]> git.proxmox.com Git - mirror_ovs.git/blame - lib/dpif.c
lib: Move lib/poll-loop.h to include/openvswitch
[mirror_ovs.git] / lib / dpif.c
CommitLineData
064af421 1/*
922fed06 2 * Copyright (c) 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016 Nicira, Inc.
064af421 3 *
a14bc59f
BP
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at:
064af421 7 *
a14bc59f
BP
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
064af421
BP
15 */
16
17#include <config.h>
96fba48f 18#include "dpif-provider.h"
064af421 19
064af421
BP
20#include <ctype.h>
21#include <errno.h>
064af421 22#include <inttypes.h>
064af421
BP
23#include <stdlib.h>
24#include <string.h>
064af421
BP
25
26#include "coverage.h"
fceef209 27#include "dpctl.h"
e14deea0 28#include "dp-packet.h"
c4ea7529 29#include "dpif-netdev.h"
3e8a2ad1 30#include "openvswitch/dynamic-string.h"
064af421 31#include "flow.h"
c3827f61 32#include "netdev.h"
064af421 33#include "netlink.h"
7fd91025 34#include "odp-execute.h"
064af421 35#include "odp-util.h"
25d436fb 36#include "openvswitch/ofp-print.h"
f4248336 37#include "openvswitch/ofp-util.h"
64c96779 38#include "openvswitch/ofpbuf.h"
064af421 39#include "packets.h"
fd016ae3 40#include "openvswitch/poll-loop.h"
1bc50ef3 41#include "route-table.h"
36f29fb1 42#include "seq.h"
ee89ea7b 43#include "openvswitch/shash.h"
d0c23a1a 44#include "sset.h"
c97fb132 45#include "timeval.h"
53902038 46#include "tnl-neigh-cache.h"
a36de779 47#include "tnl-ports.h"
064af421 48#include "util.h"
78145f6e 49#include "uuid.h"
064af421 50#include "valgrind.h"
e03c096d 51#include "openvswitch/ofp-errors.h"
e6211adc 52#include "openvswitch/vlog.h"
5136ce49 53
d98e6007 54VLOG_DEFINE_THIS_MODULE(dpif);
064af421 55
d76f09ea
BP
56COVERAGE_DEFINE(dpif_destroy);
57COVERAGE_DEFINE(dpif_port_add);
58COVERAGE_DEFINE(dpif_port_del);
59COVERAGE_DEFINE(dpif_flow_flush);
60COVERAGE_DEFINE(dpif_flow_get);
61COVERAGE_DEFINE(dpif_flow_put);
62COVERAGE_DEFINE(dpif_flow_del);
d76f09ea
BP
63COVERAGE_DEFINE(dpif_execute);
64COVERAGE_DEFINE(dpif_purge);
7fd91025 65COVERAGE_DEFINE(dpif_execute_with_help);
5dddf960
JR
66COVERAGE_DEFINE(dpif_meter_set);
67COVERAGE_DEFINE(dpif_meter_get);
68COVERAGE_DEFINE(dpif_meter_del);
d76f09ea 69
999401aa 70static const struct dpif_class *base_dpif_classes[] = {
93451a0a
AS
71#if defined(__linux__) || defined(_WIN32)
72 &dpif_netlink_class,
c83cdd30 73#endif
72865317 74 &dpif_netdev_class,
c228a364 75};
999401aa
JG
76
77struct registered_dpif_class {
d2d8fbeb 78 const struct dpif_class *dpif_class;
999401aa
JG
79 int refcount;
80};
81static struct shash dpif_classes = SHASH_INITIALIZER(&dpif_classes);
579a77e0 82static struct sset dpif_blacklist = SSET_INITIALIZER(&dpif_blacklist);
c228a364 83
5703b15f 84/* Protects 'dpif_classes', including the refcount, and 'dpif_blacklist'. */
97be1538 85static struct ovs_mutex dpif_mutex = OVS_MUTEX_INITIALIZER;
5703b15f 86
064af421
BP
87/* Rate limit for individual messages going to or from the datapath, output at
88 * DBG level. This is very high because, if these are enabled, it is because
89 * we really need to see them. */
90static struct vlog_rate_limit dpmsg_rl = VLOG_RATE_LIMIT_INIT(600, 600);
91
92/* Not really much point in logging many dpif errors. */
e2781405 93static struct vlog_rate_limit error_rl = VLOG_RATE_LIMIT_INIT(60, 5);
064af421 94
96fba48f
BP
95static void log_operation(const struct dpif *, const char *operation,
96 int error);
eff1e5b0
RD
97static bool should_log_flow_message(const struct vlog_module *module,
98 int error);
064af421 99
36f29fb1
PS
100/* Incremented whenever tnl route, arp, etc changes. */
101struct seq *tnl_conf_seq;
102
5119e258
DB
103static bool
104dpif_is_internal_port(const char *type)
105{
106 /* For userspace datapath, tap devices are the equivalent
107 * of internal devices in the kernel datapath, so both
108 * these types are 'internal' devices. */
109 return !strcmp(type, "internal") || !strcmp(type, "tap");
110}
111
999401aa
JG
112static void
113dp_initialize(void)
114{
eb8ed438 115 static struct ovsthread_once once = OVSTHREAD_ONCE_INITIALIZER;
999401aa 116
eb8ed438 117 if (ovsthread_once_start(&once)) {
999401aa
JG
118 int i;
119
36f29fb1 120 tnl_conf_seq = seq_create();
fceef209 121 dpctl_unixctl_register();
a36de779 122 tnl_port_map_init();
53902038 123 tnl_neigh_cache_init();
b772066f 124 route_table_init();
1bc50ef3 125
36f29fb1
PS
126 for (i = 0; i < ARRAY_SIZE(base_dpif_classes); i++) {
127 dp_register_provider(base_dpif_classes[i]);
128 }
129
1bc50ef3 130 ovsthread_once_done(&once);
999401aa
JG
131 }
132}
133
5703b15f
BP
134static int
135dp_register_provider__(const struct dpif_class *new_class)
999401aa
JG
136{
137 struct registered_dpif_class *registered_class;
c8973eb6 138 int error;
999401aa 139
579a77e0
EJ
140 if (sset_contains(&dpif_blacklist, new_class->type)) {
141 VLOG_DBG("attempted to register blacklisted provider: %s",
142 new_class->type);
143 return EINVAL;
144 }
145
999401aa
JG
146 if (shash_find(&dpif_classes, new_class->type)) {
147 VLOG_WARN("attempted to register duplicate datapath provider: %s",
148 new_class->type);
149 return EEXIST;
150 }
1a6f1e2a 151
c8973eb6
DDP
152 error = new_class->init ? new_class->init() : 0;
153 if (error) {
154 VLOG_WARN("failed to initialize %s datapath class: %s",
155 new_class->type, ovs_strerror(error));
156 return error;
157 }
158
999401aa 159 registered_class = xmalloc(sizeof *registered_class);
d2d8fbeb 160 registered_class->dpif_class = new_class;
999401aa
JG
161 registered_class->refcount = 0;
162
163 shash_add(&dpif_classes, new_class->type, registered_class);
164
165 return 0;
166}
167
5703b15f
BP
168/* Registers a new datapath provider. After successful registration, new
169 * datapaths of that type can be opened using dpif_open(). */
170int
171dp_register_provider(const struct dpif_class *new_class)
172{
173 int error;
174
97be1538 175 ovs_mutex_lock(&dpif_mutex);
5703b15f 176 error = dp_register_provider__(new_class);
97be1538 177 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
178
179 return error;
180}
181
999401aa
JG
182/* Unregisters a datapath provider. 'type' must have been previously
183 * registered and not currently be in use by any dpifs. After unregistration
184 * new datapaths of that type cannot be opened using dpif_open(). */
5703b15f
BP
185static int
186dp_unregister_provider__(const char *type)
999401aa
JG
187{
188 struct shash_node *node;
189 struct registered_dpif_class *registered_class;
190
191 node = shash_find(&dpif_classes, type);
192 if (!node) {
999401aa
JG
193 return EAFNOSUPPORT;
194 }
195
196 registered_class = node->data;
197 if (registered_class->refcount) {
198 VLOG_WARN("attempted to unregister in use datapath provider: %s", type);
199 return EBUSY;
200 }
201
202 shash_delete(&dpif_classes, node);
203 free(registered_class);
204
205 return 0;
206}
207
5703b15f
BP
208/* Unregisters a datapath provider. 'type' must have been previously
209 * registered and not currently be in use by any dpifs. After unregistration
210 * new datapaths of that type cannot be opened using dpif_open(). */
211int
212dp_unregister_provider(const char *type)
213{
214 int error;
215
216 dp_initialize();
217
97be1538 218 ovs_mutex_lock(&dpif_mutex);
5703b15f 219 error = dp_unregister_provider__(type);
97be1538 220 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
221
222 return error;
223}
224
579a77e0
EJ
225/* Blacklists a provider. Causes future calls of dp_register_provider() with
226 * a dpif_class which implements 'type' to fail. */
227void
228dp_blacklist_provider(const char *type)
229{
97be1538 230 ovs_mutex_lock(&dpif_mutex);
579a77e0 231 sset_add(&dpif_blacklist, type);
97be1538 232 ovs_mutex_unlock(&dpif_mutex);
579a77e0
EJ
233}
234
5b5b11ea
BP
235/* Adds the types of all currently registered datapath providers to 'types'.
236 * The caller must first initialize the sset. */
1a6f1e2a 237void
d0c23a1a 238dp_enumerate_types(struct sset *types)
1a6f1e2a 239{
999401aa 240 struct shash_node *node;
1a6f1e2a 241
999401aa 242 dp_initialize();
1a6f1e2a 243
97be1538 244 ovs_mutex_lock(&dpif_mutex);
999401aa
JG
245 SHASH_FOR_EACH(node, &dpif_classes) {
246 const struct registered_dpif_class *registered_class = node->data;
d0c23a1a 247 sset_add(types, registered_class->dpif_class->type);
1a6f1e2a 248 }
97be1538 249 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
250}
251
252static void
253dp_class_unref(struct registered_dpif_class *rc)
254{
97be1538 255 ovs_mutex_lock(&dpif_mutex);
5703b15f
BP
256 ovs_assert(rc->refcount);
257 rc->refcount--;
97be1538 258 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
259}
260
261static struct registered_dpif_class *
262dp_class_lookup(const char *type)
263{
264 struct registered_dpif_class *rc;
265
97be1538 266 ovs_mutex_lock(&dpif_mutex);
5703b15f
BP
267 rc = shash_find_data(&dpif_classes, type);
268 if (rc) {
269 rc->refcount++;
270 }
97be1538 271 ovs_mutex_unlock(&dpif_mutex);
5703b15f
BP
272
273 return rc;
1a6f1e2a
JG
274}
275
276/* Clears 'names' and enumerates the names of all known created datapaths with
d0c23a1a 277 * the given 'type'. The caller must first initialize the sset. Returns 0 if
1a6f1e2a 278 * successful, otherwise a positive errno value.
d3d22744
BP
279 *
280 * Some kinds of datapaths might not be practically enumerable. This is not
281 * considered an error. */
282int
d0c23a1a 283dp_enumerate_names(const char *type, struct sset *names)
d3d22744 284{
5703b15f 285 struct registered_dpif_class *registered_class;
999401aa
JG
286 const struct dpif_class *dpif_class;
287 int error;
d3d22744 288
999401aa 289 dp_initialize();
d0c23a1a 290 sset_clear(names);
1a6f1e2a 291
5703b15f 292 registered_class = dp_class_lookup(type);
999401aa
JG
293 if (!registered_class) {
294 VLOG_WARN("could not enumerate unknown type: %s", type);
295 return EAFNOSUPPORT;
296 }
1a6f1e2a 297
d2d8fbeb 298 dpif_class = registered_class->dpif_class;
2240af25
DDP
299 error = (dpif_class->enumerate
300 ? dpif_class->enumerate(names, dpif_class)
301 : 0);
999401aa
JG
302 if (error) {
303 VLOG_WARN("failed to enumerate %s datapaths: %s", dpif_class->type,
10a89ef0 304 ovs_strerror(error));
d3d22744 305 }
5703b15f 306 dp_class_unref(registered_class);
1a6f1e2a 307
999401aa 308 return error;
1a6f1e2a
JG
309}
310
54ed8a5d
BP
311/* Parses 'datapath_name_', which is of the form [type@]name into its
312 * component pieces. 'name' and 'type' must be freed by the caller.
