]> git.proxmox.com Git - mirror_ovs.git/blame - lib/dpif.c
ofproto-dpif: Fix tests broken by previous commit.
[mirror_ovs.git] / lib / dpif.c
CommitLineData
064af421 1/*
2f51a7eb 2 * Copyright (c) 2008, 2009, 2010, 2011, 2012, 2013, 2014 Nicira, Inc.
064af421 3 *
a14bc59f
BP
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at:
064af421 7 *
a14bc59f
BP
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
064af421
BP
15 */
16
17#include <config.h>
96fba48f 18#include "dpif-provider.h"
064af421 19
064af421
BP
20#include <ctype.h>
21#include <errno.h>
064af421 22#include <inttypes.h>
064af421
BP
23#include <stdlib.h>
24#include <string.h>
064af421
BP
25
26#include "coverage.h"
27#include "dynamic-string.h"
28#include "flow.h"
c3827f61 29#include "netdev.h"
064af421 30#include "netlink.h"
7fd91025 31#include "odp-execute.h"
064af421 32#include "odp-util.h"
90bf1e07 33#include "ofp-errors.h"
064af421 34#include "ofp-print.h"
71ce9235 35#include "ofp-util.h"
064af421 36#include "ofpbuf.h"
91088554 37#include "packet-dpif.h"
064af421
BP
38#include "packets.h"
39#include "poll-loop.h"
999401aa 40#include "shash.h"
d0c23a1a 41#include "sset.h"
c97fb132 42#include "timeval.h"
064af421
BP
43#include "util.h"
44#include "valgrind.h"
064af421 45#include "vlog.h"
5136ce49 46
d98e6007 47VLOG_DEFINE_THIS_MODULE(dpif);
064af421 48
d76f09ea
BP
49COVERAGE_DEFINE(dpif_destroy);
50COVERAGE_DEFINE(dpif_port_add);
51COVERAGE_DEFINE(dpif_port_del);
52COVERAGE_DEFINE(dpif_flow_flush);
53COVERAGE_DEFINE(dpif_flow_get);
54COVERAGE_DEFINE(dpif_flow_put);
55COVERAGE_DEFINE(dpif_flow_del);
d76f09ea
BP
56COVERAGE_DEFINE(dpif_execute);
57COVERAGE_DEFINE(dpif_purge);
7fd91025 58COVERAGE_DEFINE(dpif_execute_with_help);
d76f09ea 59
999401aa 60static const struct dpif_class *base_dpif_classes[] = {
2f51a7eb 61#ifdef __linux__
96fba48f 62 &dpif_linux_class,
c83cdd30 63#endif
72865317 64 &dpif_netdev_class,
c228a364 65};
999401aa
JG
66
67struct registered_dpif_class {
d2d8fbeb 68 const struct dpif_class *dpif_class;
999401aa
JG
69 int refcount;
70};
71static struct shash dpif_classes = SHASH_INITIALIZER(&dpif_classes);
579a77e0 72static struct sset dpif_blacklist = SSET_INITIALIZER(&dpif_blacklist);
c228a364 73
5703b15f 74/* Protects 'dpif_classes', including the refcount, and 'dpif_blacklist'. */
97be1538 75static struct ovs_mutex dpif_mutex = OVS_MUTEX_INITIALIZER;
5703b15f 76
064af421
BP
77/* Rate limit for individual messages going to or from the datapath, output at
78 * DBG level. This is very high because, if these are enabled, it is because
79 * we really need to see them. */
80static struct vlog_rate_limit dpmsg_rl = VLOG_RATE_LIMIT_INIT(600, 600);
81
82/* Not really much point in logging many dpif errors. */
e2781405 83static struct vlog_rate_limit error_rl = VLOG_RATE_LIMIT_INIT(60, 5);
064af421 84
feebdea2
BP
85static void log_flow_message(const struct dpif *dpif, int error,
86 const char *operation,
87 const struct nlattr *key, size_t key_len,
61fb711d 88 const struct nlattr *mask, size_t mask_len,
c97fb132 89 const struct dpif_flow_stats *stats,
feebdea2 90 const struct nlattr *actions, size_t actions_len);
96fba48f
BP
91static void log_operation(const struct dpif *, const char *operation,
92 int error);
96fba48f 93static bool should_log_flow_message(int error);
89625d1e
BP
94static void log_flow_put_message(struct dpif *, const struct dpif_flow_put *,
95 int error);
b99d3cee
BP
96static void log_flow_del_message(struct dpif *, const struct dpif_flow_del *,
97 int error);
89625d1e 98static void log_execute_message(struct dpif *, const struct dpif_execute *,
fc65bafc 99 bool subexecute, int error);
064af421 100
999401aa
JG
101static void
102dp_initialize(void)
103{
eb8ed438 104 static struct ovsthread_once once = OVSTHREAD_ONCE_INITIALIZER;
999401aa 105
eb8ed438 106 if (ovsthread_once_start(&once)) {
999401aa
JG
107 int i;
108
999401aa
JG
109 for (i = 0; i < ARRAY_SIZE(base_dpif_classes); i++) {
110 dp_register_provider(base_dpif_classes[i]);
111 }
eb8ed438 112 ovsthread_once_done(&once);
999401aa
JG
113 }
114}
115
5703b15f
BP
116static int
117dp_register_provider__(const struct dpif_class *new_class)
999401aa
JG
118{
119 struct registered_dpif_class *registered_class;
120
579a77e0
EJ
121 if (sset_contains(&dpif_blacklist, new_class->type)) {
122 VLOG_DBG("attempted to register blacklisted provider: %s",
123 new_class->type);
124 return EINVAL;
125 }
126
999401aa
JG
127 if (shash_find(&dpif_classes, new_class->type)) {
128 VLOG_WARN("attempted to register duplicate datapath provider: %s",
129 new_class->type);
130 return EEXIST;
131 }
1a6f1e2a 132
999401aa 133 registered_class = xmalloc(sizeof *registered_class);
d2d8fbeb 134 registered_class->dpif_class = new_class;
999401aa
JG
135 registered_class->refcount = 0;
136
137 shash_add(&dpif_classes, new_class->type, registered_class);
138
139 return 0;
140}
141
5703b15f
BP
142/* Registers a new datapath provider. After successful registration, new
143 * datapaths of that type can be opened using dpif_open(). */
144int
145dp_register_provider(const struct dpif_class *new_class)
146{
147 int error;
148
97be1538 149 ovs_mutex_lock(&dpif_mutex);
5703b15f 150 error = dp_register_provider__(new_class);
97be1538 151 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
152
153 return error;
154}
155
999401aa
JG
156/* Unregisters a datapath provider. 'type' must have been previously
157 * registered and not currently be in use by any dpifs. After unregistration
158 * new datapaths of that type cannot be opened using dpif_open(). */
5703b15f
BP
159static int
160dp_unregister_provider__(const char *type)
999401aa
JG
161{
162 struct shash_node *node;
163 struct registered_dpif_class *registered_class;
164
165 node = shash_find(&dpif_classes, type);
166 if (!node) {
167 VLOG_WARN("attempted to unregister a datapath provider that is not "
168 "registered: %s", type);
169 return EAFNOSUPPORT;
170 }
171
172 registered_class = node->data;
173 if (registered_class->refcount) {
174 VLOG_WARN("attempted to unregister in use datapath provider: %s", type);
175 return EBUSY;
176 }
177
178 shash_delete(&dpif_classes, node);
179 free(registered_class);
180
181 return 0;
182}
183
5703b15f
BP
184/* Unregisters a datapath provider. 'type' must have been previously
185 * registered and not currently be in use by any dpifs. After unregistration
186 * new datapaths of that type cannot be opened using dpif_open(). */
187int
188dp_unregister_provider(const char *type)
189{
190 int error;
191
192 dp_initialize();
193
97be1538 194 ovs_mutex_lock(&dpif_mutex);
5703b15f 195 error = dp_unregister_provider__(type);
97be1538 196 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
197
198 return error;
199}
200
579a77e0
EJ
201/* Blacklists a provider. Causes future calls of dp_register_provider() with
202 * a dpif_class which implements 'type' to fail. */
203void
204dp_blacklist_provider(const char *type)
205{
97be1538 206 ovs_mutex_lock(&dpif_mutex);
579a77e0 207 sset_add(&dpif_blacklist, type);
97be1538 208 ovs_mutex_unlock(&dpif_mutex);
579a77e0
EJ
209}
210
999401aa 211/* Clears 'types' and enumerates the types of all currently registered datapath
d0c23a1a 212 * providers into it. The caller must first initialize the sset. */
1a6f1e2a 213void
d0c23a1a 214dp_enumerate_types(struct sset *types)
1a6f1e2a 215{
999401aa 216 struct shash_node *node;
1a6f1e2a 217
999401aa 218 dp_initialize();
d0c23a1a 219 sset_clear(types);
1a6f1e2a 220
97be1538 221 ovs_mutex_lock(&dpif_mutex);
999401aa
JG
222 SHASH_FOR_EACH(node, &dpif_classes) {
223 const struct registered_dpif_class *registered_class = node->data;
d0c23a1a 224 sset_add(types, registered_class->dpif_class->type);
1a6f1e2a 225 }
97be1538 226 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
227}
228
229static void
230dp_class_unref(struct registered_dpif_class *rc)
231{
97be1538 232 ovs_mutex_lock(&dpif_mutex);
5703b15f
BP
233 ovs_assert(rc->refcount);
234 rc->refcount--;
97be1538 235 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
236}
237
238static struct registered_dpif_class *
239dp_class_lookup(const char *type)
240{
241 struct registered_dpif_class *rc;
242
97be1538 243 ovs_mutex_lock(&dpif_mutex);
5703b15f
BP
244 rc = shash_find_data(&dpif_classes, type);
245 if (rc) {
246 rc->refcount++;
247 }
97be1538 248 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
249
250 return rc;
1a6f1e2a
JG
251}
252
253/* Clears 'names' and enumerates the names of all known created datapaths with
d0c23a1a 254 * the given 'type'. The caller must first initialize the sset. Returns 0 if
1a6f1e2a 255 * successful, otherwise a positive errno value.
