]>
Commit | Line | Data |
---|---|---|
d08a2e92 | 1 | /* |
06a0f3e2 | 2 | * Copyright (c) 2009, 2010, 2011, 2012, 2013, 2014 Nicira, Inc. |
d08a2e92 BP |
3 | * |
4 | * Licensed under the Apache License, Version 2.0 (the "License"); | |
5 | * you may not use this file except in compliance with the License. | |
6 | * You may obtain a copy of the License at: | |
7 | * | |
8 | * http://www.apache.org/licenses/LICENSE-2.0 | |
9 | * | |
10 | * Unless required by applicable law or agreed to in writing, software | |
11 | * distributed under the License is distributed on an "AS IS" BASIS, | |
12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |
13 | * See the License for the specific language governing permissions and | |
14 | * limitations under the License. | |
15 | */ | |
16 | ||
5bee6e26 JP |
17 | #ifndef OFPROTO_OFPROTO_PROVIDER_H |
18 | #define OFPROTO_OFPROTO_PROVIDER_H 1 | |
d08a2e92 | 19 | |
15aaf599 BP |
20 | /* Definitions for use within ofproto. |
21 | * | |
22 | * | |
23 | * Thread-safety | |
24 | * ============= | |
25 | * | |
26 | * Lots of ofproto data structures are only accessed from a single thread. | |
27 | * Those data structures are generally not thread-safe. | |
28 | * | |
29 | * The ofproto-dpif ofproto implementation accesses the flow table from | |
30 | * multiple threads, including modifying the flow table from multiple threads | |
31 | * via the "learn" action, so the flow table and various structures that index | |
32 | * it have been made thread-safe. Refer to comments on individual data | |
33 | * structures for details. | |
34 | */ | |
d08a2e92 | 35 | |
1de11730 | 36 | #include "cfm.h" |
abe529af | 37 | #include "classifier.h" |
35412852 | 38 | #include "guarded-list.h" |
254750ce | 39 | #include "heap.h" |
98eaac36 | 40 | #include "hindex.h" |
abe529af | 41 | #include "list.h" |
dc723c44 | 42 | #include "ofp-actions.h" |
90bf1e07 | 43 | #include "ofp-errors.h" |
9e1fd49b | 44 | #include "ofp-util.h" |
a3779dbc | 45 | #include "ofproto/ofproto.h" |
a2143702 | 46 | #include "ovs-atomic.h" |
06a0f3e2 | 47 | #include "ovs-rcu.h" |
a3779dbc | 48 | #include "ovs-thread.h" |
abe529af | 49 | #include "shash.h" |
e1b1d06a | 50 | #include "simap.h" |
abe529af BP |
51 | #include "timeval.h" |
52 | ||
81a76618 | 53 | struct match; |
75a75043 | 54 | struct ofputil_flow_mod; |
ccc09689 | 55 | struct bfd_cfg; |
9cae45dc | 56 | struct meter; |
b20f4073 | 57 | struct ofoperation; |
75a75043 | 58 | |
abe7b10f BP |
59 | extern struct ovs_mutex ofproto_mutex; |
60 | ||
abe529af BP |
61 | /* An OpenFlow switch. |
62 | * | |
63 | * With few exceptions, ofproto implementations may look at these fields but | |
64 | * should not modify them. */ | |
65 | struct ofproto { | |
6e492d81 | 66 | struct hmap_node hmap_node; /* In global 'all_ofprotos' hmap. */ |
abe529af BP |
67 | const struct ofproto_class *ofproto_class; |
68 | char *type; /* Datapath type. */ | |
69 | char *name; /* Datapath name. */ | |
abe529af BP |
70 | |
71 | /* Settings. */ | |
72 | uint64_t fallback_dpid; /* Datapath ID if no better choice found. */ | |
73 | uint64_t datapath_id; /* Datapath ID. */ | |
8402c74b SS |
74 | bool forward_bpdu; /* Option to allow forwarding of BPDU frames |
75 | * when NORMAL action is invoked. */ | |
71dab241 | 76 | char *mfr_desc; /* Manufacturer (NULL for default). */ |
061bfea4 BP |
77 | char *hw_desc; /* Hardware (NULL for default). */ |
78 | char *sw_desc; /* Software version (NULL for default). */ | |
79 | char *serial_desc; /* Serial number (NULL for default). */ | |
80 | char *dp_desc; /* Datapath description (NULL for default). */ | |
7257b535 | 81 | enum ofp_config_flags frag_handling; /* One of OFPC_*. */ |
abe529af BP |
82 | |
83 | /* Datapath. */ | |
abe529af BP |
84 | struct hmap ports; /* Contains "struct ofport"s. */ |
85 | struct shash port_by_name; | |
e1b1d06a | 86 | struct simap ofp_requests; /* OpenFlow port number requests. */ |
430dbb14 AW |
87 | uint16_t alloc_port_no; /* Last allocated OpenFlow port number. */ |
88 | uint16_t max_ports; /* Max possible OpenFlow port num, plus one. */ | |
fdcea803 | 89 | struct hmap ofport_usage; /* Map ofport to last used time. */ |
da4a6191 | 90 | uint64_t change_seq; /* Change sequence for netdev status. */ |
abe529af | 91 | |
6c1491fb | 92 | /* Flow tables. */ |
448c2fa8 | 93 | long long int eviction_group_timer; /* For rate limited reheapification. */ |
d0918789 | 94 | struct oftable *tables; |
6c1491fb | 95 | int n_tables; |
abe529af | 96 | |
2c916028 BP |
97 | /* Rules indexed on their cookie values, in all flow tables. */ |
98 | struct hindex cookies OVS_GUARDED_BY(ofproto_mutex); | |
35f48b8b | 99 | struct hmap learned_cookies OVS_GUARDED_BY(ofproto_mutex); |
98eaac36 | 100 | |
abe7b10f BP |
101 | /* List of expirable flows, in all flow tables. */ |
102 | struct list expirable OVS_GUARDED_BY(ofproto_mutex); | |
e503cc19 | 103 | |
9cae45dc JR |
104 | /* Meter table. |
105 | * OpenFlow meters start at 1. To avoid confusion we leave the first | |
106 | * pointer in the array un-used, and index directly with the OpenFlow | |
107 | * meter_id. */ | |
108 | struct ofputil_meter_features meter_features; | |
109 | struct meter **meters; /* 'meter_features.max_meter' + 1 pointers. */ | |
110 | ||
abe529af BP |
111 | /* OpenFlow connections. */ |
112 | struct connmgr *connmgr; | |
7ee20df1 | 113 | |
35412852 BP |
114 | /* Delayed rule executions. |
115 | * | |
116 | * We delay calls to ->ofproto_class->rule_execute() past releasing | |
117 | * ofproto_mutex during a flow_mod, because otherwise a "learn" action | |
118 | * triggered by the executing the packet would try to recursively modify | |
119 | * the flow table and reacquire the global lock. */ | |
15aaf599 | 120 | struct guarded_list rule_executes; /* Contains "struct rule_execute"s. */ |
35412852 | 121 | |
52a90c29 BP |
122 | /* Linux VLAN device support (e.g. "eth0.10" for VLAN 10.) |
123 | * | |
124 | * This is deprecated. It is only for compatibility with broken device | |
125 | * drivers in old versions of Linux that do not properly support VLANs when | |
126 | * VLAN devices are not used. When broken device drivers are no longer in | |
127 | * widespread use, we will delete these interfaces. */ | |