313 *
314 * The returned 'type' is normalized, as if by dpif_normalize_type(). */
1a6f1e2a
JG
315void
316dp_parse_name(const char *datapath_name_, char **name, char **type)
317{
318 char *datapath_name = xstrdup(datapath_name_);
319 char *separator;
320
321 separator = strchr(datapath_name, '@');
322 if (separator) {
323 *separator = '\0';
324 *type = datapath_name;
54ed8a5d 325 *name = xstrdup(dpif_normalize_type(separator + 1));
1a6f1e2a
JG
326 } else {
327 *name = datapath_name;
54ed8a5d 328 *type = xstrdup(dpif_normalize_type(NULL));
1a6f1e2a 329 }
d3d22744
BP
330}
331
96fba48f 332static int
1a6f1e2a 333do_open(const char *name, const char *type, bool create, struct dpif **dpifp)
064af421 334{
96fba48f 335 struct dpif *dpif = NULL;
064af421 336 int error;
999401aa
JG
337 struct registered_dpif_class *registered_class;
338
339 dp_initialize();
064af421 340
3a225db7 341 type = dpif_normalize_type(type);
5703b15f 342 registered_class = dp_class_lookup(type);
999401aa
JG
343 if (!registered_class) {
344 VLOG_WARN("could not create datapath %s of unknown type %s", name,
345 type);
346 error = EAFNOSUPPORT;
347 goto exit;
348 }
349
4a387741
BP
350 error = registered_class->dpif_class->open(registered_class->dpif_class,
351 name, create, &dpif);
999401aa 352 if (!error) {
32b77c31
PB
353 struct dpif_port_dump port_dump;
354 struct dpif_port dpif_port;
355
cb22974d 356 ovs_assert(dpif->dpif_class == registered_class->dpif_class);
32b77c31
PB
357
358 DPIF_PORT_FOR_EACH(&dpif_port, &port_dump, dpif) {
359 struct netdev *netdev;
360 int err;
361
5119e258 362 if (dpif_is_internal_port(dpif_port.type)) {
32b77c31
PB
363 continue;
364 }
365
366 err = netdev_open(dpif_port.name, dpif_port.type, &netdev);
367
368 if (!err) {
dfaf79dd 369 netdev_ports_insert(netdev, dpif->dpif_class, &dpif_port);
32b77c31
PB
370 netdev_close(netdev);
371 } else {
57459d0d
ML
372 VLOG_WARN("could not open netdev %s type %s: %s",
373 dpif_port.name, dpif_port.type, ovs_strerror(err));
32b77c31
PB
374 }
375 }
5703b15f
BP
376 } else {
377 dp_class_unref(registered_class);
064af421 378 }
064af421 379
96fba48f
BP
380exit:
381 *dpifp = error ? NULL : dpif;
382 return error;
064af421
BP
383}
384
1a6f1e2a
JG
385/* Tries to open an existing datapath named 'name' and type 'type'. Will fail
386 * if no datapath with 'name' and 'type' exists. 'type' may be either NULL or
387 * the empty string to specify the default system type. Returns 0 if
388 * successful, otherwise a positive errno value. On success stores a pointer
389 * to the datapath in '*dpifp', otherwise a null pointer. */
96fba48f 390int
1a6f1e2a 391dpif_open(const char *name, const char *type, struct dpif **dpifp)
064af421 392{
1a6f1e2a 393 return do_open(name, type, false, dpifp);
064af421
BP
394}
395
1a6f1e2a
JG
396/* Tries to create and open a new datapath with the given 'name' and 'type'.
397 * 'type' may be either NULL or the empty string to specify the default system
398 * type. Will fail if a datapath with 'name' and 'type' already exists.
399 * Returns 0 if successful, otherwise a positive errno value. On success
400 * stores a pointer to the datapath in '*dpifp', otherwise a null pointer. */
064af421 401int
1a6f1e2a 402dpif_create(const char *name, const char *type, struct dpif **dpifp)
064af421 403{
1a6f1e2a 404 return do_open(name, type, true, dpifp);
96fba48f 405}
064af421 406
1a6f1e2a
JG
407/* Tries to open a datapath with the given 'name' and 'type', creating it if it
408 * does not exist. 'type' may be either NULL or the empty string to specify
409 * the default system type. Returns 0 if successful, otherwise a positive
410 * errno value. On success stores a pointer to the datapath in '*dpifp',
411 * otherwise a null pointer. */
efacbce6 412int
1a6f1e2a 413dpif_create_and_open(const char *name, const char *type, struct dpif **dpifp)
efacbce6
BP
414{
415 int error;
416
1a6f1e2a 417 error = dpif_create(name, type, dpifp);
efacbce6 418 if (error == EEXIST || error == EBUSY) {
1a6f1e2a 419 error = dpif_open(name, type, dpifp);
efacbce6
BP
420 if (error) {
421 VLOG_WARN("datapath %s already exists but cannot be opened: %s",
10a89ef0 422 name, ovs_strerror(error));
efacbce6
BP
423 }
424 } else if (error) {
10a89ef0
BP
425 VLOG_WARN("failed to create datapath %s: %s",
426 name, ovs_strerror(error));
efacbce6
BP
427 }
428 return error;
429}
430
71d90be1
RD
431static void
432dpif_remove_netdev_ports(struct dpif *dpif) {
433 struct dpif_port_dump port_dump;
434 struct dpif_port dpif_port;
435
436 DPIF_PORT_FOR_EACH (&dpif_port, &port_dump, dpif) {
437 if (!dpif_is_internal_port(dpif_port.type)) {
438 netdev_ports_remove(dpif_port.port_no, dpif->dpif_class);
439 }
440 }
441}
442
96fba48f
BP
443/* Closes and frees the connection to 'dpif'. Does not destroy the datapath
444 * itself; call dpif_delete() first, instead, if that is desirable. */
445void
446dpif_close(struct dpif *dpif)
447{
448 if (dpif) {
5703b15f 449 struct registered_dpif_class *rc;
999401aa 450
5703b15f 451 rc = shash_find_data(&dpif_classes, dpif->dpif_class->type);
6595cb95 452
71d90be1
RD
453 if (rc->refcount == 1) {
454 dpif_remove_netdev_ports(dpif);
6595cb95 455 }
999401aa 456 dpif_uninit(dpif, true);
5703b15f 457 dp_class_unref(rc);
064af421
BP
458 }
459}
460
640e1b20 461/* Performs periodic work needed by 'dpif'. */
a36de779 462bool
640e1b20
BP
463dpif_run(struct dpif *dpif)
464{
465 if (dpif->dpif_class->run) {
a36de779 466 return dpif->dpif_class->run(dpif);
640e1b20 467 }
a36de779 468 return false;
640e1b20
BP
469}
470
471/* Arranges for poll_block() to wake up when dp_run() needs to be called for
472 * 'dpif'. */
473void
474dpif_wait(struct dpif *dpif)
475{
476 if (dpif->dpif_class->wait) {
477 dpif->dpif_class->wait(dpif);
478 }
479}
480
1a6f1e2a
JG
481/* Returns the name of datapath 'dpif' prefixed with the type
482 * (for use in log messages). */
b29ba128
BP
483const char *
484dpif_name(const struct dpif *dpif)
485{
1a6f1e2a
JG
486 return dpif->full_name;
487}
488
489/* Returns the name of datapath 'dpif' without the type
490 * (for use in device names). */
491const char *
492dpif_base_name(const struct dpif *dpif)
493{
494 return dpif->base_name;
b29ba128
BP
495}
496
c7a26215
JP
497/* Returns the type of datapath 'dpif'. */
498const char *
499dpif_type(const struct dpif *dpif)
500{
501 return dpif->dpif_class->type;
502}
503
3a225db7
BP
504/* Returns the fully spelled out name for the given datapath 'type'.
505 *
506 * Normalized type string can be compared with strcmp(). Unnormalized type
507 * string might be the same even if they have different spellings. */
508const char *
509dpif_normalize_type(const char *type)
510{
511 return type && type[0] ? type : "system";
512}
513
96fba48f
BP
514/* Destroys the datapath that 'dpif' is connected to, first removing all of its
515 * ports. After calling this function, it does not make sense to pass 'dpif'
516 * to any functions other than dpif_name() or dpif_close(). */
064af421
BP
517int
518dpif_delete(struct dpif *dpif)
519{
96fba48f
BP
520 int error;
521
064af421 522 COVERAGE_INC(dpif_destroy);
96fba48f 523
1acb6baa 524 error = dpif->dpif_class->destroy(dpif);
96fba48f
BP
525 log_operation(dpif, "delete", error);
526 return error;
064af421
BP
527}
528
96fba48f
BP
529/* Retrieves statistics for 'dpif' into 'stats'. Returns 0 if successful,
530 * otherwise a positive errno value. */
064af421 531int
a8d9304d 532dpif_get_dp_stats(const struct dpif *dpif, struct dpif_dp_stats *stats)
064af421 533{
1acb6baa 534 int error = dpif->dpif_class->get_stats(dpif, stats);
96fba48f
BP
535 if (error) {
536 memset(stats, 0, sizeof *stats);
537 }
538 log_operation(dpif, "get_stats", error);
539 return error;
064af421
BP
540}
541
0aeaabc8
JP
542const char *
543dpif_port_open_type(const char *datapath_type, const char *port_type)
544{
5703b15f 545 struct registered_dpif_class *rc;
0aeaabc8
JP
546
547 datapath_type = dpif_normalize_type(datapath_type);
548
97be1538 549 ovs_mutex_lock(&dpif_mutex);
5703b15f
BP
550 rc = shash_find_data(&dpif_classes, datapath_type);
551 if (rc && rc->dpif_class->port_open_type) {
552 port_type = rc->dpif_class->port_open_type(rc->dpif_class, port_type);
0aeaabc8 553 }
97be1538 554 ovs_mutex_unlock(&dpif_mutex);
0aeaabc8 555
5703b15f 556 return port_type;
0aeaabc8
JP
557}
558
232dfa4a 559/* Attempts to add 'netdev' as a port on 'dpif'. If 'port_nop' is
4e022ec0 560 * non-null and its value is not ODPP_NONE, then attempts to use the
232dfa4a
JP
561 * value as the port number.