d3d22744
BP
256 *
257 * Some kinds of datapaths might not be practically enumerable. This is not
258 * considered an error. */
259int
d0c23a1a 260dp_enumerate_names(const char *type, struct sset *names)
d3d22744 261{
5703b15f 262 struct registered_dpif_class *registered_class;
999401aa
JG
263 const struct dpif_class *dpif_class;
264 int error;
d3d22744 265
999401aa 266 dp_initialize();
d0c23a1a 267 sset_clear(names);
1a6f1e2a 268
5703b15f 269 registered_class = dp_class_lookup(type);
999401aa
JG
270 if (!registered_class) {
271 VLOG_WARN("could not enumerate unknown type: %s", type);
272 return EAFNOSUPPORT;
273 }
1a6f1e2a 274
d2d8fbeb 275 dpif_class = registered_class->dpif_class;
2240af25
DDP
276 error = (dpif_class->enumerate
277 ? dpif_class->enumerate(names, dpif_class)
278 : 0);
999401aa
JG
279 if (error) {
280 VLOG_WARN("failed to enumerate %s datapaths: %s", dpif_class->type,
10a89ef0 281 ovs_strerror(error));
d3d22744 282 }
5703b15f 283 dp_class_unref(registered_class);
1a6f1e2a 284
999401aa 285 return error;
1a6f1e2a
JG
286}
287
54ed8a5d
BP
288/* Parses 'datapath_name_', which is of the form [type@]name into its
289 * component pieces. 'name' and 'type' must be freed by the caller.
290 *
291 * The returned 'type' is normalized, as if by dpif_normalize_type(). */
1a6f1e2a
JG
292void
293dp_parse_name(const char *datapath_name_, char **name, char **type)
294{
295 char *datapath_name = xstrdup(datapath_name_);
296 char *separator;
297
298 separator = strchr(datapath_name, '@');
299 if (separator) {
300 *separator = '\0';
301 *type = datapath_name;
54ed8a5d 302 *name = xstrdup(dpif_normalize_type(separator + 1));
1a6f1e2a
JG
303 } else {
304 *name = datapath_name;
54ed8a5d 305 *type = xstrdup(dpif_normalize_type(NULL));
1a6f1e2a 306 }
d3d22744
BP
307}
308
96fba48f 309static int
1a6f1e2a 310do_open(const char *name, const char *type, bool create, struct dpif **dpifp)
064af421 311{
96fba48f 312 struct dpif *dpif = NULL;
064af421 313 int error;
999401aa
JG
314 struct registered_dpif_class *registered_class;
315
316 dp_initialize();
064af421 317
3a225db7 318 type = dpif_normalize_type(type);
5703b15f 319 registered_class = dp_class_lookup(type);
999401aa
JG
320 if (!registered_class) {
321 VLOG_WARN("could not create datapath %s of unknown type %s", name,
322 type);
323 error = EAFNOSUPPORT;
324 goto exit;
325 }
326
4a387741
BP
327 error = registered_class->dpif_class->open(registered_class->dpif_class,
328 name, create, &dpif);
999401aa 329 if (!error) {
cb22974d 330 ovs_assert(dpif->dpif_class == registered_class->dpif_class);
5703b15f
BP
331 } else {
332 dp_class_unref(registered_class);
064af421 333 }
064af421 334
96fba48f
BP
335exit:
336 *dpifp = error ? NULL : dpif;
337 return error;
064af421
BP
338}
339
1a6f1e2a
JG
340/* Tries to open an existing datapath named 'name' and type 'type'. Will fail
341 * if no datapath with 'name' and 'type' exists. 'type' may be either NULL or
342 * the empty string to specify the default system type. Returns 0 if
343 * successful, otherwise a positive errno value. On success stores a pointer
344 * to the datapath in '*dpifp', otherwise a null pointer. */
96fba48f 345int
1a6f1e2a 346dpif_open(const char *name, const char *type, struct dpif **dpifp)
064af421 347{
1a6f1e2a 348 return do_open(name, type, false, dpifp);
064af421
BP
349}
350
1a6f1e2a
JG
351/* Tries to create and open a new datapath with the given 'name' and 'type'.
352 * 'type' may be either NULL or the empty string to specify the default system
353 * type. Will fail if a datapath with 'name' and 'type' already exists.
354 * Returns 0 if successful, otherwise a positive errno value. On success
355 * stores a pointer to the datapath in '*dpifp', otherwise a null pointer. */
064af421 356int
1a6f1e2a 357dpif_create(const char *name, const char *type, struct dpif **dpifp)
064af421 358{
1a6f1e2a 359 return do_open(name, type, true, dpifp);
96fba48f 360}
064af421 361
1a6f1e2a
JG
362/* Tries to open a datapath with the given 'name' and 'type', creating it if it
363 * does not exist. 'type' may be either NULL or the empty string to specify
364 * the default system type. Returns 0 if successful, otherwise a positive
365 * errno value. On success stores a pointer to the datapath in '*dpifp',
366 * otherwise a null pointer. */
efacbce6 367int
1a6f1e2a 368dpif_create_and_open(const char *name, const char *type, struct dpif **dpifp)
efacbce6
BP
369{
370 int error;
371
1a6f1e2a 372 error = dpif_create(name, type, dpifp);
efacbce6 373 if (error == EEXIST || error == EBUSY) {
1a6f1e2a 374 error = dpif_open(name, type, dpifp);
efacbce6
BP
375 if (error) {
376 VLOG_WARN("datapath %s already exists but cannot be opened: %s",
10a89ef0 377 name, ovs_strerror(error));
efacbce6
BP
378 }
379 } else if (error) {
10a89ef0
BP
380 VLOG_WARN("failed to create datapath %s: %s",
381 name, ovs_strerror(error));
efacbce6
BP
382 }
383 return error;
384}
385
96fba48f
BP
386/* Closes and frees the connection to 'dpif'. Does not destroy the datapath
387 * itself; call dpif_delete() first, instead, if that is desirable. */
388void
389dpif_close(struct dpif *dpif)
390{
391 if (dpif) {
5703b15f 392 struct registered_dpif_class *rc;
999401aa 393
5703b15f 394 rc = shash_find_data(&dpif_classes, dpif->dpif_class->type);
999401aa 395 dpif_uninit(dpif, true);
5703b15f 396 dp_class_unref(rc);
064af421
BP
397 }
398}
399
640e1b20
BP
400/* Performs periodic work needed by 'dpif'. */
401void
402dpif_run(struct dpif *dpif)
403{
404 if (dpif->dpif_class->run) {
405 dpif->dpif_class->run(dpif);
406 }
407}
408
409/* Arranges for poll_block() to wake up when dp_run() needs to be called for
410 * 'dpif'. */
411void
412dpif_wait(struct dpif *dpif)
413{
414 if (dpif->dpif_class->wait) {
415 dpif->dpif_class->wait(dpif);
416 }
417}
418
1a6f1e2a
JG
419/* Returns the name of datapath 'dpif' prefixed with the type
420 * (for use in log messages). */
b29ba128
BP
421const char *
422dpif_name(const struct dpif *dpif)
423{
1a6f1e2a
JG
424 return dpif->full_name;
425}
426
427/* Returns the name of datapath 'dpif' without the type
428 * (for use in device names). */
429const char *
430dpif_base_name(const struct dpif *dpif)
431{
432 return dpif->base_name;
b29ba128
BP
433}
434
c7a26215
JP
435/* Returns the type of datapath 'dpif'. */
436const char *
437dpif_type(const struct dpif *dpif)
438{
439 return dpif->dpif_class->type;
440}
441
3a225db7
BP
442/* Returns the fully spelled out name for the given datapath 'type'.
