 994/* Attempts to retrieve another flow from 'dump', using 'state' for
938eaa50
JS
995 * thread-local storage. 'dump' must have been initialized with a successful
996 * call to dpif_flow_dump_start(), and 'state' must have been initialized with
d2ad7ef1
JS
997 * dpif_flow_state_init().
998 *
999 * On success, updates the output parameters as described below and returns
1000 * true. Otherwise, returns false. Failure might indicate an actual error or
1001 * merely the end of the flow table. An error status for the entire dump
1002 * operation is provided when it is completed by calling dpif_flow_dump_done().
1003 * Multiple threads may use the same 'dump' with this function, but all other
1004 * parameters must not be shared.
feebdea2
BP
1005 *
1006 * On success, if 'key' and 'key_len' are nonnull then '*key' and '*key_len'
df2c07f4 1007 * will be set to Netlink attributes with types OVS_KEY_ATTR_* representing the
feebdea2 1008 * dumped flow's key. If 'actions' and 'actions_len' are nonnull then they are
df2c07f4 1009 * set to Netlink attributes with types OVS_ACTION_ATTR_* representing the
7aec165d
BP
1010 * dumped flow's actions. If 'stats' is nonnull then it will be set to the
1011 * dumped flow's statistics.
96fba48f 1012 *
feebdea2
BP
1013 * All of the returned data is owned by 'dpif', not by the caller, and the
1014 * caller must not modify or free it. 'dpif' guarantees that it remains
1015 * accessible and unchanging until at least the next call to 'flow_dump_next'
d2ad7ef1 1016 * or 'flow_dump_done' for 'dump' and 'state'. */
704a1e09 1017bool
d2ad7ef1 1018dpif_flow_dump_next(struct dpif_flow_dump *dump, void *state,
feebdea2 1019 const struct nlattr **key, size_t *key_len,
e6cc0bab 1020 const struct nlattr **mask, size_t *mask_len,
feebdea2 1021 const struct nlattr **actions, size_t *actions_len,
c97fb132 1022 const struct dpif_flow_stats **stats)
704a1e09
BP
1023{
1024 const struct dpif *dpif = dump->dpif;
938eaa50 1025 int error;
064af421 1026
938eaa50
JS
1027 error = dpif->dpif_class->flow_dump_next(dpif, dump->iter, state,
1028 key, key_len, mask, mask_len,
1029 actions, actions_len, stats);
feebdea2
BP
1030 if (error) {
1031 if (key) {
1032 *key = NULL;
1033 *key_len = 0;
36956a7d 1034 }
e6cc0bab
AZ
1035 if (mask) {
1036 *mask = NULL;
1037 *mask_len = 0;
1038 }
feebdea2
BP
1039 if (actions) {
1040 *actions = NULL;
1041 *actions_len = 0;
1042 }
1043 if (stats) {
1044 *stats = NULL;
704a1e09 1045 }
064af421 1046 }
938eaa50
JS
1047 if (error == EOF) {
1048 VLOG_DBG_RL(&dpmsg_rl, "%s: dumped all flows", dpif_name(dpif));
1049 } else if (should_log_flow_message(error)) {
1050 log_flow_message(dpif, error, "flow_dump",
1051 key ? *key : NULL, key ? *key_len : 0,
1052 mask ? *mask : NULL, mask ? *mask_len : 0,
1053 stats ? *stats : NULL, actions ? *actions : NULL,
1054 actions ? *actions_len : 0);
064af421 1055 }
feebdea2 1056 return !error;
704a1e09
BP
1057}
1058
bdeadfdd
JS
1059/* Determines whether the next call to 'dpif_flow_dump_next' for 'dump' and
1060 * 'state' will modify or free the keys that it previously returned. 'state'
1061 * must have been initialized by a call to 'dpif_flow_dump_state_init' for
1062 * 'dump'.
1063 *
1064 * 'dpif' guarantees that data returned by flow_dump_next() will remain
1065 * accessible and unchanging until the next call. This function provides a way
1066 * for callers to determine whether that guarantee extends beyond the next
1067 * call.