562 *
563 * If successful, returns 0 and sets '*port_nop' to the new port's port
564 * number (if 'port_nop' is non-null). On failure, returns a positive
4e022ec0 565 * errno value and sets '*port_nop' to ODPP_NONE (if 'port_nop' is
232dfa4a 566 * non-null). */
064af421 567int
4e022ec0 568dpif_port_add(struct dpif *dpif, struct netdev *netdev, odp_port_t *port_nop)
064af421 569{
c3827f61 570 const char *netdev_name = netdev_get_name(netdev);
4e022ec0 571 odp_port_t port_no = ODPP_NONE;
9ee3ae3e 572 int error;
064af421
BP
573
574 COVERAGE_INC(dpif_port_add);
9ee3ae3e 575
232dfa4a
JP
576 if (port_nop) {
577 port_no = *port_nop;
578 }
579
c3827f61 580 error = dpif->dpif_class->port_add(dpif, netdev, &port_no);
9ee3ae3e 581 if (!error) {
9b56fe13 582 VLOG_DBG_RL(&dpmsg_rl, "%s: added %s as port %"PRIu32,
c3827f61 583 dpif_name(dpif), netdev_name, port_no);
32b77c31 584
5119e258
DB
585 if (!dpif_is_internal_port(netdev_get_type(netdev))) {
586
32b77c31
PB
587 struct dpif_port dpif_port;
588
589 dpif_port.type = CONST_CAST(char *, netdev_get_type(netdev));
590 dpif_port.name = CONST_CAST(char *, netdev_name);
591 dpif_port.port_no = port_no;
dfaf79dd 592 netdev_ports_insert(netdev, dpif->dpif_class, &dpif_port);
32b77c31 593 }
064af421 594 } else {
9ee3ae3e 595 VLOG_WARN_RL(&error_rl, "%s: failed to add %s as port: %s",
10a89ef0 596 dpif_name(dpif), netdev_name, ovs_strerror(error));
4e022ec0 597 port_no = ODPP_NONE;
9ee3ae3e
BP
598 }
599 if (port_nop) {
600 *port_nop = port_no;
064af421 601 }
9ee3ae3e 602 return error;
064af421
BP
603}
604
96fba48f
BP
605/* Attempts to remove 'dpif''s port number 'port_no'. Returns 0 if successful,
606 * otherwise a positive errno value. */
064af421 607int
4e022ec0 608dpif_port_del(struct dpif *dpif, odp_port_t port_no)
064af421 609{
96fba48f
BP
610 int error;
611
064af421 612 COVERAGE_INC(dpif_port_del);
96fba48f 613
1acb6baa 614 error = dpif->dpif_class->port_del(dpif, port_no);
a1811296 615 if (!error) {
9b56fe13 616 VLOG_DBG_RL(&dpmsg_rl, "%s: port_del(%"PRIu32")",
a1811296 617 dpif_name(dpif), port_no);
32b77c31 618
dfaf79dd 619 netdev_ports_remove(port_no, dpif->dpif_class);
a1811296
BP
620 } else {
621 log_operation(dpif, "port_del", error);
622 }
96fba48f 623 return error;
064af421
BP
624}
625
4c738a8d
BP
626/* Makes a deep copy of 'src' into 'dst'. */
627void
628dpif_port_clone(struct dpif_port *dst, const struct dpif_port *src)
629{
630 dst->name = xstrdup(src->name);
631 dst->type = xstrdup(src->type);
632 dst->port_no = src->port_no;
633}
634
635/* Frees memory allocated to members of 'dpif_port'.
636 *
637 * Do not call this function on a dpif_port obtained from
638 * dpif_port_dump_next(): that function retains ownership of the data in the
639 * dpif_port. */
640void
641dpif_port_destroy(struct dpif_port *dpif_port)
642{
643 free(dpif_port->name);
644 free(dpif_port->type);
645}
646
4afba28d
JP
647/* Checks if port named 'devname' exists in 'dpif'. If so, returns
648 * true; otherwise, returns false. */
649bool
650dpif_port_exists(const struct dpif *dpif, const char *devname)
651{
652 int error = dpif->dpif_class->port_query_by_name(dpif, devname, NULL);
0f6a066f 653 if (error != 0 && error != ENODEV) {
4afba28d 654 VLOG_WARN_RL(&error_rl, "%s: failed to query port %s: %s",
10a89ef0 655 dpif_name(dpif), devname, ovs_strerror(error));
4afba28d
JP
656 }
657
658 return !error;
659}
660
91364d18
IM
661/* Refreshes configuration of 'dpif's port. */
662int
663dpif_port_set_config(struct dpif *dpif, odp_port_t port_no,
664 const struct smap *cfg)
665{
666 int error = 0;
667
668 if (dpif->dpif_class->port_set_config) {
669 error = dpif->dpif_class->port_set_config(dpif, port_no, cfg);
670 if (error) {
671 log_operation(dpif, "port_set_config", error);
672 }
673 }
674
675 return error;
676}
677
96fba48f
BP
678/* Looks up port number 'port_no' in 'dpif'. On success, returns 0 and
679 * initializes '*port' appropriately; on failure, returns a positive errno
4c738a8d
BP
680 * value.
681 *
0f6a066f
DDP
682 * Retuns ENODEV if the port doesn't exist.
683 *
4c738a8d
BP
684 * The caller owns the data in 'port' and must free it with
685 * dpif_port_destroy() when it is no longer needed. */
064af421 686int
4e022ec0 687dpif_port_query_by_number(const struct dpif *dpif, odp_port_t port_no,
4c738a8d 688 struct dpif_port *port)
064af421 689{
1acb6baa 690 int error = dpif->dpif_class->port_query_by_number(dpif, port_no, port);
96fba48f 691 if (!error) {
9b56fe13 692 VLOG_DBG_RL(&dpmsg_rl, "%s: port %"PRIu32" is device %s",
4c738a8d 693 dpif_name(dpif), port_no, port->name);
064af421 694 } else {
96fba48f 695 memset(port, 0, sizeof *port);
9b56fe13 696 VLOG_WARN_RL(&error_rl, "%s: failed to query port %"PRIu32": %s",
10a89ef0 697 dpif_name(dpif), port_no, ovs_strerror(error));
064af421 698 }
96fba48f 699 return error;
064af421
BP
700}
701
96fba48f
BP
702/* Looks up port named 'devname' in 'dpif'. On success, returns 0 and
703 * initializes '*port' appropriately; on failure, returns a positive errno
4c738a8d
BP
704 * value.
705 *
0f6a066f
DDP
706 * Retuns ENODEV if the port doesn't exist.
707 *
4c738a8d
BP
708 * The caller owns the data in 'port' and must free it with
709 * dpif_port_destroy() when it is no longer needed. */
064af421
BP
710int
711dpif_port_query_by_name(const struct dpif *dpif, const char *devname,
4c738a8d 712 struct dpif_port *port)
064af421 713{
1acb6baa 714 int error = dpif->dpif_class->port_query_by_name(dpif, devname, port);
96fba48f 715 if (!error) {
9b56fe13 716 VLOG_DBG_RL(&dpmsg_rl, "%s: device %s is on port %"PRIu32,
4c738a8d 717 dpif_name(dpif), devname, port->port_no);
064af421 718 } else {
96fba48f
BP
719 memset(port, 0, sizeof *port);
720
0f6a066f 721 /* For ENODEV we use DBG level because the caller is probably
d647f0a7
BP
722 * interested in whether 'dpif' actually has a port 'devname', so that
723 * it's not an issue worth logging if it doesn't. Other errors are
724 * uncommon and more likely to indicate a real problem. */
0f6a066f 725 VLOG_RL(&error_rl, error == ENODEV ? VLL_DBG : VLL_WARN,
d647f0a7 726 "%s: failed to query port %s: %s",
10a89ef0 727 dpif_name(dpif), devname, ovs_strerror(error));
064af421 728 }
96fba48f 729 return error;
064af421
BP
730}
731
1954e6bb
AW
732/* Returns the Netlink PID value to supply in OVS_ACTION_ATTR_USERSPACE
733 * actions as the OVS_USERSPACE_ATTR_PID attribute's value, for use in
734 * flows whose packets arrived on port 'port_no'. In the case where the
735 * provider allocates multiple Netlink PIDs to a single port, it may use
736 * 'hash' to spread load among them. The caller need not use a particular
737 * hash function; a 5-tuple hash is suitable.
738 *
739 * (The datapath implementation might use some different hash function for
740 * distributing packets received via flow misses among PIDs. This means
741 * that packets received via flow misses might be reordered relative to
742 * packets received via userspace actions. This is not ordinarily a
743 * problem.)
98403001 744 *
4e022ec0 745 * A 'port_no' of ODPP_NONE is a special case: it returns a reserved PID, not
625b0720
BP
746 * allocated to any port, that the client may use for special purposes.
747 *
98403001
BP
748 * The return value is only meaningful when DPIF_UC_ACTION has been enabled in
749 * the 'dpif''s listen mask. It is allowed to change when DPIF_UC_ACTION is
750 * disabled and then re-enabled, so a client that does that must be prepared to
751 * update all of the flows that it installed that contain
752 * OVS_ACTION_ATTR_USERSPACE actions. */
753uint32_t
1954e6bb 754dpif_port_get_pid(const struct dpif *dpif, odp_port_t port_no, uint32_t hash)
98403001
BP
755{
756 return (dpif->dpif_class->port_get_pid
1954e6bb 757 ? (dpif->dpif_class->port_get_pid)(dpif, port_no, hash)
98403001
BP
758 : 0);
759}
760
96fba48f
BP
761/* Looks up port number 'port_no' in 'dpif'. On success, returns 0 and copies
762 * the port's name into the 'name_size' bytes in 'name', ensuring that the
763 * result is null-terminated. On failure, returns a positive errno value and
764 * makes 'name' the empty string. */
335562c0 765int
4e022ec0 766dpif_port_get_name(struct dpif *dpif, odp_port_t port_no,
335562c0
BP
767 char *name, size_t name_size)
768{
4c738a8d 769 struct dpif_port port;
335562c0
BP
770 int error;
771
cb22974d 772 ovs_assert(name_size > 0);
335562c0
BP
773
774 error = dpif_port_query_by_number(dpif, port_no, &port);
775 if (!error) {
4c738a8d
BP
776 ovs_strlcpy(name, port.name, name_size);
777 dpif_port_destroy(&port);
335562c0
BP
778 } else {
779 *name = '\0';
780 }
781 return error;
782}
783
b0ec0f27 784/* Initializes 'dump' to begin dumping the ports in a dpif.