443 *
444 * Normalized type string can be compared with strcmp(). Unnormalized type
445 * string might be the same even if they have different spellings. */
446const char *
447dpif_normalize_type(const char *type)
448{
449 return type && type[0] ? type : "system";
450}
451
96fba48f
BP
452/* Destroys the datapath that 'dpif' is connected to, first removing all of its
453 * ports. After calling this function, it does not make sense to pass 'dpif'
454 * to any functions other than dpif_name() or dpif_close(). */
064af421
BP
455int
456dpif_delete(struct dpif *dpif)
457{
96fba48f
BP
458 int error;
459
064af421 460 COVERAGE_INC(dpif_destroy);
96fba48f 461
1acb6baa 462 error = dpif->dpif_class->destroy(dpif);
96fba48f
BP
463 log_operation(dpif, "delete", error);
464 return error;
064af421
BP
465}
466
96fba48f
BP
467/* Retrieves statistics for 'dpif' into 'stats'. Returns 0 if successful,
468 * otherwise a positive errno value. */
064af421 469int
a8d9304d 470dpif_get_dp_stats(const struct dpif *dpif, struct dpif_dp_stats *stats)
064af421 471{
1acb6baa 472 int error = dpif->dpif_class->get_stats(dpif, stats);
96fba48f
BP
473 if (error) {
474 memset(stats, 0, sizeof *stats);
475 }
476 log_operation(dpif, "get_stats", error);
477 return error;
064af421
BP
478}
479
0aeaabc8
JP
480const char *
481dpif_port_open_type(const char *datapath_type, const char *port_type)
482{
5703b15f 483 struct registered_dpif_class *rc;
0aeaabc8
JP
484
485 datapath_type = dpif_normalize_type(datapath_type);
486
97be1538 487 ovs_mutex_lock(&dpif_mutex);
5703b15f
BP
488 rc = shash_find_data(&dpif_classes, datapath_type);
489 if (rc && rc->dpif_class->port_open_type) {
490 port_type = rc->dpif_class->port_open_type(rc->dpif_class, port_type);
0aeaabc8 491 }
97be1538 492 ovs_mutex_unlock(&dpif_mutex);
0aeaabc8 493
5703b15f 494 return port_type;
0aeaabc8
JP
495}
496
232dfa4a 497/* Attempts to add 'netdev' as a port on 'dpif'. If 'port_nop' is
4e022ec0 498 * non-null and its value is not ODPP_NONE, then attempts to use the
232dfa4a
JP
499 * value as the port number.
500 *
501 * If successful, returns 0 and sets '*port_nop' to the new port's port
502 * number (if 'port_nop' is non-null). On failure, returns a positive
4e022ec0 503 * errno value and sets '*port_nop' to ODPP_NONE (if 'port_nop' is
232dfa4a 504 * non-null). */
064af421 505int
4e022ec0 506dpif_port_add(struct dpif *dpif, struct netdev *netdev, odp_port_t *port_nop)
064af421 507{
c3827f61 508 const char *netdev_name = netdev_get_name(netdev);
4e022ec0 509 odp_port_t port_no = ODPP_NONE;
9ee3ae3e 510 int error;
064af421
BP
511
512 COVERAGE_INC(dpif_port_add);
9ee3ae3e 513
232dfa4a
JP
514 if (port_nop) {
515 port_no = *port_nop;
516 }
517
c3827f61 518 error = dpif->dpif_class->port_add(dpif, netdev, &port_no);
9ee3ae3e 519 if (!error) {
9b56fe13 520 VLOG_DBG_RL(&dpmsg_rl, "%s: added %s as port %"PRIu32,
c3827f61 521 dpif_name(dpif), netdev_name, port_no);
064af421 522 } else {
9ee3ae3e 523 VLOG_WARN_RL(&error_rl, "%s: failed to add %s as port: %s",
10a89ef0 524 dpif_name(dpif), netdev_name, ovs_strerror(error));
4e022ec0 525 port_no = ODPP_NONE;
9ee3ae3e
BP
526 }
527 if (port_nop) {
528 *port_nop = port_no;
064af421 529 }
9ee3ae3e 530 return error;
064af421
BP
531}
532
96fba48f
BP
533/* Attempts to remove 'dpif''s port number 'port_no'. Returns 0 if successful,
534 * otherwise a positive errno value. */
064af421 535int
4e022ec0 536dpif_port_del(struct dpif *dpif, odp_port_t port_no)
064af421 537{
96fba48f
BP
538 int error;
539
064af421 540 COVERAGE_INC(dpif_port_del);
96fba48f 541
1acb6baa 542 error = dpif->dpif_class->port_del(dpif, port_no);
a1811296 543 if (!error) {
9b56fe13 544 VLOG_DBG_RL(&dpmsg_rl, "%s: port_del(%"PRIu32")",
a1811296
BP
545 dpif_name(dpif), port_no);
546 } else {
547 log_operation(dpif, "port_del", error);
548 }
96fba48f 549 return error;
064af421
BP
550}
551
4c738a8d
BP
552/* Makes a deep copy of 'src' into 'dst'. */
553void
554dpif_port_clone(struct dpif_port *dst, const struct dpif_port *src)
555{
556 dst->name = xstrdup(src->name);
557 dst->type = xstrdup(src->type);
558 dst->port_no = src->port_no;
559}
560
561/* Frees memory allocated to members of 'dpif_port'.
562 *
563 * Do not call this function on a dpif_port obtained from
564 * dpif_port_dump_next(): that function retains ownership of the data in the
565 * dpif_port. */
566void
567dpif_port_destroy(struct dpif_port *dpif_port)
568{
569 free(dpif_port->name);
570 free(dpif_port->type);
571}
572
4afba28d
JP
573/* Checks if port named 'devname' exists in 'dpif'. If so, returns
574 * true; otherwise, returns false. */
575bool
576dpif_port_exists(const struct dpif *dpif, const char *devname)
577{
578 int error = dpif->dpif_class->port_query_by_name(dpif, devname, NULL);
bee6b8bc 579 if (error != 0 && error != ENOENT && error != ENODEV) {
4afba28d 580 VLOG_WARN_RL(&error_rl, "%s: failed to query port %s: %s",
10a89ef0 581 dpif_name(dpif), devname, ovs_strerror(error));
4afba28d
JP
582 }
583
584 return !error;
585}
586
96fba48f
BP
587/* Looks up port number 'port_no' in 'dpif'. On success, returns 0 and
588 * initializes '*port' appropriately; on failure, returns a positive errno
4c738a8d
BP
589 * value.
590 *
591 * The caller owns the data in 'port' and must free it with
592 * dpif_port_destroy() when it is no longer needed. */
064af421 593int
4e022ec0 594dpif_port_query_by_number(const struct dpif *dpif, odp_port_t port_no,
4c738a8d 595 struct dpif_port *port)
064af421 596{
1acb6baa 597 int error = dpif->dpif_class->port_query_by_number(dpif, port_no, port);
96fba48f 598 if (!error) {
9b56fe13 599 VLOG_DBG_RL(&dpmsg_rl, "%s: port %"PRIu32" is device %s",
4c738a8d 600 dpif_name(dpif), port_no, port->name);
064af421 601 } else {
96fba48f 602 memset(port, 0, sizeof *port);
9b56fe13 603 VLOG_WARN_RL(&error_rl, "%s: failed to query port %"PRIu32": %s",
10a89ef0 604 dpif_name(dpif), port_no, ovs_strerror(error));
064af421 605 }
96fba48f 606 return error;
064af421
BP
607}
608
96fba48f
BP
609/* Looks up port named 'devname' in 'dpif'. On success, returns 0 and
610 * initializes '*port' appropriately; on failure, returns a positive errno
4c738a8d
BP
611 * value.
612 *
613 * The caller owns the data in 'port' and must free it with
614 * dpif_port_destroy() when it is no longer needed. */
064af421
BP
615int
616dpif_port_query_by_name(const struct dpif *dpif, const char *devname,
4c738a8d 617 struct dpif_port *port)
064af421 618{
1acb6baa 619 int error = dpif->dpif_class->port_query_by_name(dpif, devname, port);
96fba48f 620 if (!error) {
9b56fe13 621 VLOG_DBG_RL(&dpmsg_rl, "%s: device %s is on port %"PRIu32,
4c738a8d 622 dpif_name(dpif), devname, port->port_no);
064af421 623 } else {
96fba48f
BP
624 memset(port, 0, sizeof *port);
625
d647f0a7
BP
626 /* For ENOENT or ENODEV we use DBG level because the caller is probably
627 * interested in whether 'dpif' actually has a port 'devname', so that
628 * it's not an issue worth logging if it doesn't. Other errors are
629 * uncommon and more likely to indicate a real problem. */
630 VLOG_RL(&error_rl,
631 error == ENOENT || error == ENODEV ? VLL_DBG : VLL_WARN,
632 "%s: failed to query port %s: %s",
10a89ef0 633 dpif_name(dpif), devname, ovs_strerror(error));
064af421 634 }
96fba48f 635 return error;
064af421
BP
636}
637
1954e6bb
AW
638/* Returns the Netlink PID value to supply in OVS_ACTION_ATTR_USERSPACE
639 * actions as the OVS_USERSPACE_ATTR_PID attribute's value, for use in
640 * flows whose packets arrived on port 'port_no'. In the case where the
641 * provider allocates multiple Netlink PIDs to a single port, it may use
642 * 'hash' to spread load among them. The caller need not use a particular
643 * hash function; a 5-tuple hash is suitable.
644 *
645 * (The datapath implementation might use some different hash function for
646 * distributing packets received via flow misses among PIDs. This means
647 * that packets received via flow misses might be reordered relative to
648 * packets received via userspace actions. This is not ordinarily a
649 * problem.)