128 | unsigned long int *vlan_bitmap; /* 4096-bit bitmap of in-use VLANs. */ | |
129 | bool vlans_changed; /* True if new VLANs are in use. */ | |
ada3428f | 130 | int min_mtu; /* Current MTU of non-internal ports. */ |
7395c052 NZ |
131 | |
132 | /* Groups. */ | |
133 | struct ovs_rwlock groups_rwlock; | |
134 | struct hmap groups OVS_GUARDED; /* Contains "struct ofgroup"s. */ | |
135 | uint32_t n_groups[4] OVS_GUARDED; /* # of existing groups of each type. */ | |
136 | struct ofputil_group_features ogf; | |
abe529af BP |
137 | }; |
138 | ||
0f5f95a9 | 139 | void ofproto_init_tables(struct ofproto *, int n_tables); |
430dbb14 | 140 | void ofproto_init_max_ports(struct ofproto *, uint16_t max_ports); |
0f5f95a9 | 141 | |
abe529af | 142 | struct ofproto *ofproto_lookup(const char *name); |
4e022ec0 | 143 | struct ofport *ofproto_get_port(const struct ofproto *, ofp_port_t ofp_port); |
abe529af BP |
144 | |
145 | /* An OpenFlow port within a "struct ofproto". | |
1a6495b5 BP |
146 | * |
147 | * The port's name is netdev_get_name(port->netdev). | |
abe529af BP |
148 | * |
149 | * With few exceptions, ofproto implementations may look at these fields but | |
150 | * should not modify them. */ | |
151 | struct ofport { | |
abe529af | 152 | struct hmap_node hmap_node; /* In struct ofproto's "ports" hmap. */ |
6e492d81 | 153 | struct ofproto *ofproto; /* The ofproto that contains this port. */ |
abe529af | 154 | struct netdev *netdev; |
9e1fd49b | 155 | struct ofputil_phy_port pp; |
4e022ec0 | 156 | ofp_port_t ofp_port; /* OpenFlow port number. */ |
61501798 | 157 | uint64_t change_seq; |
65e0be10 | 158 | long long int created; /* Time created, in msec. */ |
9197df76 | 159 | int mtu; |
abe529af BP |
160 | }; |
161 | ||
9e1fd49b | 162 | void ofproto_port_set_state(struct ofport *, enum ofputil_port_state); |
5a2dfd47 | 163 | |
c2f0373a BP |
164 | /* OpenFlow table flags: |
165 | * | |
166 | * - "Hidden" tables are not included in OpenFlow operations that operate on | |
167 | * "all tables". For example, a request for flow stats on all tables will | |
168 | * omit flows in hidden tables, table stats requests will omit the table | |
169 | * entirely, and the switch features reply will not count the hidden table. | |
170 | * | |
171 | * However, operations that specifically name the particular table still | |
172 | * operate on it. For example, flow_mods and flow stats requests on a | |
173 | * hidden table work. | |
174 | * | |
175 | * To avoid gaps in table IDs (which have unclear validity in OpenFlow), | |
176 | * hidden tables must be the highest-numbered tables that a provider | |
177 | * implements. | |
178 | * | |
179 | * - "Read-only" tables can't be changed through OpenFlow operations. (At | |
180 | * the moment all flow table operations go effectively through OpenFlow, so | |
181 | * this means that read-only tables can't be changed at all after the | |
182 | * read-only flag is set.) | |
183 | * | |
184 | * The generic ofproto layer never sets these flags. An ofproto provider can | |
185 | * set them if it is appropriate. | |
186 | */ | |
5c67e4af BP |
187 | enum oftable_flags { |
188 | OFTABLE_HIDDEN = 1 << 0, /* Hide from most OpenFlow operations. */ | |
adcf00ba AZ |
189 | OFTABLE_READONLY = 1 << 1 /* Don't allow OpenFlow controller to change |
190 | this table. */ | |
5c67e4af BP |
191 | }; |
192 | ||
15aaf599 BP |
193 | /* A flow table within a "struct ofproto". |
194 | * | |
195 | * | |
196 | * Thread-safety | |
197 | * ============= | |
198 | * | |
199 | * A cls->rwlock read-lock holder prevents rules from being added or deleted. | |
200 | * | |
201 | * Adding or removing rules requires holding ofproto_mutex AND the cls->rwlock | |
202 | * write-lock. | |
203 | * | |
204 | * cls->rwlock should be held only briefly. For extended access to a rule, | |
205 | * increment its ref_count with ofproto_rule_ref(). A rule will not be freed | |
206 | * until its ref_count reaches zero. | |
207 | * | |
208 | * Modifying a rule requires the rule's own mutex. Holding cls->rwlock (for | |
209 | * read or write) does not allow the holder to modify the rule. | |
210 | * | |
211 | * Freeing a rule requires ofproto_mutex and the cls->rwlock write-lock. After | |
212 | * removing the rule from the classifier, release a ref_count from the rule | |
213 | * ('cls''s reference to the rule). | |
214 | * | |
215 | * Refer to the thread-safety notes on struct rule for more information.*/ | |
d0918789 | 216 | struct oftable { |
5c67e4af | 217 | enum oftable_flags flags; |
d0918789 | 218 | struct classifier cls; /* Contains "struct rule"s. */ |
254750ce BP |
219 | char *name; /* Table name exposed via OpenFlow, or NULL. */ |
220 | ||
221 | /* Maximum number of flows or UINT_MAX if there is no limit besides any | |
222 | * limit imposed by resource limitations. */ | |
223 | unsigned int max_flows; | |
224 | ||
225 | /* These members determine the handling of an attempt to add a flow that | |
226 | * would cause the table to have more than 'max_flows' flows. | |
227 | * | |
228 | * If 'eviction_fields' is NULL, overflows will be rejected with an error. | |
229 | * | |
230 | * If 'eviction_fields' is nonnull (regardless of whether n_eviction_fields | |
231 | * is nonzero), an overflow will cause a flow to be removed. The flow to | |
232 | * be removed is chosen to give fairness among groups distinguished by | |
233 | * different values for the subfields within 'groups'. */ | |
234 | struct mf_subfield *eviction_fields; | |
235 | size_t n_eviction_fields; | |
236 | ||
237 | /* Eviction groups. | |
238 | * | |
239 | * When a flow is added that would cause the table to have more than | |
240 | * 'max_flows' flows, and 'eviction_fields' is nonnull, these groups are | |
241 | * used to decide which rule to evict: the rule is chosen from the eviction | |
242 | * group that contains the greatest number of rules.*/ | |
243 | uint32_t eviction_group_id_basis; | |
244 | struct hmap eviction_groups_by_id; | |
245 | struct heap eviction_groups_by_size; | |
67761761 | 246 | |
6b83a3c5 | 247 | /* Table config: contains enum ofproto_table_config; accessed atomically. */ |
67761761 | 248 | atomic_uint config; |