96fba48f 785 *
b0ec0f27
BP
786 * This function provides no status indication. An error status for the entire
787 * dump operation is provided when it is completed by calling
788 * dpif_port_dump_done().
789 */
790void
791dpif_port_dump_start(struct dpif_port_dump *dump, const struct dpif *dpif)
792{
793 dump->dpif = dpif;
794 dump->error = dpif->dpif_class->port_dump_start(dpif, &dump->state);
795 log_operation(dpif, "port_dump_start", dump->error);
796}
797
798/* Attempts to retrieve another port from 'dump', which must have been
4c738a8d 799 * initialized with dpif_port_dump_start(). On success, stores a new dpif_port
b0ec0f27 800 * into 'port' and returns true. On failure, returns false.
96fba48f 801 *
b0ec0f27
BP
802 * Failure might indicate an actual error or merely that the last port has been
803 * dumped. An error status for the entire dump operation is provided when it
4c738a8d
BP
804 * is completed by calling dpif_port_dump_done().
805 *
806 * The dpif owns the data stored in 'port'. It will remain valid until at
807 * least the next time 'dump' is passed to dpif_port_dump_next() or
808 * dpif_port_dump_done(). */
b0ec0f27 809bool
4c738a8d 810dpif_port_dump_next(struct dpif_port_dump *dump, struct dpif_port *port)
064af421 811{
b0ec0f27 812 const struct dpif *dpif = dump->dpif;
064af421 813
b0ec0f27
BP
814 if (dump->error) {
815 return false;
816 }
f4ba4c4f 817
b0ec0f27
BP
818 dump->error = dpif->dpif_class->port_dump_next(dpif, dump->state, port);
819 if (dump->error == EOF) {
820 VLOG_DBG_RL(&dpmsg_rl, "%s: dumped all ports", dpif_name(dpif));
821 } else {
822 log_operation(dpif, "port_dump_next", dump->error);
823 }
064af421 824
b0ec0f27
BP
825 if (dump->error) {
826 dpif->dpif_class->port_dump_done(dpif, dump->state);
827 return false;
f4ba4c4f 828 }
b0ec0f27
BP
829 return true;
830}
064af421 831
b0ec0f27
BP
832/* Completes port table dump operation 'dump', which must have been initialized
833 * with dpif_port_dump_start(). Returns 0 if the dump operation was
834 * error-free, otherwise a positive errno value describing the problem. */
835int
836dpif_port_dump_done(struct dpif_port_dump *dump)
837{
838 const struct dpif *dpif = dump->dpif;
839 if (!dump->error) {
840 dump->error = dpif->dpif_class->port_dump_done(dpif, dump->state);
841 log_operation(dpif, "port_dump_done", dump->error);
f4ba4c4f 842 }
b0ec0f27 843 return dump->error == EOF ? 0 : dump->error;
064af421
BP
844}
845
e9e28be3
BP
846/* Polls for changes in the set of ports in 'dpif'. If the set of ports in
847 * 'dpif' has changed, this function does one of the following:
848 *
849 * - Stores the name of the device that was added to or deleted from 'dpif' in
850 * '*devnamep' and returns 0. The caller is responsible for freeing
851 * '*devnamep' (with free()) when it no longer needs it.
852 *
853 * - Returns ENOBUFS and sets '*devnamep' to NULL.
854 *
855 * This function may also return 'false positives', where it returns 0 and
856 * '*devnamep' names a device that was not actually added or deleted or it
857 * returns ENOBUFS without any change.
858 *
859 * Returns EAGAIN if the set of ports in 'dpif' has not changed. May also
860 * return other positive errno values to indicate that something has gone
861 * wrong. */
862int
863dpif_port_poll(const struct dpif *dpif, char **devnamep)
864{
1acb6baa 865 int error = dpif->dpif_class->port_poll(dpif, devnamep);
e9e28be3
BP
866 if (error) {
867 *devnamep = NULL;
868 }
869 return error;
870}
871
872/* Arranges for the poll loop to wake up when port_poll(dpif) will return a
873 * value other than EAGAIN. */
874void
875dpif_port_poll_wait(const struct dpif *dpif)
876{
1acb6baa 877 dpif->dpif_class->port_poll_wait(dpif);
e9e28be3
BP
878}
879
572b7068 880/* Extracts the flow stats for a packet. The 'flow' and 'packet'
a7752d4a
BP
881 * arguments must have been initialized through a call to flow_extract().
882 * 'used' is stored into stats->used. */
572b7068 883void
cf62fa4c 884dpif_flow_stats_extract(const struct flow *flow, const struct dp_packet *packet,
a7752d4a 885 long long int used, struct dpif_flow_stats *stats)
572b7068 886{
e0eecb1c 887 stats->tcp_flags = ntohs(flow->tcp_flags);
cf62fa4c 888 stats->n_bytes = dp_packet_size(packet);
572b7068 889 stats->n_packets = 1;
a7752d4a 890 stats->used = used;
572b7068
BP
891}
892
c97fb132
BP
893/* Appends a human-readable representation of 'stats' to 's'. */
894void
895dpif_flow_stats_format(const struct dpif_flow_stats *stats, struct ds *s)
896{
897 ds_put_format(s, "packets:%"PRIu64", bytes:%"PRIu64", used:",
898 stats->n_packets, stats->n_bytes);
899 if (stats->used) {
900 ds_put_format(s, "%.3fs", (time_msec() - stats->used) / 1000.0);
901 } else {
902 ds_put_format(s, "never");
903 }
7393104d
BP
904 if (stats->tcp_flags) {
905 ds_put_cstr(s, ", flags:");
906 packet_format_tcp_flags(s, stats->tcp_flags);
907 }
c97fb132
BP
908}
909
7af12bd7
JS
910/* Places the hash of the 'key_len' bytes starting at 'key' into '*hash'. */
911void
912dpif_flow_hash(const struct dpif *dpif OVS_UNUSED,
913 const void *key, size_t key_len, ovs_u128 *hash)
914{
915 static struct ovsthread_once once = OVSTHREAD_ONCE_INITIALIZER;
916 static uint32_t secret;
917
918 if (ovsthread_once_start(&once)) {
919 secret = random_uint32();
920 ovsthread_once_done(&once);
921 }
922 hash_bytes128(key, key_len, secret, hash);
78145f6e 923 uuid_set_bits_v4((struct uuid *)hash);
7af12bd7
JS
924}
925
96fba48f
BP
926/* Deletes all flows from 'dpif'. Returns 0 if successful, otherwise a
927 * positive errno value. */
928int
929dpif_flow_flush(struct dpif *dpif)
064af421 930{
96fba48f
BP
931 int error;
932
933 COVERAGE_INC(dpif_flow_flush);
934
1acb6baa 935 error = dpif->dpif_class->flow_flush(dpif);
96fba48f
BP
936 log_operation(dpif, "flow_flush", error);
937 return error;
064af421
BP
938}
939
2c85851f
JS
940/* Attempts to install 'key' into the datapath, fetches it, then deletes it.
941 * Returns true if the datapath supported installing 'flow', false otherwise.
942 */
943bool
944dpif_probe_feature(struct dpif *dpif, const char *name,
bb71c96e
AZ
945 const struct ofpbuf *key, const struct ofpbuf *actions,
946 const ovs_u128 *ufid)
2c85851f
JS
947{
948 struct dpif_flow flow;
949 struct ofpbuf reply;
950 uint64_t stub[DPIF_FLOW_BUFSIZE / 8];
951 bool enable_feature = false;
952 int error;
bb71c96e
AZ
953 const struct nlattr *nl_actions = actions ? actions->data : NULL;
954 const size_t nl_actions_size = actions ? actions->size : 0;
2c85851f 955
9ab0fce1
JS
956 /* Use DPIF_FP_MODIFY to cover the case where ovs-vswitchd is killed (and
957 * restarted) at just the right time such that feature probes from the
958 * previous run are still present in the datapath. */
959 error = dpif_flow_put(dpif, DPIF_FP_CREATE | DPIF_FP_MODIFY | DPIF_FP_PROBE,
bb71c96e
AZ
960 key->data, key->size, NULL, 0,
961 nl_actions, nl_actions_size,
f5d317a1 962 ufid, NON_PMD_CORE_ID, NULL);
9ab0fce1 963 if (error) {
b52ac659 964 if (error != EINVAL && error != EOVERFLOW) {
2c85851f
JS
965 VLOG_WARN("%s: %s flow probe failed (%s)",
966 dpif_name(dpif), name, ovs_strerror(error));
967 }
968 return false;
969 }
970
971 ofpbuf_use_stack(&reply, &stub, sizeof stub);
6fd6ed71 972 error = dpif_flow_get(dpif, key->data, key->size, ufid,
f5d317a1 973 NON_PMD_CORE_ID, &reply, &flow);
2c85851f 974 if (!error
bdd7ecf5 975 && (!ufid || (flow.ufid_present
2ff8484b 976 && ovs_u128_equals(*ufid, flow.ufid)))) {
2c85851f
JS
977 enable_feature = true;
978 }
979
6fd6ed71 980 error = dpif_flow_del(dpif, key->data, key->size, ufid,
f5d317a1 981 NON_PMD_CORE_ID, NULL);
2c85851f
JS
982 if (error) {
983 VLOG_WARN("%s: failed to delete %s feature probe flow",
984 dpif_name(dpif), name);
985 }
986
987 return enable_feature;
988}
989
6fe09f8c 990/* A dpif_operate() wrapper for performing a single DPIF_OP_FLOW_GET. */
96fba48f 991int
6fe09f8c 992dpif_flow_get(struct dpif *dpif,
70e5ed6f 993 const struct nlattr *key, size_t key_len, const ovs_u128 *ufid,
bd5131ba 994 const unsigned pmd_id, struct ofpbuf *buf, struct dpif_flow *flow)
064af421 995{
6fe09f8c
JS
996 struct dpif_op *opp;
997 struct dpif_op op;
96fba48f 998
6fe09f8c
JS
999 op.type = DPIF_OP_FLOW_GET;
1000 op.u.flow_get.key = key;
1001 op.u.flow_get.key_len = key_len;
70e5ed6f 1002 op.u.flow_get.ufid = ufid;
1c1e46ed 1003 op.u.flow_get.pmd_id = pmd_id;
6fe09f8c 1004 op.u.flow_get.buffer = buf;
70e5ed6f
JS
1005
1006 memset(flow, 0, sizeof *flow);
6fe09f8c
JS
1007 op.u.flow_get.flow = flow;
1008 op.u.flow_get.flow->key = key;
1009 op.u.flow_get.flow->key_len = key_len;
96fba48f 1010
6fe09f8c
JS
1011 opp = &op;
1012 dpif_operate(dpif, &opp, 1);
1013
1014 return op.error;
064af421
BP
1015}
1016
1a0c894a 1017/* A dpif_operate() wrapper for performing a single DPIF_OP_FLOW_PUT. */
064af421 1018int
ba25b8f4 1019dpif_flow_put(struct dpif *dpif, enum dpif_flow_put_flags flags,
feebdea2 1020 const struct nlattr *key, size_t key_len,
e6cc0bab 1021 const struct nlattr *mask, size_t mask_len,
feebdea2 1022 const struct nlattr *actions, size_t actions_len,
bd5131ba 1023 const ovs_u128 *ufid, const unsigned pmd_id,
1c1e46ed 1024 struct dpif_flow_stats *stats)
064af421 1025{
1a0c894a
BP
1026 struct dpif_op *opp;
1027 struct dpif_op op;
1028
1029 op.type = DPIF_OP_FLOW_PUT;
1030 op.u.flow_put.flags = flags;
1031 op.u.flow_put.key = key;
1032 op.u.flow_put.key_len = key_len;
1033 op.u.flow_put.mask = mask;
1034 op.u.flow_put.mask_len = mask_len;
1035 op.u.flow_put.actions = actions;
1036 op.u.flow_put.actions_len = actions_len;
70e5ed6f 1037 op.u.flow_put.ufid = ufid;
1c1e46ed 1038 op.u.flow_put.pmd_id = pmd_id;
1a0c894a
BP
1039 op.u.flow_put.stats = stats;
1040
1041 opp = &op;
1042 dpif_operate(dpif, &opp, 1);
1043
1044 return op.error;
064af421
BP
1045}
1046
1a0c894a 1047/* A dpif_operate() wrapper for performing a single DPIF_OP_FLOW_DEL. */
064af421 1048int
feebdea2 1049dpif_flow_del(struct dpif *dpif,
70e5ed6f 1050 const struct nlattr *key, size_t key_len, const ovs_u128 *ufid,
bd5131ba 1051 const unsigned pmd_id, struct dpif_flow_stats *stats)
064af421 1052{
1a0c894a
BP
1053 struct dpif_op *opp;
1054 struct dpif_op op;
1055
1056 op.type = DPIF_OP_FLOW_DEL;
1057 op.u.flow_del.key = key;
1058 op.u.flow_del.key_len = key_len;
70e5ed6f 1059 op.u.flow_del.ufid = ufid;
1c1e46ed 1060 op.u.flow_del.pmd_id = pmd_id;
1a0c894a 1061 op.u.flow_del.stats = stats;
8e1ffd75 1062 op.u.flow_del.terse = false;
f1aa2072 1063
1a0c894a
BP
1064 opp = &op;
1065 dpif_operate(dpif, &opp, 1);
1066
1067 return op.error;
064af421
BP
1068}
1069
ac64794a 1070/* Creates and returns a new 'struct dpif_flow_dump' for iterating through the
64bb477f
JS
1071 * flows in 'dpif'. If 'terse' is true, then only UFID and statistics will
1072 * be returned in the dump. Otherwise, all fields will be returned.