98403001 650 *
4e022ec0 651 * A 'port_no' of ODPP_NONE is a special case: it returns a reserved PID, not
625b0720
BP
652 * allocated to any port, that the client may use for special purposes.
653 *
98403001
BP
654 * The return value is only meaningful when DPIF_UC_ACTION has been enabled in
655 * the 'dpif''s listen mask. It is allowed to change when DPIF_UC_ACTION is
656 * disabled and then re-enabled, so a client that does that must be prepared to
657 * update all of the flows that it installed that contain
658 * OVS_ACTION_ATTR_USERSPACE actions. */
659uint32_t
1954e6bb 660dpif_port_get_pid(const struct dpif *dpif, odp_port_t port_no, uint32_t hash)
98403001
BP
661{
662 return (dpif->dpif_class->port_get_pid
1954e6bb 663 ? (dpif->dpif_class->port_get_pid)(dpif, port_no, hash)
98403001
BP
664 : 0);
665}
666
96fba48f
BP
667/* Looks up port number 'port_no' in 'dpif'. On success, returns 0 and copies
668 * the port's name into the 'name_size' bytes in 'name', ensuring that the
669 * result is null-terminated. On failure, returns a positive errno value and
670 * makes 'name' the empty string. */
335562c0 671int
4e022ec0 672dpif_port_get_name(struct dpif *dpif, odp_port_t port_no,
335562c0
BP
673 char *name, size_t name_size)
674{
4c738a8d 675 struct dpif_port port;
335562c0
BP
676 int error;
677
cb22974d 678 ovs_assert(name_size > 0);
335562c0
BP
679
680 error = dpif_port_query_by_number(dpif, port_no, &port);
681 if (!error) {
4c738a8d
BP
682 ovs_strlcpy(name, port.name, name_size);
683 dpif_port_destroy(&port);
335562c0
BP
684 } else {
685 *name = '\0';
686 }
687 return error;
688}
689
b0ec0f27 690/* Initializes 'dump' to begin dumping the ports in a dpif.
96fba48f 691 *
b0ec0f27
BP
692 * This function provides no status indication. An error status for the entire
693 * dump operation is provided when it is completed by calling
694 * dpif_port_dump_done().
695 */
696void
697dpif_port_dump_start(struct dpif_port_dump *dump, const struct dpif *dpif)
698{
699 dump->dpif = dpif;
700 dump->error = dpif->dpif_class->port_dump_start(dpif, &dump->state);
701 log_operation(dpif, "port_dump_start", dump->error);
702}
703
704/* Attempts to retrieve another port from 'dump', which must have been
4c738a8d 705 * initialized with dpif_port_dump_start(). On success, stores a new dpif_port
b0ec0f27 706 * into 'port' and returns true. On failure, returns false.
96fba48f 707 *
b0ec0f27
BP
708 * Failure might indicate an actual error or merely that the last port has been
709 * dumped. An error status for the entire dump operation is provided when it
4c738a8d
BP
710 * is completed by calling dpif_port_dump_done().
711 *
712 * The dpif owns the data stored in 'port'. It will remain valid until at
713 * least the next time 'dump' is passed to dpif_port_dump_next() or
714 * dpif_port_dump_done(). */
b0ec0f27 715bool
4c738a8d 716dpif_port_dump_next(struct dpif_port_dump *dump, struct dpif_port *port)
064af421 717{
b0ec0f27 718 const struct dpif *dpif = dump->dpif;
064af421 719
b0ec0f27
BP
720 if (dump->error) {
721 return false;
722 }
f4ba4c4f 723
b0ec0f27
BP
724 dump->error = dpif->dpif_class->port_dump_next(dpif, dump->state, port);
725 if (dump->error == EOF) {
726 VLOG_DBG_RL(&dpmsg_rl, "%s: dumped all ports", dpif_name(dpif));
727 } else {
728 log_operation(dpif, "port_dump_next", dump->error);
729 }
064af421 730
b0ec0f27
BP
731 if (dump->error) {
732 dpif->dpif_class->port_dump_done(dpif, dump->state);
733 return false;
f4ba4c4f 734 }
b0ec0f27
BP
735 return true;
736}
064af421 737
b0ec0f27
BP
738/* Completes port table dump operation 'dump', which must have been initialized
739 * with dpif_port_dump_start(). Returns 0 if the dump operation was
740 * error-free, otherwise a positive errno value describing the problem. */
741int
742dpif_port_dump_done(struct dpif_port_dump *dump)
743{
744 const struct dpif *dpif = dump->dpif;
745 if (!dump->error) {
746 dump->error = dpif->dpif_class->port_dump_done(dpif, dump->state);
747 log_operation(dpif, "port_dump_done", dump->error);
f4ba4c4f 748 }
b0ec0f27 749 return dump->error == EOF ? 0 : dump->error;
064af421
BP
750}
751
e9e28be3
BP
752/* Polls for changes in the set of ports in 'dpif'. If the set of ports in
753 * 'dpif' has changed, this function does one of the following:
754 *
755 * - Stores the name of the device that was added to or deleted from 'dpif' in
756 * '*devnamep' and returns 0. The caller is responsible for freeing
757 * '*devnamep' (with free()) when it no longer needs it.
758 *
759 * - Returns ENOBUFS and sets '*devnamep' to NULL.
760 *
761 * This function may also return 'false positives', where it returns 0 and
762 * '*devnamep' names a device that was not actually added or deleted or it
763 * returns ENOBUFS without any change.
764 *
765 * Returns EAGAIN if the set of ports in 'dpif' has not changed. May also
766 * return other positive errno values to indicate that something has gone
767 * wrong. */
768int
769dpif_port_poll(const struct dpif *dpif, char **devnamep)
770{
1acb6baa 771 int error = dpif->dpif_class->port_poll(dpif, devnamep);
e9e28be3
BP
772 if (error) {
773 *devnamep = NULL;
774 }
775 return error;
776}
777
778/* Arranges for the poll loop to wake up when port_poll(dpif) will return a
779 * value other than EAGAIN. */
780void
781dpif_port_poll_wait(const struct dpif *dpif)
782{
1acb6baa 783 dpif->dpif_class->port_poll_wait(dpif);
e9e28be3
BP
784}
785
572b7068 786/* Extracts the flow stats for a packet. The 'flow' and 'packet'
a7752d4a
BP
787 * arguments must have been initialized through a call to flow_extract().
788 * 'used' is stored into stats->used. */
572b7068 789void
a39edbd4 790dpif_flow_stats_extract(const struct flow *flow, const struct ofpbuf *packet,
a7752d4a 791 long long int used, struct dpif_flow_stats *stats)
572b7068 792{
e0eecb1c 793 stats->tcp_flags = ntohs(flow->tcp_flags);
1f317cb5 794 stats->n_bytes = ofpbuf_size(packet);
572b7068 795 stats->n_packets = 1;
a7752d4a 796 stats->used = used;
572b7068
BP
797}
798
c97fb132
BP
799/* Appends a human-readable representation of 'stats' to 's'. */
800void
801dpif_flow_stats_format(const struct dpif_flow_stats *stats, struct ds *s)
802{
803 ds_put_format(s, "packets:%"PRIu64", bytes:%"PRIu64", used:",
804 stats->n_packets, stats->n_bytes);
805 if (stats->used) {
806 ds_put_format(s, "%.3fs", (time_msec() - stats->used) / 1000.0);
807 } else {
808 ds_put_format(s, "never");
809 }
7393104d
BP
810 if (stats->tcp_flags) {
811 ds_put_cstr(s, ", flags:");
812 packet_format_tcp_flags(s, stats->tcp_flags);
813 }
c97fb132
BP
814}
815
96fba48f
BP
816/* Deletes all flows from 'dpif'. Returns 0 if successful, otherwise a
817 * positive errno value. */
818int
819dpif_flow_flush(struct dpif *dpif)
064af421 820{
96fba48f
BP
821 int error;
822
823 COVERAGE_INC(dpif_flow_flush);
824
1acb6baa 825 error = dpif->dpif_class->flow_flush(dpif);
96fba48f
BP
826 log_operation(dpif, "flow_flush", error);
827 return error;
064af421
BP
828}
829
feebdea2 830/* Queries 'dpif' for a flow entry. The flow is specified by the Netlink
df2c07f4 831 * attributes with types OVS_KEY_ATTR_* in the 'key_len' bytes starting at
feebdea2 832 * 'key'.
96fba48f 833 *
feebdea2
BP
834 * Returns 0 if successful. If no flow matches, returns ENOENT. On other
835 * failure, returns a positive errno value.
96fba48f 836 *
781fce15
JS
837 * On success, '*bufp' will be set to an ofpbuf owned by the caller that
838 * contains the response for 'flow->mask' and 'flow->actions'. The caller must
839 * supply a valid pointer, and must free the ofpbuf (with ofpbuf_delete()) when
feebdea2
BP
840 * it is no longer needed.
841 *
781fce15
JS
842 * On success, 'flow' will be populated with the mask, actions and stats for
843 * the datapath flow corresponding to 'key'. The mask and actions will point
844 * within '*bufp'.