d611866c SH |
249 | |
250 | atomic_ulong n_matched; | |
251 | atomic_ulong n_missed; | |
d0918789 BP |
252 | }; |
253 | ||
254 | /* Assigns TABLE to each oftable, in turn, in OFPROTO. | |
255 | * | |
256 | * All parameters are evaluated multiple times. */ | |
257 | #define OFPROTO_FOR_EACH_TABLE(TABLE, OFPROTO) \ | |
258 | for ((TABLE) = (OFPROTO)->tables; \ | |
259 | (TABLE) < &(OFPROTO)->tables[(OFPROTO)->n_tables]; \ | |
260 | (TABLE)++) | |
261 | ||
abe529af BP |
262 | /* An OpenFlow flow within a "struct ofproto". |
263 | * | |
264 | * With few exceptions, ofproto implementations may look at these fields but | |
15aaf599 BP |
265 | * should not modify them. |
266 | * | |
267 | * | |
268 | * Thread-safety | |
269 | * ============= | |
270 | * | |
271 | * Except near the beginning or ending of its lifespan, rule 'rule' belongs to | |
272 | * the classifier rule->ofproto->tables[rule->table_id].cls. The text below | |
273 | * calls this classifier 'cls'. | |
274 | * | |
275 | * Motivation | |
276 | * ---------- | |
277 | * | |
278 | * The thread safety rules described here for "struct rule" are motivated by | |
279 | * two goals: | |
280 | * | |
281 | * - Prevent threads that read members of "struct rule" from reading bad | |
282 | * data due to changes by some thread concurrently modifying those | |
283 | * members. | |
284 | * | |
285 | * - Prevent two threads making changes to members of a given "struct rule" | |
286 | * from interfering with each other. | |
287 | * | |
288 | * | |
289 | * Rules | |
290 | * ----- | |
291 | * | |
292 | * A rule 'rule' may be accessed without a risk of being freed by code that | |
293 | * holds a read-lock or write-lock on 'cls->rwlock' or that owns a reference to | |
294 | * 'rule->ref_count' (or both). Code that needs to hold onto a rule for a | |
295 | * while should take 'cls->rwlock', find the rule it needs, increment | |
296 | * 'rule->ref_count' with ofproto_rule_ref(), and drop 'cls->rwlock'. | |
297 | * | |
298 | * 'rule->ref_count' protects 'rule' from being freed. It doesn't protect the | |
299 | * rule from being deleted from 'cls' (that's 'cls->rwlock') and it doesn't | |
7ea33f75 | 300 | * protect members of 'rule' from modification (that's 'rule->mutex'). |
15aaf599 BP |
301 | * |
302 | * 'rule->mutex' protects the members of 'rule' from modification. It doesn't | |
303 | * protect the rule from being deleted from 'cls' (that's 'cls->rwlock') and it | |
304 | * doesn't prevent the rule from being freed (that's 'rule->ref_count'). | |
305 | * | |
306 | * Regarding thread safety, the members of a rule fall into the following | |
307 | * categories: | |
308 | * | |
309 | * - Immutable. These members are marked 'const'. | |
310 | * | |
311 | * - Members that may be safely read or written only by code holding | |
312 | * ofproto_mutex. These are marked OVS_GUARDED_BY(ofproto_mutex). | |
313 | * | |
314 | * - Members that may be safely read only by code holding ofproto_mutex or | |
315 | * 'rule->mutex', and safely written only by coding holding ofproto_mutex | |
316 | * AND 'rule->mutex'. These are marked OVS_GUARDED. | |
317 | */ | |
abe529af | 318 | struct rule { |
49a0e0eb BP |
319 | /* Where this rule resides in an OpenFlow switch. |
320 | * | |
321 | * These are immutable once the rule is constructed, hence 'const'. */ | |
322 | struct ofproto *const ofproto; /* The ofproto that contains this rule. */ | |
323 | const struct cls_rule cr; /* In owning ofproto's classifier. */ | |
324 | const uint8_t table_id; /* Index in ofproto's 'tables' array. */ | |
325 | ||
15aaf599 BP |
326 | /* Protects members marked OVS_GUARDED. |
327 | * Readers only need to hold this mutex. | |
b90d6ee5 JR |
328 | * Writers must hold both this mutex AND ofproto_mutex. |
329 | * By implication writers can read *without* taking this mutex while they | |
330 | * hold ofproto_mutex. */ | |
15aaf599 BP |
331 | struct ovs_mutex mutex OVS_ACQ_AFTER(ofproto_mutex); |
332 | ||
333 | /* Number of references. | |
334 | * The classifier owns one reference. | |
335 | * Any thread trying to keep a rule from being freed should hold its own | |
336 | * reference. */ | |
37bec3d3 | 337 | struct ovs_refcount ref_count; |
abe529af | 338 | |
15aaf599 BP |
339 | /* A "flow cookie" is the OpenFlow name for a 64-bit value associated with |
340 | * a flow.. */ | |
341 | ovs_be64 flow_cookie OVS_GUARDED; | |
2c916028 | 342 | struct hindex_node cookie_node OVS_GUARDED_BY(ofproto_mutex); |
abe529af | 343 | |
15aaf599 | 344 | enum ofputil_flow_mod_flags flags OVS_GUARDED; |
abe529af | 345 | |
15aaf599 | 346 | /* Timeouts. */ |
a3779dbc EJ |
347 | uint16_t hard_timeout OVS_GUARDED; /* In seconds from ->modified. */ |
348 | uint16_t idle_timeout OVS_GUARDED; /* In seconds from ->used. */ | |
349 | ||
15aaf599 | 350 | /* Eviction groups (see comment on struct eviction_group for explanation) . |
884e1dc4 | 351 | * |
15aaf599 BP |
352 | * 'eviction_group' is this rule's eviction group, or NULL if it is not in |
353 | * any eviction group. When 'eviction_group' is nonnull, 'evg_node' is in | |
354 | * the ->eviction_group->rules hmap. */ | |
355 | struct eviction_group *eviction_group OVS_GUARDED_BY(ofproto_mutex); | |
356 | struct heap_node evg_node OVS_GUARDED_BY(ofproto_mutex); | |
ad3efdcb | 357 | |
15aaf599 BP |
358 | /* OpenFlow actions. See struct rule_actions for more thread-safety |
359 | * notes. */ | |
dc723c44 | 360 | OVSRCU_TYPE(const struct rule_actions *) actions; |
2b07c8b1 | 361 | |
15aaf599 BP |
362 | /* In owning meter's 'rules' list. An empty list if there is no meter. */ |
363 | struct list meter_list_node OVS_GUARDED_BY(ofproto_mutex); | |
9cae45dc | 364 | |
15aaf599 BP |
365 | /* Flow monitors (e.g. for NXST_FLOW_MONITOR, related to struct ofmonitor). |
366 | * | |
367 | * 'add_seqno' is the sequence number when this rule was created. | |
368 | * 'modify_seqno' is the sequence number when this rule was last modified. | |
369 | * See 'monitor_seqno' in connmgr.c for more information. */ | |
370 | enum nx_flow_monitor_flags monitor_flags OVS_GUARDED_BY(ofproto_mutex); | |
371 | uint64_t add_seqno OVS_GUARDED_BY(ofproto_mutex); | |
372 | uint64_t modify_seqno OVS_GUARDED_BY(ofproto_mutex); | |