ac64794a
BP
1073 *
1074 * This function always successfully returns a dpif_flow_dump. Error
1075 * reporting is deferred to dpif_flow_dump_destroy(). */
1076struct dpif_flow_dump *
7e8b7199 1077dpif_flow_dump_create(const struct dpif *dpif, bool terse, char *type)
e723fd32 1078{
7e8b7199 1079 return dpif->dpif_class->flow_dump_create(dpif, terse, type);
e723fd32
JS
1080}
1081
ac64794a
BP
1082/* Destroys 'dump', which must have been created with dpif_flow_dump_create().
1083 * All dpif_flow_dump_thread structures previously created for 'dump' must
1084 * previously have been destroyed.
1085 *
1086 * Returns 0 if the dump operation was error-free, otherwise a positive errno
1087 * value describing the problem. */
1088int
1089dpif_flow_dump_destroy(struct dpif_flow_dump *dump)
e723fd32 1090{
ac64794a
BP
1091 const struct dpif *dpif = dump->dpif;
1092 int error = dpif->dpif_class->flow_dump_destroy(dump);
1093 log_operation(dpif, "flow_dump_destroy", error);
1094 return error == EOF ? 0 : error;
e723fd32
JS
1095}
1096
ac64794a
BP
1097/* Returns new thread-local state for use with dpif_flow_dump_next(). */
1098struct dpif_flow_dump_thread *
1099dpif_flow_dump_thread_create(struct dpif_flow_dump *dump)
064af421 1100{
ac64794a 1101 return dump->dpif->dpif_class->flow_dump_thread_create(dump);
064af421
BP
1102}
1103
ac64794a
BP
1104/* Releases 'thread'. */
1105void
1106dpif_flow_dump_thread_destroy(struct dpif_flow_dump_thread *thread)
704a1e09 1107{
ac64794a 1108 thread->dpif->dpif_class->flow_dump_thread_destroy(thread);
704a1e09
BP
1109}
1110
ac64794a
BP
1111/* Attempts to retrieve up to 'max_flows' more flows from 'thread'. Returns 0
1112 * if and only if no flows remained to be retrieved, otherwise a positive
1113 * number reflecting the number of elements in 'flows[]' that were updated.
1114 * The number of flows returned might be less than 'max_flows' because
1115 * fewer than 'max_flows' remained, because this particular datapath does not
1116 * benefit from batching, or because an error occurred partway through
1117 * retrieval. Thus, the caller should continue calling until a 0 return value,
1118 * even if intermediate return values are less than 'max_flows'.
bdeadfdd 1119 *
ac64794a
BP
1120 * No error status is immediately provided. An error status for the entire
1121 * dump operation is provided when it is completed by calling
1122 * dpif_flow_dump_destroy().
bdeadfdd 1123 *
ac64794a
BP
1124 * All of the data stored into 'flows' is owned by the datapath, not by the
1125 * caller, and the caller must not modify or free it. The datapath guarantees
58df55ce
JS
1126 * that it remains accessible and unchanged until the first of:
1127 * - The next call to dpif_flow_dump_next() for 'thread', or
1128 * - The next rcu quiescent period. */
704a1e09 1129int
ac64794a
BP
1130dpif_flow_dump_next(struct dpif_flow_dump_thread *thread,
1131 struct dpif_flow *flows, int max_flows)
704a1e09 1132{
ac64794a
BP
1133 struct dpif *dpif = thread->dpif;
1134 int n;
1135
1136 ovs_assert(max_flows > 0);
1137 n = dpif->dpif_class->flow_dump_next(thread, flows, max_flows);
1138 if (n > 0) {
1139 struct dpif_flow *f;
1140
eff1e5b0
RD
1141 for (f = flows; f < &flows[n]
1142 && should_log_flow_message(&this_module, 0); f++) {
1143 log_flow_message(dpif, 0, &this_module, "flow_dump",
ac64794a 1144 f->key, f->key_len, f->mask, f->mask_len,
70e5ed6f 1145 &f->ufid, &f->stats, f->actions, f->actions_len);
ac64794a
BP
1146 }
1147 } else {
1148 VLOG_DBG_RL(&dpmsg_rl, "%s: dumped all flows", dpif_name(dpif));
1149 }
1150 return n;
064af421
BP
1151}
1152
7fd91025
BP
1153struct dpif_execute_helper_aux {
1154 struct dpif *dpif;
1cceb31b 1155 const struct flow *flow;
7fd91025 1156 int error;
076caa2f 1157 const struct nlattr *meter_action; /* Non-NULL, if have a meter action. */
7fd91025
BP
1158};
1159
09f9da0b
JR
1160/* This is called for actions that need the context of the datapath to be
1161 * meaningful. */
7fd91025 1162static void
1895cc8d 1163dpif_execute_helper_cb(void *aux_, struct dp_packet_batch *packets_,
18b58592 1164 const struct nlattr *action, bool may_steal)
7fd91025 1165{
758c456d 1166 struct dpif_execute_helper_aux *aux = aux_;
09f9da0b 1167 int type = nl_attr_type(action);
1895cc8d 1168 struct dp_packet *packet = packets_->packets[0];
8cbf4f47 1169
1895cc8d 1170 ovs_assert(packets_->count == 1);
758c456d 1171
09f9da0b 1172 switch ((enum ovs_action_attr)type) {
076caa2f
JR
1173 case OVS_ACTION_ATTR_METER:
1174 /* Maintain a pointer to the first meter action seen. */
1175 if (!aux->meter_action) {
1176 aux->meter_action = action;
1177 }
1178 break;
1179
07659514 1180 case OVS_ACTION_ATTR_CT:
09f9da0b 1181 case OVS_ACTION_ATTR_OUTPUT:
a36de779
PS
1182 case OVS_ACTION_ATTR_TUNNEL_PUSH:
1183 case OVS_ACTION_ATTR_TUNNEL_POP:
09f9da0b 1184 case OVS_ACTION_ATTR_USERSPACE:
2b651e44
BP
1185 case OVS_ACTION_ATTR_RECIRC: {
1186 struct dpif_execute execute;
1187 struct ofpbuf execute_actions;
1188 uint64_t stub[256 / 8];
cf62fa4c 1189 struct pkt_metadata *md = &packet->md;
2b651e44 1190
076caa2f
JR
1191 if (flow_tnl_dst_is_set(&md->tunnel) || aux->meter_action) {
1192 ofpbuf_use_stub(&execute_actions, stub, sizeof stub);
1193
1194 if (aux->meter_action) {
1195 const struct nlattr *a = aux->meter_action;
1196
1197 /* XXX: This code collects meter actions since the last action
1198 * execution via the datapath to be executed right before the
1199 * current action that needs to be executed by the datapath.
1200 * This is only an approximation, but better than nothing.