1068 *
1069 * Returns true if the next call to flow_dump_next() is expected to be
1070 * destructive to previously returned keys for 'state', false otherwise. */
1071bool
1072dpif_flow_dump_next_may_destroy_keys(struct dpif_flow_dump *dump, void *state)
1073{
1074 const struct dpif *dpif = dump->dpif;
1075 return (dpif->dpif_class->flow_dump_next_may_destroy_keys
1076 ? dpif->dpif_class->flow_dump_next_may_destroy_keys(state)
1077 : true);
1078}
1079
704a1e09 1080/* Completes flow table dump operation 'dump', which must have been initialized
938eaa50
JS
1081 * with a successful call to dpif_flow_dump_start(). Returns 0 if the dump
1082 * operation was error-free, otherwise a positive errno value describing the
1083 * problem. */
704a1e09
BP
1084int
1085dpif_flow_dump_done(struct dpif_flow_dump *dump)
1086{
1087 const struct dpif *dpif = dump->dpif;
938eaa50
JS
1088 int error = dpif->dpif_class->flow_dump_done(dpif, dump->iter);
1089 log_operation(dpif, "flow_dump_done", error);
1090 return error == EOF ? 0 : error;
064af421
BP
1091}
1092
7fd91025
BP
1093struct dpif_execute_helper_aux {
1094 struct dpif *dpif;
1095 int error;
1096};
1097
09f9da0b
JR
1098/* This is called for actions that need the context of the datapath to be
1099 * meaningful. */
7fd91025 1100static void
758c456d
JR
1101dpif_execute_helper_cb(void *aux_, struct ofpbuf *packet,
1102 const struct pkt_metadata *md,
09f9da0b 1103 const struct nlattr *action, bool may_steal OVS_UNUSED)
7fd91025 1104{
758c456d
JR
1105 struct dpif_execute_helper_aux *aux = aux_;
1106 struct dpif_execute execute;
09f9da0b 1107 int type = nl_attr_type(action);
758c456d 1108
09f9da0b
JR
1109 switch ((enum ovs_action_attr)type) {
1110 case OVS_ACTION_ATTR_OUTPUT:
1111 case OVS_ACTION_ATTR_USERSPACE:
758c456d
JR
1112 execute.actions = action;
1113 execute.actions_len = NLA_ALIGN(action->nla_len);
1114 execute.packet = packet;
1115 execute.md = *md;
1116 execute.needs_help = false;
1117 aux->error = aux->dpif->dpif_class->execute(aux->dpif, &execute);
09f9da0b 1118 break;
758c456d 1119
09f9da0b
JR
1120 case OVS_ACTION_ATTR_PUSH_VLAN:
1121 case OVS_ACTION_ATTR_POP_VLAN:
1122 case OVS_ACTION_ATTR_PUSH_MPLS:
1123 case OVS_ACTION_ATTR_POP_MPLS:
1124 case OVS_ACTION_ATTR_SET:
1125 case OVS_ACTION_ATTR_SAMPLE:
1126 case OVS_ACTION_ATTR_UNSPEC:
1127 case __OVS_ACTION_ATTR_MAX:
1128 OVS_NOT_REACHED();
1129 }
7fd91025
BP
1130}
1131
1132/* Executes 'execute' by performing most of the actions in userspace and
1133 * passing the fully constructed packets to 'dpif' for output and userspace
1134 * actions.
1135 *
1136 * This helps with actions that a given 'dpif' doesn't implement directly. */
1137static int
758c456d 1138dpif_execute_with_help(struct dpif *dpif, struct dpif_execute *execute)
7fd91025 1139{
758c456d 1140 struct dpif_execute_helper_aux aux = {dpif, 0};
7fd91025
BP
1141
1142 COVERAGE_INC(dpif_execute_with_help);
1143
758c456d 1144 odp_execute_actions(&aux, execute->packet, &execute->md,
7fd91025 1145 execute->actions, execute->actions_len,
09f9da0b 1146 dpif_execute_helper_cb);
7fd91025
BP
1147 return aux.error;
1148}
1149
758c456d
JR
1150/* Causes 'dpif' to perform the 'execute->actions_len' bytes of actions in
1151 * 'execute->actions' on the Ethernet frame in 'execute->packet' and on packet
1152 * metadata in 'execute->md'. The implementation is allowed to modify both the
1153 * '*execute->packet' and 'execute->md'.