58df55ce
JS
845 *
846 * Implementations may opt to point 'flow->mask' and/or 'flow->actions' at
847 * RCU-protected data rather than making a copy of them. Therefore, callers
848 * that wish to hold these over quiescent periods must make a copy of these
849 * fields before quiescing. */
96fba48f 850int
693c4a01 851dpif_flow_get(const struct dpif *dpif,
feebdea2 852 const struct nlattr *key, size_t key_len,
781fce15 853 struct ofpbuf **bufp, struct dpif_flow *flow)
064af421 854{
96fba48f 855 int error;
781fce15
JS
856 struct nlattr *mask, *actions;
857 size_t mask_len, actions_len;
858 struct dpif_flow_stats stats;
96fba48f
BP
859
860 COVERAGE_INC(dpif_flow_get);
861
781fce15
JS
862 *bufp = NULL;
863 error = dpif->dpif_class->flow_get(dpif, key, key_len, bufp,
864 &mask, &mask_len,
865 &actions, &actions_len, &stats);
b843fa1b 866 if (error) {
781fce15
JS
867 memset(flow, 0, sizeof *flow);
868 ofpbuf_delete(*bufp);
869 *bufp = NULL;
870 } else {
871 flow->mask = mask;
872 flow->mask_len = mask_len;
873 flow->actions = actions;
874 flow->actions_len = actions_len;
875 flow->stats = stats;
b843fa1b 876 }
96fba48f 877 if (should_log_flow_message(error)) {
61fb711d 878 log_flow_message(dpif, error, "flow_get", key, key_len,
781fce15
JS
879 NULL, 0, &flow->stats,
880 flow->actions, flow->actions_len);
064af421 881 }
96fba48f 882 return error;
064af421
BP
883}
884
89625d1e
BP
885static int
886dpif_flow_put__(struct dpif *dpif, const struct dpif_flow_put *put)
887{
888 int error;
889
890 COVERAGE_INC(dpif_flow_put);
cb22974d
BP
891 ovs_assert(!(put->flags & ~(DPIF_FP_CREATE | DPIF_FP_MODIFY
892 | DPIF_FP_ZERO_STATS)));
89625d1e
BP
893
894 error = dpif->dpif_class->flow_put(dpif, put);
895 if (error && put->stats) {
896 memset(put->stats, 0, sizeof *put->stats);
897 }
898 log_flow_put_message(dpif, put, error);
899 return error;
900}
901
feebdea2 902/* Adds or modifies a flow in 'dpif'. The flow is specified by the Netlink
e6cc0bab 903 * attribute OVS_FLOW_ATTR_KEY with types OVS_KEY_ATTR_* in the 'key_len' bytes
ee75c546
BP
904 * starting at 'key', and OVS_FLOW_ATTR_MASK with types of OVS_KEY_ATTR_* in
905 * the 'mask_len' bytes starting at 'mask'. The associated actions are
906 * specified by the Netlink attributes with types OVS_ACTION_ATTR_* in the
907 * 'actions_len' bytes starting at 'actions'.
96fba48f 908 *
feebdea2 909 * - If the flow's key does not exist in 'dpif', then the flow will be added if
ba25b8f4 910 * 'flags' includes DPIF_FP_CREATE. Otherwise the operation will fail with
96fba48f
BP
911 * ENOENT.
912 *
ee75c546
BP
913 * The datapath may reject attempts to insert overlapping flows with EINVAL
914 * or EEXIST, but clients should not rely on this: avoiding overlapping flows
915 * is primarily the client's responsibility.
916 *
feebdea2 917 * If the operation succeeds, then 'stats', if nonnull, will be zeroed.
96fba48f 918 *
feebdea2 919 * - If the flow's key does exist in 'dpif', then the flow's actions will be
ba25b8f4 920 * updated if 'flags' includes DPIF_FP_MODIFY. Otherwise the operation will
feebdea2 921 * fail with EEXIST. If the flow's actions are updated, then its statistics
ba25b8f4 922 * will be zeroed if 'flags' includes DPIF_FP_ZERO_STATS, and left as-is
feebdea2
BP
923 * otherwise.
924 *
925 * If the operation succeeds, then 'stats', if nonnull, will be set to the
926 * flow's statistics before the update.
96fba48f 927 */
064af421 928int
ba25b8f4 929dpif_flow_put(struct dpif *dpif, enum dpif_flow_put_flags flags,
feebdea2 930 const struct nlattr *key, size_t key_len,
e6cc0bab 931 const struct nlattr *mask, size_t mask_len,
feebdea2 932 const struct nlattr *actions, size_t actions_len,
c97fb132 933 struct dpif_flow_stats *stats)
064af421 934{
89625d1e
BP
935 struct dpif_flow_put put;
936
937 put.flags = flags;
938 put.key = key;
939 put.key_len = key_len;
e6cc0bab
AZ
940 put.mask = mask;
941 put.mask_len = mask_len;
89625d1e
BP
942 put.actions = actions;
943 put.actions_len = actions_len;
944 put.stats = stats;
945 return dpif_flow_put__(dpif, &put);
064af421
BP
946}
947
b99d3cee
BP
948static int
949dpif_flow_del__(struct dpif *dpif, struct dpif_flow_del *del)
950{
951 int error;
952
953 COVERAGE_INC(dpif_flow_del);
954
955 error = dpif->dpif_class->flow_del(dpif, del);
956 if (error && del->stats) {
957 memset(del->stats, 0, sizeof *del->stats);
958 }
959 log_flow_del_message(dpif, del, error);
960 return error;
961}
962
feebdea2
BP
963/* Deletes a flow from 'dpif' and returns 0, or returns ENOENT if 'dpif' does
964 * not contain such a flow. The flow is specified by the Netlink attributes
df2c07f4 965 * with types OVS_KEY_ATTR_* in the 'key_len' bytes starting at 'key'.
96fba48f 966 *
feebdea2
BP
967 * If the operation succeeds, then 'stats', if nonnull, will be set to the
968 * flow's statistics before its deletion. */
064af421 969int
feebdea2
BP
970dpif_flow_del(struct dpif *dpif,
971 const struct nlattr *key, size_t key_len,
c97fb132 972 struct dpif_flow_stats *stats)
064af421 973{
b99d3cee 974 struct dpif_flow_del del;
f1aa2072 975
b99d3cee
BP
976 del.key = key;
977 del.key_len = key_len;
978 del.stats = stats;
979 return dpif_flow_del__(dpif, &del);
064af421
BP
980}
981
ac64794a
BP
982/* Creates and returns a new 'struct dpif_flow_dump' for iterating through the
983 * flows in 'dpif'.
984 *
985 * This function always successfully returns a dpif_flow_dump. Error
986 * reporting is deferred to dpif_flow_dump_destroy(). */
987struct dpif_flow_dump *
988dpif_flow_dump_create(const struct dpif *dpif)
e723fd32 989{
ac64794a 990 return dpif->dpif_class->flow_dump_create(dpif);
e723fd32
JS
991}
992
ac64794a
BP
993/* Destroys 'dump', which must have been created with dpif_flow_dump_create().
994 * All dpif_flow_dump_thread structures previously created for 'dump' must
995 * previously have been destroyed.
996 *
997 * Returns 0 if the dump operation was error-free, otherwise a positive errno
998 * value describing the problem. */
999int
1000dpif_flow_dump_destroy(struct dpif_flow_dump *dump)
e723fd32 1001{
ac64794a
BP
1002 const struct dpif *dpif = dump->dpif;
1003 int error = dpif->dpif_class->flow_dump_destroy(dump);
1004 log_operation(dpif, "flow_dump_destroy", error);
1005 return error == EOF ? 0 : error;
e723fd32
JS
1006}
1007
ac64794a
BP
1008/* Returns new thread-local state for use with dpif_flow_dump_next(). */
1009struct dpif_flow_dump_thread *
1010dpif_flow_dump_thread_create(struct dpif_flow_dump *dump)
064af421 1011{
ac64794a 1012 return dump->dpif->dpif_class->flow_dump_thread_create(dump);
064af421
BP
1013}
1014
ac64794a
BP
1015/* Releases 'thread'. */
1016void
1017dpif_flow_dump_thread_destroy(struct dpif_flow_dump_thread *thread)
704a1e09 1018{
ac64794a 1019 thread->dpif->dpif_class->flow_dump_thread_destroy(thread);
704a1e09
BP
1020}
1021
ac64794a
BP
1022/* Attempts to retrieve up to 'max_flows' more flows from 'thread'. Returns 0
1023 * if and only if no flows remained to be retrieved, otherwise a positive
1024 * number reflecting the number of elements in 'flows[]' that were updated.