1201 * Fundamentally, we should have a mechanism by which the
1202 * datapath could return the result of the meter action so that
1203 * we could execute them at the right order. */
1204 do {
1205 ofpbuf_put(&execute_actions, a, NLA_ALIGN(a->nla_len));
1206 /* Find next meter action before 'action', if any. */
1207 do {
1208 a = nl_attr_next(a);
1209 } while (a != action &&
1210 nl_attr_type(a) != OVS_ACTION_ATTR_METER);
1211 } while (a != action);
1212 }
1213
2b651e44
BP
1214 /* The Linux kernel datapath throws away the tunnel information
1215 * that we supply as metadata. We have to use a "set" action to
1216 * supply it. */
076caa2f
JR
1217 if (md->tunnel.ip_dst) {
1218 odp_put_tunnel_action(&md->tunnel, &execute_actions);
1219 }
2b651e44
BP
1220 ofpbuf_put(&execute_actions, action, NLA_ALIGN(action->nla_len));
1221
6fd6ed71
PS
1222 execute.actions = execute_actions.data;
1223 execute.actions_len = execute_actions.size;
2b651e44
BP
1224 } else {
1225 execute.actions = action;
1226 execute.actions_len = NLA_ALIGN(action->nla_len);
1227 }
1228
18b58592
AZ
1229 struct dp_packet *clone = NULL;
1230 uint32_t cutlen = dp_packet_get_cutlen(packet);
1231 if (cutlen && (type == OVS_ACTION_ATTR_OUTPUT
1232 || type == OVS_ACTION_ATTR_TUNNEL_PUSH
1233 || type == OVS_ACTION_ATTR_TUNNEL_POP
1234 || type == OVS_ACTION_ATTR_USERSPACE)) {
1235 dp_packet_reset_cutlen(packet);
aaca4fe0 1236 if (!may_steal) {
18b58592 1237 packet = clone = dp_packet_clone(packet);
aaca4fe0 1238 }
aaca4fe0 1239 dp_packet_set_size(packet, dp_packet_size(packet) - cutlen);
aaca4fe0
WT
1240 }
1241
8cbf4f47 1242 execute.packet = packet;
1cceb31b 1243 execute.flow = aux->flow;
758c456d 1244 execute.needs_help = false;
43f9ac0a 1245 execute.probe = false;
27130224 1246 execute.mtu = 0;
1a0c894a 1247 aux->error = dpif_execute(aux->dpif, &execute);
eff1e5b0
RD
1248 log_execute_message(aux->dpif, &this_module, &execute,
1249 true, aux->error);
fc65bafc 1250
18b58592
AZ
1251 dp_packet_delete(clone);
1252
076caa2f 1253 if (flow_tnl_dst_is_set(&md->tunnel) || aux->meter_action) {
2b651e44 1254 ofpbuf_uninit(&execute_actions);
076caa2f
JR
1255
1256 /* Do not re-use the same meters for later output actions. */
1257 aux->meter_action = NULL;
2b651e44 1258 }
09f9da0b 1259 break;
2b651e44 1260 }
758c456d 1261
c6bf49f3 1262 case OVS_ACTION_ATTR_HASH:
09f9da0b
JR
1263 case OVS_ACTION_ATTR_PUSH_VLAN:
1264 case OVS_ACTION_ATTR_POP_VLAN:
1265 case OVS_ACTION_ATTR_PUSH_MPLS:
1266 case OVS_ACTION_ATTR_POP_MPLS:
1267 case OVS_ACTION_ATTR_SET:
6d670e7f 1268 case OVS_ACTION_ATTR_SET_MASKED:
09f9da0b 1269 case OVS_ACTION_ATTR_SAMPLE:
aaca4fe0 1270 case OVS_ACTION_ATTR_TRUNC:
6fcecb85
YY
1271 case OVS_ACTION_ATTR_PUSH_ETH:
1272 case OVS_ACTION_ATTR_POP_ETH:
535e3acf 1273 case OVS_ACTION_ATTR_CLONE:
1fc11c59
JS
1274 case OVS_ACTION_ATTR_ENCAP_NSH:
1275 case OVS_ACTION_ATTR_DECAP_NSH:
09f9da0b
JR
1276 case OVS_ACTION_ATTR_UNSPEC:
1277 case __OVS_ACTION_ATTR_MAX:
1278 OVS_NOT_REACHED();
1279 }
7fd91025
BP
1280}
1281
1282/* Executes 'execute' by performing most of the actions in userspace and
1283 * passing the fully constructed packets to 'dpif' for output and userspace
1284 * actions.
1285 *
1286 * This helps with actions that a given 'dpif' doesn't implement directly. */
1287static int
758c456d 1288dpif_execute_with_help(struct dpif *dpif, struct dpif_execute *execute)
7fd91025 1289{
076caa2f 1290 struct dpif_execute_helper_aux aux = {dpif, execute->flow, 0, NULL};
1895cc8d 1291 struct dp_packet_batch pb;
7fd91025
BP
1292
1293 COVERAGE_INC(dpif_execute_with_help);
1294
72c84bc2 1295 dp_packet_batch_init_packet(&pb, execute->packet);
1895cc8d 1296 odp_execute_actions(&aux, &pb, false, execute->actions,
91088554 1297 execute->actions_len, dpif_execute_helper_cb);
7fd91025
BP
1298 return aux.error;
1299}
1300
87e5119b
BP
1301/* Returns true if the datapath needs help executing 'execute'. */
1302static bool
1303dpif_execute_needs_help(const struct dpif_execute *execute)
1304{
1305 return execute->needs_help || nl_attr_oversized(execute->actions_len);
1306}
1307
1a0c894a 1308/* A dpif_operate() wrapper for performing a single DPIF_OP_EXECUTE. */
758c456d
JR
1309int
1310dpif_execute(struct dpif *dpif, struct dpif_execute *execute)
89625d1e 1311{
1a0c894a
BP
1312 if (execute->actions_len) {
1313 struct dpif_op *opp;
1314 struct dpif_op op;
89625d1e 1315
1a0c894a
BP
1316 op.type = DPIF_OP_EXECUTE;
1317 op.u.execute = *execute;
89625d1e 1318
1a0c894a
BP
1319 opp = &op;
1320 dpif_operate(dpif, &opp, 1);
89625d1e 1321
1a0c894a
BP
1322 return op.error;
1323 } else {
1324 return 0;
1325 }
89625d1e
BP
1326}
1327
6bc60024 1328/* Executes each of the 'n_ops' operations in 'ops' on 'dpif', in the order in
1a0c894a
BP
1329 * which they are specified. Places each operation's results in the "output"
1330 * members documented in comments, and 0 in the 'error' member on success or a
1331 * positive errno on failure. */
6bc60024 1332void
c2b565b5 1333dpif_operate(struct dpif *dpif, struct dpif_op **ops, size_t n_ops)
6bc60024 1334{
1a0c894a
BP
1335 while (n_ops > 0) {
1336 size_t chunk;
7fd91025 1337
1a0c894a
BP
1338 /* Count 'chunk', the number of ops that can be executed without
1339 * needing any help. Ops that need help should be rare, so we
1340 * expect this to ordinarily be 'n_ops', that is, all the ops. */
1341 for (chunk = 0; chunk < n_ops; chunk++) {
1342 struct dpif_op *op = ops[chunk];
1343
1344 if (op->type == DPIF_OP_EXECUTE
1345 && dpif_execute_needs_help(&op->u.execute)) {
1346 break;
1347 }
1348 }
7fd91025 1349
1a0c894a
BP
1350 if (chunk) {
1351 /* Execute a chunk full of ops that the dpif provider can
1352 * handle itself, without help. */
1353 size_t i;
7fd91025 1354
1a0c894a 1355 dpif->dpif_class->operate(dpif, ops, chunk);
7fd91025 1356
1a0c894a
BP
1357 for (i = 0; i < chunk; i++) {
1358 struct dpif_op *op = ops[i];
1359 int error = op->error;
7fd91025 1360
1a0c894a
BP
1361 switch (op->type) {
1362 case DPIF_OP_FLOW_PUT: {
1363 struct dpif_flow_put *put = &op->u.flow_put;
7fd91025 1364
1a0c894a 1365 COVERAGE_INC(dpif_flow_put);
eff1e5b0 1366 log_flow_put_message(dpif, &this_module, put, error);
1a0c894a
BP
1367 if (error && put->stats) {
1368 memset(put->stats, 0, sizeof *put->stats);
7fd91025 1369 }
1a0c894a 1370 break;
7fd91025
BP
1371 }
1372
6fe09f8c
JS
1373 case DPIF_OP_FLOW_GET: {
1374 struct dpif_flow_get *get = &op->u.flow_get;
1375
1376 COVERAGE_INC(dpif_flow_get);
6fe09f8c
JS
1377 if (error) {
1378 memset(get->flow, 0, sizeof *get->flow);
1379 }
eff1e5b0 1380 log_flow_get_message(dpif, &this_module, get, error);
72d52166 1381
6fe09f8c
JS
1382 break;
1383 }
1384
1a0c894a
BP
1385 case DPIF_OP_FLOW_DEL: {
1386 struct dpif_flow_del *del = &op->u.flow_del;
7fd91025 1387
1a0c894a 1388 COVERAGE_INC(dpif_flow_del);
eff1e5b0 1389 log_flow_del_message(dpif, &this_module, del, error);
1a0c894a
BP
1390 if (error && del->stats) {
1391 memset(del->stats, 0, sizeof *del->stats);
1392 }
1393 break;
1394 }
f23d2845 1395
1a0c894a
BP
1396 case DPIF_OP_EXECUTE:
1397 COVERAGE_INC(dpif_execute);
eff1e5b0
RD
1398 log_execute_message(dpif, &this_module, &op->u.execute,
1399 false, error);
1a0c894a
BP
1400 break;
1401 }
1402 }
b99d3cee 1403
1a0c894a
BP
1404 ops += chunk;
1405 n_ops -= chunk;
1406 } else {
1407 /* Help the dpif provider to execute one op. */
1408 struct dpif_op *op = ops[0];
b99d3cee 1409
1a0c894a
BP
1410 COVERAGE_INC(dpif_execute);
1411 op->error = dpif_execute_with_help(dpif, &op->u.execute);
1412 ops++;
1413 n_ops--;
6bc60024
BP
1414 }
1415 }
1416}
1417
01545c1a
BP
1418/* Returns a string that represents 'type', for use in log messages. */
1419const char *
1420dpif_upcall_type_to_string(enum dpif_upcall_type type)
1421{
1422 switch (type) {
1423 case DPIF_UC_MISS: return "miss";
1424 case DPIF_UC_ACTION: return "action";
01545c1a
BP
1425 case DPIF_N_UC_TYPES: default: return "<unknown>";
1426 }
1427}
1428
a12b3ead
BP
1429/* Enables or disables receiving packets with dpif_recv() on 'dpif'. Returns 0
1430 * if successful, otherwise a positive errno value.
98403001 1431 *
a12b3ead 1432 * Turning packet receive off and then back on may change the Netlink PID
98403001
BP
1433 * assignments returned by dpif_port_get_pid(). If the client does this, it
1434 * must update all of the flows that have OVS_ACTION_ATTR_USERSPACE actions
1435 * using the new PID assignment. */
8f24562a 1436int
a12b3ead 1437dpif_recv_set(struct dpif *dpif, bool enable)
8f24562a 1438{
6b31e073
RW
1439 int error = 0;
1440
1441 if (dpif->dpif_class->recv_set) {
1442 error = dpif->dpif_class->recv_set(dpif, enable);
1443 log_operation(dpif, "recv_set", error);
1444 }
96fba48f 1445 return error;
8f24562a
BP
1446}
1447
1954e6bb
AW
1448/* Refreshes the poll loops and Netlink sockets associated to each port,
1449 * when the number of upcall handlers (upcall receiving thread) is changed
1450 * to 'n_handlers' and receiving packets for 'dpif' is enabled by
1451 * recv_set().
1452 *
1453 * Since multiple upcall handlers can read upcalls simultaneously from
1454 * 'dpif', each port can have multiple Netlink sockets, one per upcall
1455 * handler. So, handlers_set() is responsible for the following tasks:
1456 *
1457 * When receiving upcall is enabled, extends or creates the
1458 * configuration to support:
1459 *
1460 * - 'n_handlers' Netlink sockets for each port.
1461 *
1462 * - 'n_handlers' poll loops, one for each upcall handler.