1154 *
1155 * Some dpif providers do not implement every action. The Linux kernel
1156 * datapath, in particular, does not implement ARP field modification. If
1157 * 'needs_help' is true, the dpif layer executes in userspace all of the
1158 * actions that it can, and for OVS_ACTION_ATTR_OUTPUT and
1159 * OVS_ACTION_ATTR_USERSPACE actions it passes the packet through to the dpif
1160 * implementation.
1161 *
1162 * This works even if 'execute->actions_len' is too long for a Netlink
1163 * attribute.
1164 *
1165 * Returns 0 if successful, otherwise a positive errno value. */
1166int
1167dpif_execute(struct dpif *dpif, struct dpif_execute *execute)
89625d1e
BP
1168{
1169 int error;
1170
1171 COVERAGE_INC(dpif_execute);
1172 if (execute->actions_len > 0) {
758c456d 1173 error = (execute->needs_help || nl_attr_oversized(execute->actions_len)
7fd91025
BP
1174 ? dpif_execute_with_help(dpif, execute)
1175 : dpif->dpif_class->execute(dpif, execute));
89625d1e
BP
1176 } else {
1177 error = 0;
1178 }
1179
1180 log_execute_message(dpif, execute, error);
1181
1182 return error;
1183}
1184
6bc60024
BP
1185/* Executes each of the 'n_ops' operations in 'ops' on 'dpif', in the order in
1186 * which they are specified, placing each operation's results in the "output"
1187 * members documented in comments.
1188 *
1189 * This function exists because some datapaths can perform batched operations
1190 * faster than individual operations. */
1191void
c2b565b5 1192dpif_operate(struct dpif *dpif, struct dpif_op **ops, size_t n_ops)
6bc60024 1193{
6bc60024 1194 if (dpif->dpif_class->operate) {
7fd91025
BP
1195 while (n_ops > 0) {
1196 size_t chunk;
1197
1198 /* Count 'chunk', the number of ops that can be executed without
1199 * needing any help. Ops that need help should be rare, so we
1200 * expect this to ordinarily be 'n_ops', that is, all the ops. */
1201 for (chunk = 0; chunk < n_ops; chunk++) {
1202 struct dpif_op *op = ops[chunk];
1203
1204 if (op->type == DPIF_OP_EXECUTE && op->u.execute.needs_help) {
1205 break;
1206 }
1207 }
1208
1209 if (chunk) {
1210 /* Execute a chunk full of ops that the dpif provider can
1211 * handle itself, without help. */
1212 size_t i;
1213
1214 dpif->dpif_class->operate(dpif, ops, chunk);
1215
1216 for (i = 0; i < chunk; i++) {
1217 struct dpif_op *op = ops[i];
1218
1219 switch (op->type) {
1220 case DPIF_OP_FLOW_PUT:
1221 log_flow_put_message(dpif, &op->u.flow_put, op->error);
1222 break;
1223
1224 case DPIF_OP_FLOW_DEL:
1225 log_flow_del_message(dpif, &op->u.flow_del, op->error);
1226 break;
1227
1228 case DPIF_OP_EXECUTE:
1229 log_execute_message(dpif, &op->u.execute, op->error);
1230 break;
1231 }
1232 }
1233
1234 ops += chunk;
1235 n_ops -= chunk;
1236 } else {
1237 /* Help the dpif provider to execute one op. */
1238 struct dpif_op *op = ops[0];
1239
758c456d 1240 op->error = dpif_execute(dpif, &op->u.execute);
7fd91025
BP
1241 ops++;
1242 n_ops--;
1243 }
1244 }
1245 } else {
1246 size_t i;
f23d2845
BP
1247
1248 for (i = 0; i < n_ops; i++) {
1249 struct dpif_op *op = ops[i];
1250
1251 switch (op->type) {
1252 case DPIF_OP_FLOW_PUT:
7fd91025 1253 op->error = dpif_flow_put__(dpif, &op->u.flow_put);
f23d2845
BP
1254 break;
1255
b99d3cee 1256 case DPIF_OP_FLOW_DEL:
7fd91025 1257 op->error = dpif_flow_del__(dpif, &op->u.flow_del);
b99d3cee
BP
1258 break;
1259
f23d2845 1260 case DPIF_OP_EXECUTE:
758c456d 1261 op->error = dpif_execute(dpif, &op->u.execute);
f23d2845 1262 break;
b99d3cee 1263
7fd91025 1264 default:
428b2edd 1265 OVS_NOT_REACHED();
7fd91025 1266 }
6bc60024
BP
1267 }
1268 }
1269}
1270
01545c1a
BP
1271/* Returns a string that represents 'type', for use in log messages. */
1272const char *
1273dpif_upcall_type_to_string(enum dpif_upcall_type type)
1274{
1275 switch (type) {
1276 case DPIF_UC_MISS: return "miss";
1277 case DPIF_UC_ACTION: return "action";
01545c1a
BP
1278 case DPIF_N_UC_TYPES: default: return "<unknown>";
1279 }
1280}
1281
a12b3ead
BP
1282/* Enables or disables receiving packets with dpif_recv() on 'dpif'. Returns 0
1283 * if successful, otherwise a positive errno value.