1025 * The number of flows returned might be less than 'max_flows' because
1026 * fewer than 'max_flows' remained, because this particular datapath does not
1027 * benefit from batching, or because an error occurred partway through
1028 * retrieval. Thus, the caller should continue calling until a 0 return value,
1029 * even if intermediate return values are less than 'max_flows'.
bdeadfdd 1030 *
ac64794a
BP
1031 * No error status is immediately provided. An error status for the entire
1032 * dump operation is provided when it is completed by calling
1033 * dpif_flow_dump_destroy().
bdeadfdd 1034 *
ac64794a
BP
1035 * All of the data stored into 'flows' is owned by the datapath, not by the
1036 * caller, and the caller must not modify or free it. The datapath guarantees
58df55ce
JS
1037 * that it remains accessible and unchanged until the first of:
1038 * - The next call to dpif_flow_dump_next() for 'thread', or
1039 * - The next rcu quiescent period. */
704a1e09 1040int
ac64794a
BP
1041dpif_flow_dump_next(struct dpif_flow_dump_thread *thread,
1042 struct dpif_flow *flows, int max_flows)
704a1e09 1043{
ac64794a
BP
1044 struct dpif *dpif = thread->dpif;
1045 int n;
1046
1047 ovs_assert(max_flows > 0);
1048 n = dpif->dpif_class->flow_dump_next(thread, flows, max_flows);
1049 if (n > 0) {
1050 struct dpif_flow *f;
1051
1052 for (f = flows; f < &flows[n] && should_log_flow_message(0); f++) {
1053 log_flow_message(dpif, 0, "flow_dump",
1054 f->key, f->key_len, f->mask, f->mask_len,
1055 &f->stats, f->actions, f->actions_len);
1056 }
1057 } else {
1058 VLOG_DBG_RL(&dpmsg_rl, "%s: dumped all flows", dpif_name(dpif));
1059 }
1060 return n;
064af421
BP
1061}
1062
7fd91025
BP
1063struct dpif_execute_helper_aux {
1064 struct dpif *dpif;
1065 int error;
1066};
1067
09f9da0b
JR
1068/* This is called for actions that need the context of the datapath to be
1069 * meaningful. */
7fd91025 1070static void
8cbf4f47 1071dpif_execute_helper_cb(void *aux_, struct dpif_packet **packets, int cnt,
572f732a 1072 struct pkt_metadata *md,
09f9da0b 1073 const struct nlattr *action, bool may_steal OVS_UNUSED)
7fd91025 1074{
758c456d 1075 struct dpif_execute_helper_aux *aux = aux_;
09f9da0b 1076 int type = nl_attr_type(action);
8cbf4f47
DDP
1077 struct ofpbuf * packet = &packets[0]->ofpbuf;
1078
1079 ovs_assert(cnt == 1);
758c456d 1080
09f9da0b
JR
1081 switch ((enum ovs_action_attr)type) {
1082 case OVS_ACTION_ATTR_OUTPUT:
1083 case OVS_ACTION_ATTR_USERSPACE:
2b651e44
BP
1084 case OVS_ACTION_ATTR_RECIRC: {
1085 struct dpif_execute execute;
1086 struct ofpbuf execute_actions;
1087 uint64_t stub[256 / 8];
1088
1089 if (md->tunnel.ip_dst) {
1090 /* The Linux kernel datapath throws away the tunnel information
1091 * that we supply as metadata. We have to use a "set" action to
1092 * supply it. */
1093 ofpbuf_use_stub(&execute_actions, stub, sizeof stub);
1094 odp_put_tunnel_action(&md->tunnel, &execute_actions);
1095 ofpbuf_put(&execute_actions, action, NLA_ALIGN(action->nla_len));
1096
1097 execute.actions = ofpbuf_data(&execute_actions);
1098 execute.actions_len = ofpbuf_size(&execute_actions);
1099 } else {
1100 execute.actions = action;
1101 execute.actions_len = NLA_ALIGN(action->nla_len);
1102 }
1103
8cbf4f47 1104 execute.packet = packet;
758c456d
JR
1105 execute.md = *md;
1106 execute.needs_help = false;
1107 aux->error = aux->dpif->dpif_class->execute(aux->dpif, &execute);
2b651e44 1108
fc65bafc
BP
1109 log_execute_message(aux->dpif, &execute, true, aux->error);
1110
2b651e44
BP
1111 if (md->tunnel.ip_dst) {
1112 ofpbuf_uninit(&execute_actions);
1113 }
09f9da0b 1114 break;
2b651e44 1115 }
758c456d 1116
c6bf49f3 1117 case OVS_ACTION_ATTR_HASH:
09f9da0b
JR
1118 case OVS_ACTION_ATTR_PUSH_VLAN:
1119 case OVS_ACTION_ATTR_POP_VLAN:
1120 case OVS_ACTION_ATTR_PUSH_MPLS:
1121 case OVS_ACTION_ATTR_POP_MPLS:
1122 case OVS_ACTION_ATTR_SET:
1123 case OVS_ACTION_ATTR_SAMPLE:
1124 case OVS_ACTION_ATTR_UNSPEC:
1125 case __OVS_ACTION_ATTR_MAX:
1126 OVS_NOT_REACHED();
1127 }
7fd91025
BP
1128}
1129
1130/* Executes 'execute' by performing most of the actions in userspace and
1131 * passing the fully constructed packets to 'dpif' for output and userspace
1132 * actions.
1133 *
1134 * This helps with actions that a given 'dpif' doesn't implement directly. */
1135static int
758c456d 1136dpif_execute_with_help(struct dpif *dpif, struct dpif_execute *execute)
7fd91025 1137{
758c456d 1138 struct dpif_execute_helper_aux aux = {dpif, 0};
8cbf4f47 1139 struct dpif_packet packet, *pp;
7fd91025
BP
1140
1141 COVERAGE_INC(dpif_execute_with_help);
1142
91088554 1143 packet.ofpbuf = *execute->packet;
8cbf4f47 1144 pp = &packet;
91088554 1145
8cbf4f47 1146 odp_execute_actions(&aux, &pp, 1, false, &execute->md, execute->actions,
91088554
DDP
1147 execute->actions_len, dpif_execute_helper_cb);
1148
1149 /* Even though may_steal is set to false, some actions could modify or
1150 * reallocate the ofpbuf memory. We need to pass those changes to the
1151 * caller */
1152 *execute->packet = packet.ofpbuf;
1153
7fd91025
BP
1154 return aux.error;
1155}
1156
87e5119b
BP
1157/* Returns true if the datapath needs help executing 'execute'. */
1158static bool
1159dpif_execute_needs_help(const struct dpif_execute *execute)
1160{
1161 return execute->needs_help || nl_attr_oversized(execute->actions_len);
1162}
1163
758c456d
JR
1164/* Causes 'dpif' to perform the 'execute->actions_len' bytes of actions in
1165 * 'execute->actions' on the Ethernet frame in 'execute->packet' and on packet
1166 * metadata in 'execute->md'. The implementation is allowed to modify both the
1167 * '*execute->packet' and 'execute->md'.
1168 *
1169 * Some dpif providers do not implement every action. The Linux kernel
1170 * datapath, in particular, does not implement ARP field modification. If
1171 * 'needs_help' is true, the dpif layer executes in userspace all of the
1172 * actions that it can, and for OVS_ACTION_ATTR_OUTPUT and
1173 * OVS_ACTION_ATTR_USERSPACE actions it passes the packet through to the dpif
1174 * implementation.
1175 *
1176 * This works even if 'execute->actions_len' is too long for a Netlink
1177 * attribute.
1178 *
1179 * Returns 0 if successful, otherwise a positive errno value. */
1180int
1181dpif_execute(struct dpif *dpif, struct dpif_execute *execute)
89625d1e
BP
1182{
1183 int error;
1184
1185 COVERAGE_INC(dpif_execute);
1186 if (execute->actions_len > 0) {
87e5119b 1187 error = (dpif_execute_needs_help(execute)
7fd91025
BP
1188 ? dpif_execute_with_help(dpif, execute)
1189 : dpif->dpif_class->execute(dpif, execute));
89625d1e
BP
1190 } else {
1191 error = 0;
1192 }
1193
fc65bafc 1194 log_execute_message(dpif, execute, false, error);
89625d1e
BP
1195
1196 return error;
1197}
1198
6bc60024
BP
1199/* Executes each of the 'n_ops' operations in 'ops' on 'dpif', in the order in
1200 * which they are specified, placing each operation's results in the "output"
1201 * members documented in comments.