e503cc19 | 373 | |
abe7b10f BP |
374 | /* Optimisation for flow expiry. In ofproto's 'expirable' list if this |
375 | * rule is expirable, otherwise empty. */ | |
376 | struct list expirable OVS_GUARDED_BY(ofproto_mutex); | |
b90d6ee5 JR |
377 | |
378 | /* Times. Last so that they are more likely close to the stats managed | |
379 | * by the provider. */ | |
380 | long long int created OVS_GUARDED; /* Creation time. */ | |
381 | ||
382 | /* Must hold 'mutex' for both read/write, 'ofproto_mutex' not needed. */ | |
383 | long long int modified OVS_GUARDED; /* Time of last modification. */ | |
abe529af BP |
384 | }; |
385 | ||
a2143702 BP |
386 | void ofproto_rule_ref(struct rule *); |
387 | void ofproto_rule_unref(struct rule *); | |
388 | ||
003ce655 JR |
389 | static inline const struct rule_actions * rule_get_actions(const struct rule *); |
390 | static inline bool rule_is_table_miss(const struct rule *); | |
5e8b38b0 | 391 | static inline bool rule_is_hidden(const struct rule *); |
cfa955b0 | 392 | |
6f00e29b BP |
393 | /* A set of actions within a "struct rule". |
394 | * | |
395 | * | |
396 | * Thread-safety | |
397 | * ============= | |
398 | * | |
dc723c44 | 399 | * A struct rule_actions may be accessed without a risk of being |
c7c9a7c8 | 400 | * freed by code that holds a read-lock or write-lock on 'rule->mutex' (where |
dc723c44 | 401 | * 'rule' is the rule for which 'rule->actions == actions') or during the RCU |
4c7562c5 BP |
402 | * active period. |
403 | * | |
404 | * All members are immutable: they do not change during the struct's | |
405 | * lifetime. */ | |
6f00e29b | 406 | struct rule_actions { |
4c7562c5 BP |
407 | /* Flags. |
408 | * | |
35f48b8b BP |
409 | * 'has_meter' is true if 'ofpacts' contains an OFPACT_METER action. |
410 | * | |
411 | * 'has_learn_with_delete' is true if 'ofpacts' contains an OFPACT_LEARN | |
412 | * action whose flags include NX_LEARN_F_DELETE_LEARNED. */ | |
4c7562c5 | 413 | bool has_meter; |
35f48b8b | 414 | bool has_learn_with_delete; |
4c7562c5 BP |
415 | |
416 | /* Actions. */ | |
dc723c44 | 417 | uint32_t ofpacts_len; /* Size of 'ofpacts', in bytes. */ |
dc723c44 | 418 | struct ofpact ofpacts[]; /* Sequence of "struct ofpacts". */ |
6f00e29b | 419 | }; |
dc723c44 | 420 | BUILD_ASSERT_DECL(offsetof(struct rule_actions, ofpacts) % OFPACT_ALIGNTO == 0); |
6f00e29b | 421 | |
4c7562c5 | 422 | const struct rule_actions *rule_actions_create(const struct ofpact *, size_t); |
dc723c44 | 423 | void rule_actions_destroy(const struct rule_actions *); |
cdbdeeda SH |
424 | bool ofproto_rule_has_out_port(const struct rule *, ofp_port_t port) |
425 | OVS_REQUIRES(ofproto_mutex); | |
6f00e29b | 426 | |
a8e547c1 BP |
427 | /* A set of rules to which an OpenFlow operation applies. */ |
428 | struct rule_collection { | |
429 | struct rule **rules; /* The rules. */ | |
430 | size_t n; /* Number of rules collected. */ | |
431 | ||
432 | size_t capacity; /* Number of rules that will fit in 'rules'. */ | |
433 | struct rule *stub[64]; /* Preallocated rules to avoid malloc(). */ | |
434 | }; | |
435 | ||
436 | void rule_collection_init(struct rule_collection *); | |
437 | void rule_collection_add(struct rule_collection *, struct rule *); | |
15aaf599 BP |
438 | void rule_collection_ref(struct rule_collection *) OVS_REQUIRES(ofproto_mutex); |
439 | void rule_collection_unref(struct rule_collection *); | |
a8e547c1 BP |
440 | void rule_collection_destroy(struct rule_collection *); |
441 | ||
e79a6c83 EJ |
442 | /* Limits the number of flows allowed in the datapath. Only affects the |
443 | * ofproto-dpif implementation. */ | |
444 | extern unsigned ofproto_flow_limit; | |
380f49c4 | 445 | |
72310b04 JS |
446 | /* Maximum idle time (in ms) for flows to be cached in the datapath. |
447 | * Revalidators may expire flows more quickly than the configured value based | |
448 | * on system load and other factors. This variable is subject to change. */ | |
449 | extern unsigned ofproto_max_idle; | |
450 | ||
e79a6c83 EJ |
451 | /* Number of upcall handler and revalidator threads. Only affects the |
452 | * ofproto-dpif implementation. */ | |
453 | extern size_t n_handlers, n_revalidators; | |
448a4b2f | 454 | |
003ce655 | 455 | static inline struct rule *rule_from_cls_rule(const struct cls_rule *); |
abe529af | 456 | |
15aaf599 BP |
457 | void ofproto_rule_expire(struct rule *rule, uint8_t reason) |
458 | OVS_REQUIRES(ofproto_mutex); | |
8b81d1ef | 459 | void ofproto_rule_delete(struct ofproto *, struct rule *) |
15aaf599 | 460 | OVS_EXCLUDED(ofproto_mutex); |
994c9973 BP |
461 | void ofproto_rule_reduce_timeouts(struct rule *rule, uint16_t idle_timeout, |
462 | uint16_t hard_timeout) | |
15aaf599 | 463 | OVS_EXCLUDED(ofproto_mutex); |
abe529af | 464 | |
7395c052 NZ |
465 | /* A group within a "struct ofproto". |
466 | * | |
467 | * With few exceptions, ofproto implementations may look at these fields but | |
468 | * should not modify them. */ | |
469 | struct ofgroup { | |
809c7548 RW |
470 | struct hmap_node hmap_node OVS_GUARDED; /* In ofproto's "groups" hmap. */ |
471 | ||
472 | /* Number of references. | |
473 | * | |
474 | * This is needed to keep track of references to the group in the xlate | |
475 | * module. | |
476 | * | |
477 | * If the main thread removes the group from an ofproto, we need to | |
478 | * guarantee that the group remains accessible to users of | |
479 | * xlate_group_actions and the xlate_cache, as the xlate_cache will not be | |
480 | * cleaned up until the corresponding datapath flows are revalidated. */ | |
481 | struct ovs_refcount ref_count; | |
482 | ||
483 | /* No lock is needed to protect the fields below since they are not | |
484 | * modified after construction. */ | |
eaf004bd AZ |
485 | const struct ofproto *ofproto; /* The ofproto that contains this group. */ |
486 | const uint32_t group_id; | |
487 | const enum ofp11_group_type type; /* One of OFPGT_*. */ | |
7395c052 | 488 | |
eaf004bd AZ |
489 | const long long int created; /* Creation time. */ |
490 | const long long int modified; /* Time of last modification. */ | |
7395c052 NZ |
491 | |
492 | struct list buckets; /* Contains "struct ofputil_bucket"s. */ | |