98403001 1284 *
a12b3ead 1285 * Turning packet receive off and then back on may change the Netlink PID
98403001
BP
1286 * assignments returned by dpif_port_get_pid(). If the client does this, it
1287 * must update all of the flows that have OVS_ACTION_ATTR_USERSPACE actions
1288 * using the new PID assignment. */
8f24562a 1289int
a12b3ead 1290dpif_recv_set(struct dpif *dpif, bool enable)
8f24562a 1291{
a12b3ead
BP
1292 int error = dpif->dpif_class->recv_set(dpif, enable);
1293 log_operation(dpif, "recv_set", error);
96fba48f 1294 return error;
8f24562a
BP
1295}
1296
856081f6 1297/* Polls for an upcall from 'dpif'. If successful, stores the upcall into
90a7c55e
BP
1298 * '*upcall', using 'buf' for storage. Should only be called if
1299 * dpif_recv_set() has been used to enable receiving packets on 'dpif'.
96fba48f 1300 *
da546e07
JR
1301 * 'upcall->key' and 'upcall->userdata' point into data in the caller-provided
1302 * 'buf', so their memory cannot be freed separately from 'buf'.
856081f6 1303 *
837a88dc
JR
1304 * The caller owns the data of 'upcall->packet' and may modify it. If
1305 * packet's headroom is exhausted as it is manipulated, 'upcall->packet'
1306 * will be reallocated. This requires the data of 'upcall->packet' to be
1307 * released with ofpbuf_uninit() before 'upcall' is destroyed. However,
1308 * when an error is returned, the 'upcall->packet' may be uninitialized
1309 * and should not be released.
1310 *
96fba48f 1311 * Returns 0 if successful, otherwise a positive errno value. Returns EAGAIN
856081f6 1312 * if no upcall is immediately available. */
064af421 1313int
90a7c55e 1314dpif_recv(struct dpif *dpif, struct dpif_upcall *upcall, struct ofpbuf *buf)
064af421 1315{
90a7c55e 1316 int error = dpif->dpif_class->recv(dpif, upcall, buf);
856081f6 1317 if (!error && !VLOG_DROP_DBG(&dpmsg_rl)) {
01545c1a
BP
1318 struct ds flow;
1319 char *packet;
1320
da546e07
JR
1321 packet = ofp_packet_to_string(upcall->packet.data,
1322 upcall->packet.size);
01545c1a
BP
1323
1324 ds_init(&flow);
1325 odp_flow_key_format(upcall->key, upcall->key_len, &flow);
1326
1327 VLOG_DBG("%s: %s upcall:\n%s\n%s",
1328 dpif_name(dpif), dpif_upcall_type_to_string(upcall->type),
1329 ds_cstr(&flow), packet);
1330
1331 ds_destroy(&flow);
1332 free(packet);
5fcc0d00
BP
1333 } else if (error && error != EAGAIN) {
1334 log_operation(dpif, "recv", error);
064af421 1335 }
064af421
BP
1336 return error;
1337}
1338
96fba48f 1339/* Discards all messages that would otherwise be received by dpif_recv() on
1ba530f4
BP
1340 * 'dpif'. */
1341void
96fba48f
BP
1342dpif_recv_purge(struct dpif *dpif)
1343{
96fba48f 1344 COVERAGE_INC(dpif_purge);
1ba530f4
BP
1345 if (dpif->dpif_class->recv_purge) {
1346 dpif->dpif_class->recv_purge(dpif);
96fba48f 1347 }
96fba48f
BP
1348}
1349
1350/* Arranges for the poll loop to wake up when 'dpif' has a message queued to be
1351 * received with dpif_recv(). */
064af421
BP
1352void
1353dpif_recv_wait(struct dpif *dpif)
1354{
1acb6baa 1355 dpif->dpif_class->recv_wait(dpif);
064af421 1356}
53a4218d 1357
96fba48f
BP
1358/* Obtains the NetFlow engine type and engine ID for 'dpif' into '*engine_type'
1359 * and '*engine_id', respectively. */
53a4218d
BP
1360void
1361dpif_get_netflow_ids(const struct dpif *dpif,
1362 uint8_t *engine_type, uint8_t *engine_id)
1363{
96fba48f
BP
1364 *engine_type = dpif->netflow_engine_type;
1365 *engine_id = dpif->netflow_engine_id;
1366}
aae51f53
BP
1367
1368/* Translates OpenFlow queue ID 'queue_id' (in host byte order) into a priority
abff858b
PS
1369 * value used for setting packet priority.