1202 *
1203 * This function exists because some datapaths can perform batched operations
1204 * faster than individual operations. */
1205void
c2b565b5 1206dpif_operate(struct dpif *dpif, struct dpif_op **ops, size_t n_ops)
6bc60024 1207{
6bc60024 1208 if (dpif->dpif_class->operate) {
7fd91025
BP
1209 while (n_ops > 0) {
1210 size_t chunk;
1211
1212 /* Count 'chunk', the number of ops that can be executed without
1213 * needing any help. Ops that need help should be rare, so we
1214 * expect this to ordinarily be 'n_ops', that is, all the ops. */
1215 for (chunk = 0; chunk < n_ops; chunk++) {
1216 struct dpif_op *op = ops[chunk];
1217
87e5119b
BP
1218 if (op->type == DPIF_OP_EXECUTE
1219 && dpif_execute_needs_help(&op->u.execute)) {
7fd91025
BP
1220 break;
1221 }
1222 }
1223
1224 if (chunk) {
1225 /* Execute a chunk full of ops that the dpif provider can
1226 * handle itself, without help. */
1227 size_t i;
1228
1229 dpif->dpif_class->operate(dpif, ops, chunk);
1230
1231 for (i = 0; i < chunk; i++) {
1232 struct dpif_op *op = ops[i];
1233
1234 switch (op->type) {
1235 case DPIF_OP_FLOW_PUT:
1236 log_flow_put_message(dpif, &op->u.flow_put, op->error);
1237 break;
1238
1239 case DPIF_OP_FLOW_DEL:
1240 log_flow_del_message(dpif, &op->u.flow_del, op->error);
1241 break;
1242
1243 case DPIF_OP_EXECUTE:
fc65bafc
BP
1244 log_execute_message(dpif, &op->u.execute, false,
1245 op->error);
7fd91025
BP
1246 break;
1247 }
1248 }
1249
1250 ops += chunk;
1251 n_ops -= chunk;
1252 } else {
1253 /* Help the dpif provider to execute one op. */
1254 struct dpif_op *op = ops[0];
1255
758c456d 1256 op->error = dpif_execute(dpif, &op->u.execute);
7fd91025
BP
1257 ops++;
1258 n_ops--;
1259 }
1260 }
1261 } else {
1262 size_t i;
f23d2845
BP
1263
1264 for (i = 0; i < n_ops; i++) {
1265 struct dpif_op *op = ops[i];
1266
1267 switch (op->type) {
1268 case DPIF_OP_FLOW_PUT:
7fd91025 1269 op->error = dpif_flow_put__(dpif, &op->u.flow_put);
f23d2845
BP
1270 break;
1271
b99d3cee 1272 case DPIF_OP_FLOW_DEL:
7fd91025 1273 op->error = dpif_flow_del__(dpif, &op->u.flow_del);
b99d3cee
BP
1274 break;
1275
f23d2845 1276 case DPIF_OP_EXECUTE:
758c456d 1277 op->error = dpif_execute(dpif, &op->u.execute);
f23d2845 1278 break;
b99d3cee 1279
7fd91025 1280 default:
428b2edd 1281 OVS_NOT_REACHED();
7fd91025 1282 }
6bc60024
BP
1283 }
1284 }
1285}
1286
01545c1a
BP
1287/* Returns a string that represents 'type', for use in log messages. */
1288const char *
1289dpif_upcall_type_to_string(enum dpif_upcall_type type)
1290{
1291 switch (type) {
1292 case DPIF_UC_MISS: return "miss";
1293 case DPIF_UC_ACTION: return "action";
01545c1a
BP
1294 case DPIF_N_UC_TYPES: default: return "<unknown>";
1295 }
1296}
1297
a12b3ead
BP
1298/* Enables or disables receiving packets with dpif_recv() on 'dpif'. Returns 0
1299 * if successful, otherwise a positive errno value.
98403001 1300 *
a12b3ead 1301 * Turning packet receive off and then back on may change the Netlink PID
98403001
BP
1302 * assignments returned by dpif_port_get_pid(). If the client does this, it
1303 * must update all of the flows that have OVS_ACTION_ATTR_USERSPACE actions
1304 * using the new PID assignment. */
8f24562a 1305int
a12b3ead 1306dpif_recv_set(struct dpif *dpif, bool enable)
8f24562a 1307{
6b31e073
RW
1308 int error = 0;
1309
1310 if (dpif->dpif_class->recv_set) {
1311 error = dpif->dpif_class->recv_set(dpif, enable);
1312 log_operation(dpif, "recv_set", error);
1313 }
96fba48f 1314 return error;
8f24562a
BP
1315}
1316
1954e6bb
AW
1317/* Refreshes the poll loops and Netlink sockets associated to each port,
1318 * when the number of upcall handlers (upcall receiving thread) is changed
1319 * to 'n_handlers' and receiving packets for 'dpif' is enabled by
1320 * recv_set().
1321 *
1322 * Since multiple upcall handlers can read upcalls simultaneously from
1323 * 'dpif', each port can have multiple Netlink sockets, one per upcall
1324 * handler. So, handlers_set() is responsible for the following tasks:
1325 *
1326 * When receiving upcall is enabled, extends or creates the
1327 * configuration to support:
1328 *
1329 * - 'n_handlers' Netlink sockets for each port.
1330 *
1331 * - 'n_handlers' poll loops, one for each upcall handler.
1332 *
1333 * - registering the Netlink sockets for the same upcall handler to
1334 * the corresponding poll loop.
1335 *
1336 * Returns 0 if successful, otherwise a positive errno value. */
1337int
1338dpif_handlers_set(struct dpif *dpif, uint32_t n_handlers)
1339{
6b31e073
RW
1340 int error = 0;
1341
1342 if (dpif->dpif_class->handlers_set) {
1343 error = dpif->dpif_class->handlers_set(dpif, n_handlers);
1344 log_operation(dpif, "handlers_set", error);
1345 }
1954e6bb
AW
1346 return error;
1347}
1348
6b31e073
RW
1349void
1350dpif_register_upcall_cb(struct dpif *dpif, exec_upcall_cb *cb)
1351{
1352 if (dpif->dpif_class->register_upcall_cb) {
1353 dpif->dpif_class->register_upcall_cb(dpif, cb);
1354 }
1355}
1356
1357void
1358dpif_enable_upcall(struct dpif *dpif)
1359{
1360 if (dpif->dpif_class->enable_upcall) {
1361 dpif->dpif_class->enable_upcall(dpif);
1362 }
1363}
1364
1365void
1366dpif_disable_upcall(struct dpif *dpif)
1367{
1368 if (dpif->dpif_class->disable_upcall) {
1369 dpif->dpif_class->disable_upcall(dpif);
1370 }
1371}
1372
1373void
1374dpif_print_packet(struct dpif *dpif, struct dpif_upcall *upcall)
1375{
1376 if (!VLOG_DROP_DBG(&dpmsg_rl)) {
1377 struct ds flow;
1378 char *packet;
1379
1380 packet = ofp_packet_to_string(ofpbuf_data(&upcall->packet),
1381 ofpbuf_size(&upcall->packet));
1382
1383 ds_init(&flow);
1384 odp_flow_key_format(upcall->key, upcall->key_len, &flow);
1385
1386 VLOG_DBG("%s: %s upcall:\n%s\n%s",
1387 dpif_name(dpif), dpif_upcall_type_to_string(upcall->type),
1388 ds_cstr(&flow), packet);
1389
1390 ds_destroy(&flow);
1391 free(packet);
1392 }
1393}
1394
1954e6bb
AW
1395/* Polls for an upcall from 'dpif' for an upcall handler. Since there
1396 * there can be multiple poll loops, 'handler_id' is needed as index to
1397 * identify the corresponding poll loop. If successful, stores the upcall
1398 * into '*upcall', using 'buf' for storage. Should only be called if
1399 * 'recv_set' has been used to enable receiving packets from 'dpif'.
96fba48f 1400 *
da546e07
JR
1401 * 'upcall->key' and 'upcall->userdata' point into data in the caller-provided
1402 * 'buf', so their memory cannot be freed separately from 'buf'.
856081f6 1403 *
837a88dc
JR
1404 * The caller owns the data of 'upcall->packet' and may modify it. If
1405 * packet's headroom is exhausted as it is manipulated, 'upcall->packet'
1406 * will be reallocated. This requires the data of 'upcall->packet' to be
1407 * released with ofpbuf_uninit() before 'upcall' is destroyed. However,
1408 * when an error is returned, the 'upcall->packet' may be uninitialized
1409 * and should not be released.
1410 *
96fba48f 1411 * Returns 0 if successful, otherwise a positive errno value. Returns EAGAIN
856081f6 1412 * if no upcall is immediately available. */
064af421 1413int
1954e6bb
AW
1414dpif_recv(struct dpif *dpif, uint32_t handler_id, struct dpif_upcall *upcall,
1415 struct ofpbuf *buf)
064af421 1416{
6b31e073 1417 int error = EAGAIN;
01545c1a 1418
6b31e073
RW
1419 if (dpif->dpif_class->recv) {
1420 error = dpif->dpif_class->recv(dpif, handler_id, upcall, buf);
1421 if (!error) {
1422 dpif_print_packet(dpif, upcall);
1423 } else if (error != EAGAIN) {
1424 log_operation(dpif, "recv", error);
1425 }
064af421 1426 }
064af421
BP
1427 return error;
1428}
1429
96fba48f 1430/* Discards all messages that would otherwise be received by dpif_recv() on
1ba530f4
BP
1431 * 'dpif'. */
1432void
96fba48f
BP
1433dpif_recv_purge(struct dpif *dpif)
1434{
96fba48f 1435 COVERAGE_INC(dpif_purge);
1ba530f4
BP
1436 if (dpif->dpif_class->recv_purge) {
1437 dpif->dpif_class->recv_purge(dpif);
96fba48f 1438 }
96fba48f
BP
1439}
1440
1954e6bb
AW
1441/* Arranges for the poll loop for an upcall handler to wake up when 'dpif'
1442 * 'dpif' has a message queued to be received with the recv member
1443 * function. Since there can be multiple poll loops, 'handler_id' is
1444 * needed as index to identify the corresponding poll loop. */
064af421 1445void
1954e6bb 1446dpif_recv_wait(struct dpif *dpif, uint32_t handler_id)
064af421 1447{
6b31e073
RW
1448 if (dpif->dpif_class->recv_wait) {
1449 dpif->dpif_class->recv_wait(dpif, handler_id);
1450 }
064af421 1451}
53a4218d 1452
96fba48f
BP
1453/* Obtains the NetFlow engine type and engine ID for 'dpif' into '*engine_type'
1454 * and '*engine_id', respectively. */
53a4218d
BP
1455void
1456dpif_get_netflow_ids(const struct dpif *dpif,
1457 uint8_t *engine_type, uint8_t *engine_id)
1458{
96fba48f
BP
1459 *engine_type = dpif->netflow_engine_type;
1460 *engine_id = dpif->netflow_engine_id;
1461}
aae51f53
BP
1462
1463/* Translates OpenFlow queue ID 'queue_id' (in host byte order) into a priority
abff858b
PS
1464 * value used for setting packet priority.