eaf004bd | 493 | const uint32_t n_buckets; |
7395c052 NZ |
494 | }; |
495 | ||
496 | bool ofproto_group_lookup(const struct ofproto *ofproto, uint32_t group_id, | |
809c7548 | 497 | struct ofgroup **group); |
7395c052 | 498 | |
809c7548 RW |
499 | void ofproto_group_ref(struct ofgroup *); |
500 | void ofproto_group_unref(struct ofgroup *); | |
7395c052 | 501 | |
abe529af BP |
502 | /* ofproto class structure, to be defined by each ofproto implementation. |
503 | * | |
504 | * | |
505 | * Data Structures | |
506 | * =============== | |
507 | * | |
7395c052 | 508 | * These functions work primarily with four different kinds of data |
abe529af BP |
509 | * structures: |
510 | * | |
511 | * - "struct ofproto", which represents an OpenFlow switch. | |
512 | * | |
513 | * - "struct ofport", which represents a port within an ofproto. | |
514 | * | |
515 | * - "struct rule", which represents an OpenFlow flow within an ofproto. | |
516 | * | |
7395c052 NZ |
517 | * - "struct ofgroup", which represents an OpenFlow 1.1+ group within an |
518 | * ofproto. | |
519 | * | |
abe529af BP |
520 | * Each of these data structures contains all of the implementation-independent |
521 | * generic state for the respective concept, called the "base" state. None of | |
522 | * them contains any extra space for ofproto implementations to use. Instead, | |
523 | * each implementation is expected to declare its own data structure that | |
524 | * contains an instance of the generic data structure plus additional | |
525 | * implementation-specific members, called the "derived" state. The | |
526 | * implementation can use casts or (preferably) the CONTAINER_OF macro to | |
527 | * obtain access to derived state given only a pointer to the embedded generic | |
528 | * data structure. | |
529 | * | |
530 | * | |
531 | * Life Cycle | |
532 | * ========== | |
533 | * | |
534 | * Four stylized functions accompany each of these data structures: | |
535 | * | |
536 | * "alloc" "construct" "destruct" "dealloc" | |
537 | * ------------ ---------------- --------------- -------------- | |
538 | * ofproto ->alloc ->construct ->destruct ->dealloc | |
539 | * ofport ->port_alloc ->port_construct ->port_destruct ->port_dealloc | |
540 | * rule ->rule_alloc ->rule_construct ->rule_destruct ->rule_dealloc | |
7395c052 | 541 | * group ->group_alloc ->group_construct ->group_destruct ->group_dealloc |
abe529af | 542 | * |
7395c052 NZ |
543 | * "ofproto", "ofport", and "group" have this exact life cycle. The "rule" |
544 | * data structure also follow this life cycle with some additional elaborations | |
8037acb4 BP |
545 | * described under "Rule Life Cycle" below. |
546 | * | |
abe529af BP |
547 | * Any instance of a given data structure goes through the following life |
548 | * cycle: | |
549 | * | |
550 | * 1. The client calls the "alloc" function to obtain raw memory. If "alloc" | |
551 | * fails, skip all the other steps. | |
552 | * | |
553 | * 2. The client initializes all of the data structure's base state. If this | |
554 | * fails, skip to step 7. | |
555 | * | |
556 | * 3. The client calls the "construct" function. The implementation | |
557 | * initializes derived state. It may refer to the already-initialized | |
558 | * base state. If "construct" fails, skip to step 6. | |
559 | * | |
560 | * 4. The data structure is now initialized and in use. | |
561 | * | |
562 | * 5. When the data structure is no longer needed, the client calls the | |
563 | * "destruct" function. The implementation uninitializes derived state. | |
564 | * The base state has not been uninitialized yet, so the implementation | |
565 | * may still refer to it. | |
566 | * | |
567 | * 6. The client uninitializes all of the data structure's base state. | |
568 | * | |
569 | * 7. The client calls the "dealloc" to free the raw memory. The | |
570 | * implementation must not refer to base or derived state in the data | |
571 | * structure, because it has already been uninitialized. | |
572 | * | |
573 | * Each "alloc" function allocates and returns a new instance of the respective | |
574 | * data structure. The "alloc" function is not given any information about the | |
575 | * use of the new data structure, so it cannot perform much initialization. | |
576 | * Its purpose is just to ensure that the new data structure has enough room | |
577 | * for base and derived state. It may return a null pointer if memory is not | |
578 | * available, in which case none of the other functions is called. | |
579 | * | |
580 | * Each "construct" function initializes derived state in its respective data | |
581 | * structure. When "construct" is called, all of the base state has already | |
582 | * been initialized, so the "construct" function may refer to it. The | |
583 | * "construct" function is allowed to fail, in which case the client calls the | |
584 | * "dealloc" function (but not the "destruct" function). | |
585 | * | |
586 | * Each "destruct" function uninitializes and frees derived state in its | |
587 | * respective data structure. When "destruct" is called, the base state has | |
588 | * not yet been uninitialized, so the "destruct" function may refer to it. The | |
589 | * "destruct" function is not allowed to fail. | |
590 | * | |
591 | * Each "dealloc" function frees raw memory that was allocated by the the | |
592 | * "alloc" function. The memory's base and derived members might not have ever | |
593 | * been initialized (but if "construct" returned successfully, then it has been | |
594 | * "destruct"ed already). The "dealloc" function is not allowed to fail. | |
595 | * | |
596 | * | |
597 | * Conventions | |
598 | * =========== | |
599 | * | |
600 | * Most of these functions return 0 if they are successful or a positive error | |
601 | * code on failure. Depending on the function, valid error codes are either | |
90bf1e07 | 602 | * errno values or OFPERR_* OpenFlow error codes. |
abe529af BP |
603 | * |
604 | * Most of these functions are expected to execute synchronously, that is, to | |
605 | * block as necessary to obtain a result. Thus, these functions may return | |
606 | * EAGAIN (or EWOULDBLOCK or EINPROGRESS) only where the function descriptions | |