1370 * On success, returns 0 and stores the priority into '*priority'.
1371 * On failure, returns a positive errno value and stores 0 into '*priority'. */
aae51f53
BP
1372int
1373dpif_queue_to_priority(const struct dpif *dpif, uint32_t queue_id,
1374 uint32_t *priority)
1375{
1376 int error = (dpif->dpif_class->queue_to_priority
1377 ? dpif->dpif_class->queue_to_priority(dpif, queue_id,
1378 priority)
1379 : EOPNOTSUPP);
1380 if (error) {
1381 *priority = 0;
1382 }
1383 log_operation(dpif, "queue_to_priority", error);
1384 return error;
1385}
96fba48f
BP
1386\f
1387void
1acb6baa
BP
1388dpif_init(struct dpif *dpif, const struct dpif_class *dpif_class,
1389 const char *name,
96fba48f
BP
1390 uint8_t netflow_engine_type, uint8_t netflow_engine_id)
1391{
1acb6baa 1392 dpif->dpif_class = dpif_class;
1a6f1e2a 1393 dpif->base_name = xstrdup(name);
a4af0040 1394 dpif->full_name = xasprintf("%s@%s", dpif_class->type, name);
96fba48f
BP
1395 dpif->netflow_engine_type = netflow_engine_type;
1396 dpif->netflow_engine_id = netflow_engine_id;
1397}
999401aa
JG
1398
1399/* Undoes the results of initialization.
1400 *
1401 * Normally this function only needs to be called from dpif_close().
1402 * However, it may be called by providers due to an error on opening
1403 * that occurs after initialization. It this case dpif_close() would
1404 * never be called. */
1405void
1406dpif_uninit(struct dpif *dpif, bool close)
1407{
1408 char *base_name = dpif->base_name;
1409 char *full_name = dpif->full_name;
1410
1411 if (close) {
a4af0040 1412 dpif->dpif_class->close(dpif);
999401aa
JG
1413 }
1414
1415 free(base_name);
1416 free(full_name);
1417}
96fba48f
BP
1418\f
1419static void
1420log_operation(const struct dpif *dpif, const char *operation, int error)
1421{
1422 if (!error) {
1423 VLOG_DBG_RL(&dpmsg_rl, "%s: %s success", dpif_name(dpif), operation);
90bf1e07 1424 } else if (ofperr_is_valid(error)) {
96fba48f 1425 VLOG_WARN_RL(&error_rl, "%s: %s failed (%s)",
90bf1e07 1426 dpif_name(dpif), operation, ofperr_get_name(error));
71ce9235 1427 } else {
90bf1e07 1428 VLOG_WARN_RL(&error_rl, "%s: %s failed (%s)",
10a89ef0 1429 dpif_name(dpif), operation, ovs_strerror(error));
96fba48f
BP
1430 }
1431}
1432
1433static enum vlog_level
1434flow_message_log_level(int error)
1435{
9b1a48c2
JP
1436 /* If flows arrive in a batch, userspace may push down multiple
1437 * unique flow definitions that overlap when wildcards are applied.