1465 * On success, returns 0 and stores the priority into '*priority'.
1466 * On failure, returns a positive errno value and stores 0 into '*priority'. */
aae51f53
BP
1467int
1468dpif_queue_to_priority(const struct dpif *dpif, uint32_t queue_id,
1469 uint32_t *priority)
1470{
1471 int error = (dpif->dpif_class->queue_to_priority
1472 ? dpif->dpif_class->queue_to_priority(dpif, queue_id,
1473 priority)
1474 : EOPNOTSUPP);
1475 if (error) {
1476 *priority = 0;
1477 }
1478 log_operation(dpif, "queue_to_priority", error);
1479 return error;
1480}
96fba48f
BP
1481\f
1482void
1acb6baa
BP
1483dpif_init(struct dpif *dpif, const struct dpif_class *dpif_class,
1484 const char *name,
96fba48f
BP
1485 uint8_t netflow_engine_type, uint8_t netflow_engine_id)
1486{
1acb6baa 1487 dpif->dpif_class = dpif_class;
1a6f1e2a 1488 dpif->base_name = xstrdup(name);
a4af0040 1489 dpif->full_name = xasprintf("%s@%s", dpif_class->type, name);
96fba48f
BP
1490 dpif->netflow_engine_type = netflow_engine_type;
1491 dpif->netflow_engine_id = netflow_engine_id;
1492}
999401aa
JG
1493
1494/* Undoes the results of initialization.
1495 *
1496 * Normally this function only needs to be called from dpif_close().
1497 * However, it may be called by providers due to an error on opening
1498 * that occurs after initialization. It this case dpif_close() would
1499 * never be called. */
1500void
1501dpif_uninit(struct dpif *dpif, bool close)
1502{
1503 char *base_name = dpif->base_name;
1504 char *full_name = dpif->full_name;
1505
1506 if (close) {
a4af0040 1507 dpif->dpif_class->close(dpif);
999401aa
JG
1508 }
1509
1510 free(base_name);
1511 free(full_name);
1512}
96fba48f
BP
1513\f
1514static void
1515log_operation(const struct dpif *dpif, const char *operation, int error)
1516{
1517 if (!error) {
1518 VLOG_DBG_RL(&dpmsg_rl, "%s: %s success", dpif_name(dpif), operation);
90bf1e07 1519 } else if (ofperr_is_valid(error)) {
96fba48f 1520 VLOG_WARN_RL(&error_rl, "%s: %s failed (%s)",
90bf1e07 1521 dpif_name(dpif), operation, ofperr_get_name(error));
71ce9235 1522 } else {
90bf1e07 1523 VLOG_WARN_RL(&error_rl, "%s: %s failed (%s)",
10a89ef0 1524 dpif_name(dpif), operation, ovs_strerror(error));
96fba48f
BP
1525 }
1526}
1527
1528static enum vlog_level
1529flow_message_log_level(int error)
1530{
9b1a48c2
JP
1531 /* If flows arrive in a batch, userspace may push down multiple
1532 * unique flow definitions that overlap when wildcards are applied.
1533 * Kernels that support flow wildcarding will reject these flows as
1534 * duplicates (EEXIST), so lower the log level to debug for these
1535 * types of messages. */
1536 return (error && error != EEXIST) ? VLL_WARN : VLL_DBG;
96fba48f
BP
1537}
1538
1539static bool
1540should_log_flow_message(int error)
1541{
1542 return !vlog_should_drop(THIS_MODULE, flow_message_log_level(error),
1543 error ? &error_rl : &dpmsg_rl);
1544}
1545
1546static void
1547log_flow_message(const struct dpif *dpif, int error, const char *operation,
36956a7d 1548 const struct nlattr *key, size_t key_len,
61fb711d 1549 const struct nlattr *mask, size_t mask_len,
c97fb132 1550 const struct dpif_flow_stats *stats,
cf22f8cb 1551 const struct nlattr *actions, size_t actions_len)
96fba48f
BP
1552{
1553 struct ds ds = DS_EMPTY_INITIALIZER;
1554 ds_put_format(&ds, "%s: ", dpif_name(dpif));
1555 if (error) {
1556 ds_put_cstr(&ds, "failed to ");
1557 }
1558 ds_put_format(&ds, "%s ", operation);
1559 if (error) {
10a89ef0 1560 ds_put_format(&ds, "(%s) ", ovs_strerror(error));
96fba48f 1561 }
0a37839c 1562 odp_flow_format(key, key_len, mask, mask_len, NULL, &ds, true);
96fba48f
BP
1563 if (stats) {
1564 ds_put_cstr(&ds, ", ");
c97fb132 1565 dpif_flow_stats_format(stats, &ds);
96fba48f 1566 }
cdee00fd 1567 if (actions || actions_len) {
96fba48f 1568 ds_put_cstr(&ds, ", actions:");
cdee00fd 1569 format_odp_actions(&ds, actions, actions_len);
96fba48f
BP
1570 }
1571 vlog(THIS_MODULE, flow_message_log_level(error), "%s", ds_cstr(&ds));
1572 ds_destroy(&ds);
1573}
89625d1e
BP
1574
1575static void
1576log_flow_put_message(struct dpif *dpif, const struct dpif_flow_put *put,
1577 int error)
1578{
1579 if (should_log_flow_message(error)) {
1580 struct ds s;
1581
1582 ds_init(&s);
1583 ds_put_cstr(&s, "put");
1584 if (put->flags & DPIF_FP_CREATE) {
1585 ds_put_cstr(&s, "[create]");
1586 }
1587 if (put->flags & DPIF_FP_MODIFY) {
1588 ds_put_cstr(&s, "[modify]");
1589 }
1590 if (put->flags & DPIF_FP_ZERO_STATS) {
1591 ds_put_cstr(&s, "[zero]");
1592 }
1593 log_flow_message(dpif, error, ds_cstr(&s),
61fb711d
JP
1594 put->key, put->key_len, put->mask, put->mask_len,
1595 put->stats, put->actions, put->actions_len);
89625d1e
BP
1596 ds_destroy(&s);
1597 }
1598}
1599
b99d3cee
BP
1600static void
1601log_flow_del_message(struct dpif *dpif, const struct dpif_flow_del *del,
1602 int error)
1603{
1604 if (should_log_flow_message(error)) {
1605 log_flow_message(dpif, error, "flow_del", del->key, del->key_len,
61fb711d 1606 NULL, 0, !error ? del->stats : NULL, NULL, 0);
b99d3cee
BP
1607 }
1608}
1609
f0fe12fc
BP
1610/* Logs that 'execute' was executed on 'dpif' and completed with errno 'error'
1611 * (0 for success). 'subexecute' should be true if the execution is a result
1612 * of breaking down a larger execution that needed help, false otherwise.
1613 *
1614 *
1615 * XXX In theory, the log message could be deceptive because this function is
1616 * called after the dpif_provider's '->execute' function, which is allowed to
1617 * modify execute->packet and execute->md. In practice, though:
1618 *
1619 * - dpif-linux doesn't modify execute->packet or execute->md.
1620 *
1621 * - dpif-netdev does modify them but it is less likely to have problems
1622 * because it is built into ovs-vswitchd and cannot have version skew,
1623 * etc.
1624 *
1625 * It would still be better to avoid the potential problem. I don't know of a
1626 * good way to do that, though, that isn't expensive. */
89625d1e
BP
1627static void
1628log_execute_message(struct dpif *dpif, const struct dpif_execute *execute,
fc65bafc 1629 bool subexecute, int error)
89625d1e
BP
1630{
1631 if (!(error ? VLOG_DROP_WARN(&error_rl) : VLOG_DROP_DBG(&dpmsg_rl))) {
1632 struct ds ds = DS_EMPTY_INITIALIZER;
1633 char *packet;
1634
1f317cb5
PS
1635 packet = ofp_packet_to_string(ofpbuf_data(execute->packet),
1636 ofpbuf_size(execute->packet));
fc65bafc
BP
1637 ds_put_format(&ds, "%s: %sexecute ",
1638 dpif_name(dpif),
1639 (subexecute ? "sub-"
1640 : dpif_execute_needs_help(execute) ? "super-"
1641 : ""));
89625d1e
BP
1642 format_odp_actions(&ds, execute->actions, execute->actions_len);
1643 if (error) {
10a89ef0 1644 ds_put_format(&ds, " failed (%s)", ovs_strerror(error));
89625d1e
BP
1645 }
1646 ds_put_format(&ds, " on packet %s", packet);
1647 vlog(THIS_MODULE, error ? VLL_WARN : VLL_DBG, "%s", ds_cstr(&ds));
1648 ds_destroy(&ds);
1649 free(packet);
1650 }
1651}