607 | * explicitly say those errors are a possibility. We may relax this | |
608 | * requirement in the future if and when we encounter performance problems. */ | |
609 | struct ofproto_class { | |
610 | /* ## ----------------- ## */ | |
611 | /* ## Factory Functions ## */ | |
612 | /* ## ----------------- ## */ | |
613 | ||
b0408fca JP |
614 | /* Initializes provider. The caller may pass in 'iface_hints', |
615 | * which contains an shash of "struct iface_hint" elements indexed | |
616 | * by the interface's name. The provider may use these hints to | |
617 | * describe the startup configuration in order to reinitialize its | |
618 | * state. The caller owns the provided data, so a provider must | |
619 | * make copies of anything required. An ofproto provider must | |
620 | * remove any existing state that is not described by the hint, and | |
621 | * may choose to remove it all. */ | |
622 | void (*init)(const struct shash *iface_hints); | |
623 | ||
5bf0e941 BP |
624 | /* Enumerates the types of all support ofproto types into 'types'. The |
625 | * caller has already initialized 'types' and other ofproto classes might | |
626 | * already have added names to it. */ | |
abe529af | 627 | void (*enumerate_types)(struct sset *types); |
5bf0e941 BP |
628 | |
629 | /* Enumerates the names of all existing datapath of the specified 'type' | |
630 | * into 'names' 'all_dps'. The caller has already initialized 'names' as | |
631 | * an empty sset. | |
632 | * | |
633 | * 'type' is one of the types enumerated by ->enumerate_types(). | |
634 | * | |
635 | * Returns 0 if successful, otherwise a positive errno value. | |
636 | */ | |
abe529af | 637 | int (*enumerate_names)(const char *type, struct sset *names); |
5bf0e941 BP |
638 | |
639 | /* Deletes the datapath with the specified 'type' and 'name'. The caller | |
640 | * should have closed any open ofproto with this 'type' and 'name'; this | |
641 | * function is allowed to fail if that is not the case. | |
642 | * | |
643 | * 'type' is one of the types enumerated by ->enumerate_types(). | |
644 | * 'name' is one of the names enumerated by ->enumerate_names() for 'type'. | |
645 | * | |
646 | * Returns 0 if successful, otherwise a positive errno value. | |
647 | */ | |
abe529af BP |
648 | int (*del)(const char *type, const char *name); |
649 | ||
0aeaabc8 JP |
650 | /* Returns the type to pass to netdev_open() when a datapath of type |
651 | * 'datapath_type' has a port of type 'port_type', for a few special | |
652 | * cases when a netdev type differs from a port type. For example, | |
653 | * when using the userspace datapath, a port of type "internal" | |
654 | * needs to be opened as "tap". | |
655 | * | |
656 | * Returns either 'type' itself or a string literal, which must not | |
657 | * be freed. */ | |
658 | const char *(*port_open_type)(const char *datapath_type, | |
659 | const char *port_type); | |
660 | ||
11a574a7 JP |
661 | /* ## ------------------------ ## */ |
662 | /* ## Top-Level type Functions ## */ | |
663 | /* ## ------------------------ ## */ | |
664 | ||
665 | /* Performs any periodic activity required on ofprotos of type | |
666 | * 'type'. | |
667 | * | |
668 | * An ofproto provider may implement it or not, depending on whether | |
669 | * it needs type-level maintenance. | |
670 | * | |
671 | * Returns 0 if successful, otherwise a positive errno value. */ | |
672 | int (*type_run)(const char *type); | |
673 | ||
11a574a7 JP |
674 | /* Causes the poll loop to wake up when a type 'type''s 'run' |
675 | * function needs to be called, e.g. by calling the timer or fd | |
676 | * waiting functions in poll-loop.h. | |
677 | * | |
678 | * An ofproto provider may implement it or not, depending on whether | |
679 | * it needs type-level maintenance. */ | |
680 | void (*type_wait)(const char *type); | |
681 | ||
abe529af BP |
682 | /* ## --------------------------- ## */ |
683 | /* ## Top-Level ofproto Functions ## */ | |
684 | /* ## --------------------------- ## */ | |
685 | ||
686 | /* Life-cycle functions for an "ofproto" (see "Life Cycle" above). | |
7ee20df1 BP |
687 | * |
688 | * | |
689 | * Construction | |
690 | * ============ | |
abe529af | 691 | * |
073e2a6f BP |
692 | * ->construct() should not modify any base members of the ofproto. The |
693 | * client will initialize the ofproto's 'ports' and 'tables' members after | |
694 | * construction is complete. | |
6c1491fb | 695 | * |
073e2a6f BP |
696 | * When ->construct() is called, the client does not yet know how many flow |
697 | * tables the datapath supports, so ofproto->n_tables will be 0 and | |
0f5f95a9 BP |
698 | * ofproto->tables will be NULL. ->construct() should call |
699 | * ofproto_init_tables() to allocate and initialize ofproto->n_tables and | |
700 | * ofproto->tables. Each flow table will be initially empty, so | |
701 | * ->construct() should delete flows from the underlying datapath, if | |
702 | * necessary, rather than populating the tables. | |
abe529af | 703 | * |
91858960 BP |
704 | * If the ofproto knows the maximum port number that the datapath can have, |
705 | * then it can call ofproto_init_max_ports(). If it does so, then the | |
706 | * client will ensure that the actions it allows to be used through | |
707 | * OpenFlow do not refer to ports above that maximum number. | |
708 | * | |
abe529af BP |
709 | * Only one ofproto instance needs to be supported for any given datapath. |
710 | * If a datapath is already open as part of one "ofproto", then another | |
711 | * attempt to "construct" the same datapath as part of another ofproto is | |
5bf0e941 BP |
712 | * allowed to fail with an error. |
713 | * | |
714 | * ->construct() returns 0 if successful, otherwise a positive errno | |
7ee20df1 BP |
715 | * value. |
716 | * | |
717 | * | |
718 | * Destruction | |
719 | * =========== | |
720 | * | |
073e2a6f | 721 | * ->destruct() must also destroy all remaining rules in the ofproto's |
834fe5cb | 722 | * tables, by passing each remaining rule to ofproto_rule_delete(). |
8037acb4 BP |
723 | * |
724 | * The client will destroy the flow tables themselves after ->destruct() | |
073e2a6f | 725 | * returns. |
7ee20df1 | 726 | */ |
abe529af | 727 | struct ofproto *(*alloc)(void); |