1463 *
1464 * - registering the Netlink sockets for the same upcall handler to
1465 * the corresponding poll loop.
1466 *
1467 * Returns 0 if successful, otherwise a positive errno value. */
1468int
1469dpif_handlers_set(struct dpif *dpif, uint32_t n_handlers)
1470{
6b31e073
RW
1471 int error = 0;
1472
1473 if (dpif->dpif_class->handlers_set) {
1474 error = dpif->dpif_class->handlers_set(dpif, n_handlers);
1475 log_operation(dpif, "handlers_set", error);
1476 }
1954e6bb
AW
1477 return error;
1478}
1479
e4e74c3a
AW
1480void
1481dpif_register_dp_purge_cb(struct dpif *dpif, dp_purge_callback *cb, void *aux)
1482{
1483 if (dpif->dpif_class->register_dp_purge_cb) {
1484 dpif->dpif_class->register_dp_purge_cb(dpif, cb, aux);
1485 }
1486}
1487
6b31e073 1488void
623540e4 1489dpif_register_upcall_cb(struct dpif *dpif, upcall_callback *cb, void *aux)
6b31e073
RW
1490{
1491 if (dpif->dpif_class->register_upcall_cb) {
623540e4 1492 dpif->dpif_class->register_upcall_cb(dpif, cb, aux);
6b31e073
RW
1493 }
1494}
1495
1496void
1497dpif_enable_upcall(struct dpif *dpif)
1498{
1499 if (dpif->dpif_class->enable_upcall) {
1500 dpif->dpif_class->enable_upcall(dpif);
1501 }
1502}
1503
1504void
1505dpif_disable_upcall(struct dpif *dpif)
1506{
1507 if (dpif->dpif_class->disable_upcall) {
1508 dpif->dpif_class->disable_upcall(dpif);
1509 }
1510}
1511
1512void
1513dpif_print_packet(struct dpif *dpif, struct dpif_upcall *upcall)
1514{
1515 if (!VLOG_DROP_DBG(&dpmsg_rl)) {
1516 struct ds flow;
1517 char *packet;
1518
2482b0b0 1519 packet = ofp_dp_packet_to_string(&upcall->packet);
6b31e073
RW
1520
1521 ds_init(&flow);
1522 odp_flow_key_format(upcall->key, upcall->key_len, &flow);
1523
1524 VLOG_DBG("%s: %s upcall:\n%s\n%s",
1525 dpif_name(dpif), dpif_upcall_type_to_string(upcall->type),
1526 ds_cstr(&flow), packet);
1527
1528 ds_destroy(&flow);
1529 free(packet);
1530 }
1531}
1532
d4f6865c
DDP
1533/* Pass custom configuration to the datapath implementation. Some of the
1534 * changes can be postponed until dpif_run() is called. */
f2eee189 1535int
d4f6865c 1536dpif_set_config(struct dpif *dpif, const struct smap *cfg)
f2eee189
AW
1537{
1538 int error = 0;
1539
d4f6865c
DDP
1540 if (dpif->dpif_class->set_config) {
1541 error = dpif->dpif_class->set_config(dpif, cfg);
f2eee189 1542 if (error) {
d4f6865c 1543 log_operation(dpif, "set_config", error);
f2eee189
AW
1544 }
1545 }
1546
1547 return error;
1548}
1549
a0439037
KF
1550/* Polls for an upcall from 'dpif' for an upcall handler. Since there can
1551 * be multiple poll loops, 'handler_id' is needed as index to identify the
1552 * corresponding poll loop. If successful, stores the upcall into '*upcall',
1553 * using 'buf' for storage. Should only be called if 'recv_set' has been used
1554 * to enable receiving packets from 'dpif'.
96fba48f 1555 *
da546e07
JR
1556 * 'upcall->key' and 'upcall->userdata' point into data in the caller-provided
1557 * 'buf', so their memory cannot be freed separately from 'buf'.
856081f6 1558 *
837a88dc
JR
1559 * The caller owns the data of 'upcall->packet' and may modify it. If
1560 * packet's headroom is exhausted as it is manipulated, 'upcall->packet'
1561 * will be reallocated. This requires the data of 'upcall->packet' to be
1562 * released with ofpbuf_uninit() before 'upcall' is destroyed. However,
1563 * when an error is returned, the 'upcall->packet' may be uninitialized
1564 * and should not be released.
1565 *
96fba48f 1566 * Returns 0 if successful, otherwise a positive errno value. Returns EAGAIN
856081f6 1567 * if no upcall is immediately available. */
064af421 1568int
1954e6bb
AW
1569dpif_recv(struct dpif *dpif, uint32_t handler_id, struct dpif_upcall *upcall,
1570 struct ofpbuf *buf)
064af421 1571{
6b31e073 1572 int error = EAGAIN;
01545c1a 1573
6b31e073
RW
1574 if (dpif->dpif_class->recv) {
1575 error = dpif->dpif_class->recv(dpif, handler_id, upcall, buf);
1576 if (!error) {
1577 dpif_print_packet(dpif, upcall);
1578 } else if (error != EAGAIN) {
1579 log_operation(dpif, "recv", error);
1580 }
064af421 1581 }
064af421
BP
1582 return error;
1583}
1584
96fba48f 1585/* Discards all messages that would otherwise be received by dpif_recv() on
1ba530f4
BP
1586 * 'dpif'. */
1587void
96fba48f
BP
1588dpif_recv_purge(struct dpif *dpif)
1589{
96fba48f 1590 COVERAGE_INC(dpif_purge);
1ba530f4
BP
1591 if (dpif->dpif_class->recv_purge) {
1592 dpif->dpif_class->recv_purge(dpif);
96fba48f 1593 }
96fba48f
BP
1594}
1595
1954e6bb
AW
1596/* Arranges for the poll loop for an upcall handler to wake up when 'dpif'
1597 * 'dpif' has a message queued to be received with the recv member
1598 * function. Since there can be multiple poll loops, 'handler_id' is
1599 * needed as index to identify the corresponding poll loop. */
064af421 1600void
1954e6bb 1601dpif_recv_wait(struct dpif *dpif, uint32_t handler_id)
064af421 1602{
6b31e073
RW
1603 if (dpif->dpif_class->recv_wait) {
1604 dpif->dpif_class->recv_wait(dpif, handler_id);
1605 }
064af421 1606}
53a4218d 1607
b5cbbcf6
AZ
1608/*
1609 * Return the datapath version. Caller is responsible for freeing
1610 * the string.
1611 */
1612char *
1613dpif_get_dp_version(const struct dpif *dpif)
1614{
1615 char *version = NULL;
1616
1617 if (dpif->dpif_class->get_datapath_version) {
1618 version = dpif->dpif_class->get_datapath_version();
1619 }
1620
1621 return version;
1622}
1623
96fba48f
BP
1624/* Obtains the NetFlow engine type and engine ID for 'dpif' into '*engine_type'
1625 * and '*engine_id', respectively. */
53a4218d
BP
1626void
1627dpif_get_netflow_ids(const struct dpif *dpif,
1628 uint8_t *engine_type, uint8_t *engine_id)
1629{
96fba48f
BP
1630 *engine_type = dpif->netflow_engine_type;
1631 *engine_id = dpif->netflow_engine_id;
1632}
aae51f53
BP
1633
1634/* Translates OpenFlow queue ID 'queue_id' (in host byte order) into a priority
abff858b
PS
1635 * value used for setting packet priority.
1636 * On success, returns 0 and stores the priority into '*priority'.
1637 * On failure, returns a positive errno value and stores 0 into '*priority'. */
aae51f53
BP
1638int
1639dpif_queue_to_priority(const struct dpif *dpif, uint32_t queue_id,
1640 uint32_t *priority)
1641{
1642 int error = (dpif->dpif_class->queue_to_priority
1643 ? dpif->dpif_class->queue_to_priority(dpif, queue_id,
1644 priority)
1645 : EOPNOTSUPP);
1646 if (error) {
1647 *priority = 0;
1648 }
1649 log_operation(dpif, "queue_to_priority", error);
1650 return error;
1651}
96fba48f
BP
1652\f
1653void
1acb6baa
BP
1654dpif_init(struct dpif *dpif, const struct dpif_class *dpif_class,
1655 const char *name,
96fba48f
BP
1656 uint8_t netflow_engine_type, uint8_t netflow_engine_id)
1657{
1acb6baa 1658 dpif->dpif_class = dpif_class;
1a6f1e2a 1659 dpif->base_name = xstrdup(name);
a4af0040 1660 dpif->full_name = xasprintf("%s@%s", dpif_class->type, name);
96fba48f
BP
1661 dpif->netflow_engine_type = netflow_engine_type;
1662 dpif->netflow_engine_id = netflow_engine_id;
1663}
999401aa
JG
1664
1665/* Undoes the results of initialization.
1666 *
1667 * Normally this function only needs to be called from dpif_close().
1668 * However, it may be called by providers due to an error on opening
1669 * that occurs after initialization. It this case dpif_close() would
1670 * never be called. */
1671void
1672dpif_uninit(struct dpif *dpif, bool close)
1673{
1674 char *base_name = dpif->base_name;
1675 char *full_name = dpif->full_name;
1676
1677 if (close) {
a4af0040 1678 dpif->dpif_class->close(dpif);
999401aa
JG
1679 }
1680
1681 free(base_name);
1682 free(full_name);
1683}
96fba48f
BP
1684\f
1685static void
1686log_operation(const struct dpif *dpif, const char *operation, int error)
1687{
1688 if (!error) {
1689 VLOG_DBG_RL(&dpmsg_rl, "%s: %s success", dpif_name(dpif), operation);
90bf1e07 1690 } else if (ofperr_is_valid(error)) {
96fba48f 1691 VLOG_WARN_RL(&error_rl, "%s: %s failed (%s)",
90bf1e07 1692 dpif_name(dpif), operation, ofperr_get_name(error));
71ce9235 1693 } else {
90bf1e07 1694 VLOG_WARN_RL(&error_rl, "%s: %s failed (%s)",
10a89ef0 1695 dpif_name(dpif), operation, ovs_strerror(error));
96fba48f
BP
1696 }
1697}
1698
1699static enum vlog_level
1700flow_message_log_level(int error)
1701{
9b1a48c2
JP
1702 /* If flows arrive in a batch, userspace may push down multiple
1703 * unique flow definitions that overlap when wildcards are applied.