1438 * Kernels that support flow wildcarding will reject these flows as
1439 * duplicates (EEXIST), so lower the log level to debug for these
1440 * types of messages. */
1441 return (error && error != EEXIST) ? VLL_WARN : VLL_DBG;
96fba48f
BP
1442}
1443
1444static bool
1445should_log_flow_message(int error)
1446{
1447 return !vlog_should_drop(THIS_MODULE, flow_message_log_level(error),
1448 error ? &error_rl : &dpmsg_rl);
1449}
1450
1451static void
1452log_flow_message(const struct dpif *dpif, int error, const char *operation,
36956a7d 1453 const struct nlattr *key, size_t key_len,
61fb711d 1454 const struct nlattr *mask, size_t mask_len,
c97fb132 1455 const struct dpif_flow_stats *stats,
cf22f8cb 1456 const struct nlattr *actions, size_t actions_len)
96fba48f
BP
1457{
1458 struct ds ds = DS_EMPTY_INITIALIZER;
1459 ds_put_format(&ds, "%s: ", dpif_name(dpif));
1460 if (error) {
1461 ds_put_cstr(&ds, "failed to ");
1462 }
1463 ds_put_format(&ds, "%s ", operation);
1464 if (error) {
10a89ef0 1465 ds_put_format(&ds, "(%s) ", ovs_strerror(error));
96fba48f 1466 }
0a37839c 1467 odp_flow_format(key, key_len, mask, mask_len, NULL, &ds, true);
96fba48f
BP
1468 if (stats) {
1469 ds_put_cstr(&ds, ", ");
c97fb132 1470 dpif_flow_stats_format(stats, &ds);
96fba48f 1471 }
cdee00fd 1472 if (actions || actions_len) {
96fba48f 1473 ds_put_cstr(&ds, ", actions:");
cdee00fd 1474 format_odp_actions(&ds, actions, actions_len);
96fba48f
BP
1475 }
1476 vlog(THIS_MODULE, flow_message_log_level(error), "%s", ds_cstr(&ds));
1477 ds_destroy(&ds);
1478}
89625d1e
BP
1479
1480static void
1481log_flow_put_message(struct dpif *dpif, const struct dpif_flow_put *put,
1482 int error)
1483{
1484 if (should_log_flow_message(error)) {
1485 struct ds s;
1486
1487 ds_init(&s);
1488 ds_put_cstr(&s, "put");
1489 if (put->flags & DPIF_FP_CREATE) {
1490 ds_put_cstr(&s, "[create]");
1491 }
1492 if (put->flags & DPIF_FP_MODIFY) {
1493 ds_put_cstr(&s, "[modify]");
1494 }
1495 if (put->flags & DPIF_FP_ZERO_STATS) {
1496 ds_put_cstr(&s, "[zero]");
1497 }
1498 log_flow_message(dpif, error, ds_cstr(&s),
61fb711d
JP
1499 put->key, put->key_len, put->mask, put->mask_len,
1500 put->stats, put->actions, put->actions_len);
89625d1e
BP
1501 ds_destroy(&s);
1502 }
1503}
1504
b99d3cee
BP
1505static void
1506log_flow_del_message(struct dpif *dpif, const struct dpif_flow_del *del,
1507 int error)
1508{
1509 if (should_log_flow_message(error)) {
1510 log_flow_message(dpif, error, "flow_del", del->key, del->key_len,
61fb711d 1511 NULL, 0, !error ? del->stats : NULL, NULL, 0);
b99d3cee
BP
1512 }
1513}
1514
89625d1e
BP
1515static void
1516log_execute_message(struct dpif *dpif, const struct dpif_execute *execute,
1517 int error)
1518{
1519 if (!(error ? VLOG_DROP_WARN(&error_rl) : VLOG_DROP_DBG(&dpmsg_rl))) {
1520 struct ds ds = DS_EMPTY_INITIALIZER;
1521 char *packet;
1522
1523 packet = ofp_packet_to_string(execute->packet->data,
1524 execute->packet->size);
1525 ds_put_format(&ds, "%s: execute ", dpif_name(dpif));
1526 format_odp_actions(&ds, execute->actions, execute->actions_len);
1527 if (error) {
10a89ef0 1528 ds_put_format(&ds, " failed (%s)", ovs_strerror(error));
89625d1e
BP
1529 }
1530 ds_put_format(&ds, " on packet %s", packet);
1531 vlog(THIS_MODULE, error ? VLL_WARN : VLL_DBG, "%s", ds_cstr(&ds));
1532 ds_destroy(&ds);
1533 free(packet);
1534 }
1535}