0f5f95a9 | 728 | int (*construct)(struct ofproto *ofproto); |
abe529af BP |
729 | void (*destruct)(struct ofproto *ofproto); |
730 | void (*dealloc)(struct ofproto *ofproto); | |
731 | ||
732 | /* Performs any periodic activity required by 'ofproto'. It should: | |
733 | * | |
734 | * - Call connmgr_send_packet_in() for each received packet that missed | |
735 | * in the OpenFlow flow table or that had a OFPP_CONTROLLER output | |
736 | * action. | |
737 | * | |
738 | * - Call ofproto_rule_expire() for each OpenFlow flow that has reached | |
739 | * its hard_timeout or idle_timeout, to expire the flow. | |
5bf0e941 | 740 | * |
5fcc0d00 | 741 | * Returns 0 if successful, otherwise a positive errno value. */ |
abe529af BP |
742 | int (*run)(struct ofproto *ofproto); |
743 | ||
744 | /* Causes the poll loop to wake up when 'ofproto''s 'run' function needs to | |
745 | * be called, e.g. by calling the timer or fd waiting functions in | |
746 | * poll-loop.h. */ | |
747 | void (*wait)(struct ofproto *ofproto); | |
748 | ||
0d085684 BP |
749 | /* Adds some memory usage statistics for the implementation of 'ofproto' |
750 | * into 'usage', for use with memory_report(). | |
751 | * | |
752 | * This function is optional. */ | |
753 | void (*get_memory_usage)(const struct ofproto *ofproto, | |
754 | struct simap *usage); | |
755 | ||
1c030aa5 EJ |
756 | /* Adds some memory usage statistics for the implementation of 'type' |
757 | * into 'usage', for use with memory_report(). | |
758 | * | |
759 | * This function is optional. */ | |
760 | void (*type_get_memory_usage)(const char *type, struct simap *usage); | |
761 | ||
abe529af BP |
762 | /* Every "struct rule" in 'ofproto' is about to be deleted, one by one. |
763 | * This function may prepare for that, for example by clearing state in | |
764 | * advance. It should *not* actually delete any "struct rule"s from | |
765 | * 'ofproto', only prepare for it. | |
766 | * | |
767 | * This function is optional; it's really just for optimization in case | |
768 | * it's cheaper to delete all the flows from your hardware in a single pass | |
769 | * than to do it one by one. */ | |
770 | void (*flush)(struct ofproto *ofproto); | |
771 | ||
6c1491fb BP |
772 | /* Helper for the OpenFlow OFPT_FEATURES_REQUEST request. |
773 | * | |
774 | * The implementation should store true in '*arp_match_ip' if the switch | |
775 | * supports matching IP addresses inside ARP requests and replies, false | |
776 | * otherwise. | |
777 | * | |
778 | * The implementation should store in '*actions' a bitmap of the supported | |
9e1fd49b | 779 | * OpenFlow actions. Vendor actions are not included in '*actions'. */ |
6c1491fb | 780 | void (*get_features)(struct ofproto *ofproto, |
9e1fd49b BP |
781 | bool *arp_match_ip, |
782 | enum ofputil_action_bitmap *actions); | |
6c1491fb BP |
783 | |
784 | /* Helper for the OpenFlow OFPST_TABLE statistics request. | |
785 | * | |
786 | * The 'ots' array contains 'ofproto->n_tables' elements. Each element is | |
787 | * initialized as: | |
788 | * | |
789 | * - 'table_id' to the array index. | |
790 | * | |
791 | * - 'name' to "table#" where # is the table ID. | |
792 | * | |
307975da SH |
793 | * - 'match' and 'wildcards' to OFPXMT12_MASK. |
794 | * | |
795 | * - 'write_actions' and 'apply_actions' to OFPAT12_OUTPUT. | |
796 | * | |
797 | * - 'write_setfields' and 'apply_setfields' to OFPXMT12_MASK. | |
798 | * | |
2ee9b978 | 799 | * - 'metadata_match' and 'metadata_write' to OVS_BE64_MAX. |
307975da SH |
800 | * |
801 | * - 'instructions' to OFPIT11_ALL. | |
802 | * | |
803 | * - 'config' to OFPTC11_TABLE_MISS_MASK. | |
6c1491fb BP |
804 | * |
805 | * - 'max_entries' to 1,000,000. | |
806 | * | |
807 | * - 'active_count' to the classifier_count() for the table. | |
808 | * | |
809 | * - 'lookup_count' and 'matched_count' to 0. | |
810 | * | |
811 | * The implementation should update any members in each element for which | |
812 | * it has better values: | |
813 | * | |
814 | * - 'name' to a more meaningful name. | |
815 | * | |
816 | * - 'wildcards' to the set of wildcards actually supported by the table | |
817 | * (if it doesn't support all OpenFlow wildcards). | |
818 | * | |
307975da SH |
819 | * - 'instructions' to set the instructions actually supported by |
820 | * the table. | |
821 | * | |
822 | * - 'write_actions' to set the write actions actually supported by | |
823 | * the table (if it doesn't support all OpenFlow actions). | |
824 | * | |
825 | * - 'apply_actions' to set the apply actions actually supported by | |
826 | * the table (if it doesn't support all OpenFlow actions). | |
827 | * | |
828 | * - 'write_setfields' to set the write setfields actually supported by | |
829 | * the table. | |
830 | * | |
831 | * - 'apply_setfields' to set the apply setfields actually supported by | |
832 | * the table. | |
833 | * | |
6c1491fb BP |
834 | * - 'max_entries' to the maximum number of flows actually supported by |
835 | * the hardware. | |
836 | * | |
837 | * - 'lookup_count' to the number of packets looked up in this flow table | |
838 | * so far. | |
839 | * | |
840 | * - 'matched_count' to the number of packets looked up in this flow | |
841 | * table so far that matched one of the flow entries. | |
842 | * | |
307975da SH |
843 | * All of the members of struct ofp12_table_stats are in network byte |
844 | * order. | |
6c1491fb | 845 | */ |
307975da | 846 | void (*get_tables)(struct ofproto *ofproto, struct ofp12_table_stats *ots); |
6c1491fb | 847 | |
abe529af BP |
848 | /* ## ---------------- ## */ |
849 | /* ## ofport Functions ## */ | |
850 | /* ## ---------------- ## */ | |
851 | ||
852 | /* Life-cycle functions for a "struct ofport" (see "Life Cycle" above). | |
853 | * | |
854 | * ->port_construct() should not modify any base members of the ofport. | |
e1b1d06a JP |
855 | * An ofproto implementation should use the 'ofp_port' member of |
856 | * "struct ofport" as the OpenFlow port number. | |
abe529af BP |
857 | * |
858 | * ofports are managed by the base ofproto code. The ofproto | |
859 | * implementation should only create and destroy them in response to calls | |
860 | * to these functions. The base ofproto code will create and destroy | |