1704 * Kernels that support flow wildcarding will reject these flows as
1705 * duplicates (EEXIST), so lower the log level to debug for these
1706 * types of messages. */
1707 return (error && error != EEXIST) ? VLL_WARN : VLL_DBG;
96fba48f
BP
1708}
1709
1710static bool
eff1e5b0 1711should_log_flow_message(const struct vlog_module *module, int error)
96fba48f 1712{
eff1e5b0 1713 return !vlog_should_drop(module, flow_message_log_level(error),
96fba48f
BP
1714 error ? &error_rl : &dpmsg_rl);
1715}
1716
eff1e5b0
RD
1717void
1718log_flow_message(const struct dpif *dpif, int error,
1719 const struct vlog_module *module,
1720 const char *operation,
36956a7d 1721 const struct nlattr *key, size_t key_len,
61fb711d 1722 const struct nlattr *mask, size_t mask_len,
70e5ed6f 1723 const ovs_u128 *ufid, const struct dpif_flow_stats *stats,
cf22f8cb 1724 const struct nlattr *actions, size_t actions_len)
96fba48f
BP
1725{
1726 struct ds ds = DS_EMPTY_INITIALIZER;
1727 ds_put_format(&ds, "%s: ", dpif_name(dpif));
1728 if (error) {
1729 ds_put_cstr(&ds, "failed to ");
1730 }
1731 ds_put_format(&ds, "%s ", operation);
1732 if (error) {
10a89ef0 1733 ds_put_format(&ds, "(%s) ", ovs_strerror(error));
96fba48f 1734 }
70e5ed6f
JS
1735 if (ufid) {
1736 odp_format_ufid(ufid, &ds);
1737 ds_put_cstr(&ds, " ");
1738 }
0a37839c 1739 odp_flow_format(key, key_len, mask, mask_len, NULL, &ds, true);
96fba48f
BP
1740 if (stats) {
1741 ds_put_cstr(&ds, ", ");
c97fb132 1742 dpif_flow_stats_format(stats, &ds);
96fba48f 1743 }
cdee00fd 1744 if (actions || actions_len) {
96fba48f 1745 ds_put_cstr(&ds, ", actions:");
0722f341 1746 format_odp_actions(&ds, actions, actions_len, NULL);
96fba48f 1747 }
eff1e5b0 1748 vlog(module, flow_message_log_level(error), "%s", ds_cstr(&ds));
96fba48f
BP
1749 ds_destroy(&ds);
1750}
89625d1e 1751
eff1e5b0
RD
1752void
1753log_flow_put_message(const struct dpif *dpif,
1754 const struct vlog_module *module,
1755 const struct dpif_flow_put *put,
89625d1e
BP
1756 int error)
1757{
eff1e5b0
RD
1758 if (should_log_flow_message(module, error)
1759 && !(put->flags & DPIF_FP_PROBE)) {
89625d1e
BP
1760 struct ds s;
1761
1762 ds_init(&s);
1763 ds_put_cstr(&s, "put");
1764 if (put->flags & DPIF_FP_CREATE) {
1765 ds_put_cstr(&s, "[create]");
1766 }
1767 if (put->flags & DPIF_FP_MODIFY) {
1768 ds_put_cstr(&s, "[modify]");
1769 }
1770 if (put->flags & DPIF_FP_ZERO_STATS) {
1771 ds_put_cstr(&s, "[zero]");
1772 }
eff1e5b0 1773 log_flow_message(dpif, error, module, ds_cstr(&s),
61fb711d 1774 put->key, put->key_len, put->mask, put->mask_len,
70e5ed6f
JS
1775 put->ufid, put->stats, put->actions,
1776 put->actions_len);
89625d1e
BP
1777 ds_destroy(&s);
1778 }
1779}
1780
eff1e5b0
RD
1781void
1782log_flow_del_message(const struct dpif *dpif,
1783 const struct vlog_module *module,
1784 const struct dpif_flow_del *del,
b99d3cee
BP
1785 int error)
1786{
eff1e5b0
RD
1787 if (should_log_flow_message(module, error)) {
1788 log_flow_message(dpif, error, module, "flow_del",
1789 del->key, del->key_len,
70e5ed6f
JS
1790 NULL, 0, del->ufid, !error ? del->stats : NULL,
1791 NULL, 0);
b99d3cee
BP
1792 }
1793}
1794
f0fe12fc
BP
1795/* Logs that 'execute' was executed on 'dpif' and completed with errno 'error'
1796 * (0 for success). 'subexecute' should be true if the execution is a result
1797 * of breaking down a larger execution that needed help, false otherwise.
1798 *
1799 *
1800 * XXX In theory, the log message could be deceptive because this function is
1801 * called after the dpif_provider's '->execute' function, which is allowed to
1802 * modify execute->packet and execute->md. In practice, though:
1803 *
93451a0a 1804 * - dpif-netlink doesn't modify execute->packet or execute->md.
f0fe12fc
BP
1805 *
1806 * - dpif-netdev does modify them but it is less likely to have problems
1807 * because it is built into ovs-vswitchd and cannot have version skew,
1808 * etc.
1809 *
1810 * It would still be better to avoid the potential problem. I don't know of a
1811 * good way to do that, though, that isn't expensive. */
eff1e5b0
RD
1812void
1813log_execute_message(const struct dpif *dpif,
1814 const struct vlog_module *module,
1815 const struct dpif_execute *execute,
fc65bafc 1816 bool subexecute, int error)
89625d1e 1817{
43f9ac0a
JR
1818 if (!(error ? VLOG_DROP_WARN(&error_rl) : VLOG_DROP_DBG(&dpmsg_rl))
1819 && !execute->probe) {
89625d1e
BP
1820 struct ds ds = DS_EMPTY_INITIALIZER;
1821 char *packet;
b701bce9
JR
1822 uint64_t stub[1024 / 8];
1823 struct ofpbuf md = OFPBUF_STUB_INITIALIZER(stub);
89625d1e 1824
cf62fa4c 1825 packet = ofp_packet_to_string(dp_packet_data(execute->packet),
2482b0b0
JS
1826 dp_packet_size(execute->packet),
1827 execute->packet->packet_type);
beb75a40 1828 odp_key_from_dp_packet(&md, execute->packet);
fc65bafc
BP
1829 ds_put_format(&ds, "%s: %sexecute ",
1830 dpif_name(dpif),
1831 (subexecute ? "sub-"
1832 : dpif_execute_needs_help(execute) ? "super-"
1833 : ""));
0722f341 1834 format_odp_actions(&ds, execute->actions, execute->actions_len, NULL);
89625d1e 1835 if (error) {
10a89ef0 1836 ds_put_format(&ds, " failed (%s)", ovs_strerror(error));
89625d1e
BP
1837 }
1838 ds_put_format(&ds, " on packet %s", packet);
b701bce9
JR
1839 ds_put_format(&ds, " with metadata ");
1840 odp_flow_format(md.data, md.size, NULL, 0, NULL, &ds, true);
27130224 1841 ds_put_format(&ds, " mtu %d", execute->mtu);
eff1e5b0 1842 vlog(module, error ? VLL_WARN : VLL_DBG, "%s", ds_cstr(&ds));
89625d1e
BP
1843 ds_destroy(&ds);
1844 free(packet);
b701bce9 1845 ofpbuf_uninit(&md);
89625d1e
BP
1846 }
1847}
6fe09f8c 1848
eff1e5b0
RD
1849void
1850log_flow_get_message(const struct dpif *dpif,
1851 const struct vlog_module *module,
1852 const struct dpif_flow_get *get,
6fe09f8c
JS
1853 int error)
1854{
eff1e5b0
RD
1855 if (should_log_flow_message(module, error)) {
1856 log_flow_message(dpif, error, module, "flow_get",
6fe09f8c
JS
1857 get->key, get->key_len,
1858 get->flow->mask, get->flow->mask_len,
70e5ed6f 1859 get->ufid, &get->flow->stats,
6fe09f8c
JS
1860 get->flow->actions, get->flow->actions_len);
1861 }
1862}
a36de779
PS
1863
1864bool
1865dpif_supports_tnl_push_pop(const struct dpif *dpif)
1866{
c4ea7529 1867 return dpif_is_netdev(dpif);
a36de779 1868}
5dddf960
JR
1869
1870/* Meters */
1871void
1872dpif_meter_get_features(const struct dpif *dpif,
1873 struct ofputil_meter_features *features)
1874{
1875 memset(features, 0, sizeof *features);
1876 if (dpif->dpif_class->meter_get_features) {
1877 dpif->dpif_class->meter_get_features(dpif, features);
1878 }
1879}
1880
1881/* Adds or modifies meter identified by 'meter_id' in 'dpif'. If '*meter_id'
1882 * is UINT32_MAX, adds a new meter, otherwise modifies an existing meter.
1883 *
1884 * If meter is successfully added, sets '*meter_id' to the new meter's
1885 * meter number. */
1886int
1887dpif_meter_set(struct dpif *dpif, ofproto_meter_id *meter_id,
1888 struct ofputil_meter_config *config)
1889{
1890 int error;
1891
1892 COVERAGE_INC(dpif_meter_set);
1893
1894 error = dpif->dpif_class->meter_set(dpif, meter_id, config);
1895 if (!error) {
1896 VLOG_DBG_RL(&dpmsg_rl, "%s: DPIF meter %"PRIu32" set",
1897 dpif_name(dpif), meter_id->uint32);
1898 } else {
1899 VLOG_WARN_RL(&error_rl, "%s: failed to set DPIF meter %"PRIu32": %s",
1900 dpif_name(dpif), meter_id->uint32, ovs_strerror(error));
1901 meter_id->uint32 = UINT32_MAX;
1902 }
1903 return error;
1904}
1905
1906int
1907dpif_meter_get(const struct dpif *dpif, ofproto_meter_id meter_id,
1908 struct ofputil_meter_stats *stats, uint16_t n_bands)
1909{
1910 int error;
1911
1912 COVERAGE_INC(dpif_meter_get);
1913
1914 error = dpif->dpif_class->meter_get(dpif, meter_id, stats, n_bands);
1915 if (!error) {
1916 VLOG_DBG_RL(&dpmsg_rl, "%s: DPIF meter %"PRIu32" get stats",
1917 dpif_name(dpif), meter_id.uint32);
1918 } else {
1919 VLOG_WARN_RL(&error_rl,
1920 "%s: failed to get DPIF meter %"PRIu32" stats: %s",
1921 dpif_name(dpif), meter_id.uint32, ovs_strerror(error));
1922 stats->packet_in_count = ~0;
1923 stats->byte_in_count = ~0;
1924 stats->n_bands = 0;
1925 }
1926 return error;
1927}
1928
1929int
1930dpif_meter_del(struct dpif *dpif, ofproto_meter_id meter_id,
1931 struct ofputil_meter_stats *stats, uint16_t n_bands)
1932{
1933 int error;
1934
1935 COVERAGE_INC(dpif_meter_del);
1936
1937 error = dpif->dpif_class->meter_del(dpif, meter_id, stats, n_bands);
1938 if (!error) {
1939 VLOG_DBG_RL(&dpmsg_rl, "%s: DPIF meter %"PRIu32" deleted",
1940 dpif_name(dpif), meter_id.uint32);
1941 } else {
1942 VLOG_WARN_RL(&error_rl,
1943 "%s: failed to delete DPIF meter %"PRIu32": %s",
1944 dpif_name(dpif), meter_id.uint32, ovs_strerror(error));
1945 if (stats) {
1946 stats->packet_in_count = ~0;
1947 stats->byte_in_count = ~0;
1948 stats->n_bands = 0;
1949 }
1950 }
1951 return error;
1952}