861 | * ofports in the following situations: | |
862 | * | |
863 | * - Just after the ->construct() function is called, the base ofproto | |
864 | * iterates over all of the implementation's ports, using | |
865 | * ->port_dump_start() and related functions, and constructs an ofport | |
866 | * for each dumped port. | |
867 | * | |
868 | * - If ->port_poll() reports that a specific port has changed, then the | |
869 | * base ofproto will query that port with ->port_query_by_name() and | |
870 | * construct or destruct ofports as necessary to reflect the updated | |
871 | * set of ports. | |
872 | * | |
873 | * - If ->port_poll() returns ENOBUFS to report an unspecified port set | |
874 | * change, then the base ofproto will iterate over all of the | |
875 | * implementation's ports, in the same way as at ofproto | |
876 | * initialization, and construct and destruct ofports to reflect all of | |
877 | * the changes. | |
5bf0e941 BP |
878 | * |
879 | * ->port_construct() returns 0 if successful, otherwise a positive errno | |
880 | * value. | |
abe529af BP |
881 | */ |
882 | struct ofport *(*port_alloc)(void); | |
883 | int (*port_construct)(struct ofport *ofport); | |
884 | void (*port_destruct)(struct ofport *ofport); | |
885 | void (*port_dealloc)(struct ofport *ofport); | |
886 | ||
887 | /* Called after 'ofport->netdev' is replaced by a new netdev object. If | |
888 | * the ofproto implementation uses the ofport's netdev internally, then it | |
889 | * should switch to using the new one. The old one has been closed. | |
890 | * | |
891 | * An ofproto implementation that doesn't need to do anything in this | |
892 | * function may use a null pointer. */ | |
893 | void (*port_modified)(struct ofport *ofport); | |
894 | ||
9e1fd49b BP |
895 | /* Called after an OpenFlow request changes a port's configuration. |
896 | * 'ofport->pp.config' contains the new configuration. 'old_config' | |
897 | * contains the previous configuration. | |
abe529af | 898 | * |
9e1fd49b BP |
899 | * The caller implements OFPUTIL_PC_PORT_DOWN using netdev functions to |
900 | * turn NETDEV_UP on and off, so this function doesn't have to do anything | |
901 | * for that bit (and it won't be called if that is the only bit that | |
abe529af | 902 | * changes). */ |
9e1fd49b BP |
903 | void (*port_reconfigured)(struct ofport *ofport, |
904 | enum ofputil_port_config old_config); | |
abe529af | 905 | |
090fd77e JS |
906 | /* Looks up a port named 'devname' in 'ofproto'. On success, returns 0 and |
907 | * initializes '*port' appropriately. Otherwise, returns a positive errno | |
908 | * value. | |
abe529af BP |
909 | * |
910 | * The caller owns the data in 'port' and must free it with | |
911 | * ofproto_port_destroy() when it is no longer needed. */ | |
912 | int (*port_query_by_name)(const struct ofproto *ofproto, | |
913 | const char *devname, struct ofproto_port *port); | |
914 | ||
e1b1d06a JP |
915 | /* Attempts to add 'netdev' as a port on 'ofproto'. Returns 0 if |
916 | * successful, otherwise a positive errno value. The caller should | |
917 | * inform the implementation of the OpenFlow port through the | |
918 | * ->port_construct() method. | |
5bf0e941 BP |
919 | * |
920 | * It doesn't matter whether the new port will be returned by a later call | |
921 | * to ->port_poll(); the implementation may do whatever is more | |
922 | * convenient. */ | |
e1b1d06a | 923 | int (*port_add)(struct ofproto *ofproto, struct netdev *netdev); |
abe529af | 924 | |
5bf0e941 BP |
925 | /* Deletes port number 'ofp_port' from the datapath for 'ofproto'. Returns |
926 | * 0 if successful, otherwise a positive errno value. | |
927 | * | |
928 | * It doesn't matter whether the new port will be returned by a later call | |
929 | * to ->port_poll(); the implementation may do whatever is more | |
930 | * convenient. */ | |
4e022ec0 | 931 | int (*port_del)(struct ofproto *ofproto, ofp_port_t ofp_port); |
abe529af | 932 | |
6527c598 PS |
933 | /* Get port stats */ |
934 | int (*port_get_stats)(const struct ofport *port, | |
935 | struct netdev_stats *stats); | |
936 | ||
d39258c8 BP |
937 | /* Port iteration functions. |
938 | * | |
939 | * The client might not be entirely in control of the ports within an | |
940 | * ofproto. Some hardware implementations, for example, might have a fixed | |
acf60855 JP |
941 | * set of ports in a datapath. For this reason, the client needs a way to |
942 | * iterate through all the ports that are actually in a datapath. These | |
943 | * functions provide that functionality. | |
d39258c8 BP |
944 | * |
945 | * The 'state' pointer provides the implementation a place to | |
946 | * keep track of its position. Its format is opaque to the caller. | |
947 | * | |
948 | * The ofproto provider retains ownership of the data that it stores into | |
949 | * ->port_dump_next()'s 'port' argument. The data must remain valid until | |
950 | * at least the next call to ->port_dump_next() or ->port_dump_done() for | |
951 | * 'state'. The caller will not modify or free it. | |
952 | * | |
953 | * Details | |
954 | * ======= | |
955 | * | |
956 | * ->port_dump_start() attempts to begin dumping the ports in 'ofproto'. | |
957 | * On success, it should return 0 and initialize '*statep' with any data | |
958 | * needed for iteration. On failure, returns a positive errno value, and | |
959 | * the client will not call ->port_dump_next() or ->port_dump_done(). | |
960 | * | |
961 | * ->port_dump_next() attempts to retrieve another port from 'ofproto' for | |
962 | * 'state'. If there is another port, it should store the port's | |
963 | * information into 'port' and return 0. It should return EOF if all ports | |
964 | * have already been iterated. Otherwise, on error, it should return a | |
965 | * positive errno value. This function will not be called again once it | |
966 | * returns nonzero once for a given iteration (but the 'port_dump_done' | |
967 | * function will be called afterward). | |
968 | * | |
969 | * ->port_dump_done() allows the implementation to release resources used | |
970 | * for iteration. The caller might decide to stop iteration in the middle | |
971 | * by calling this function before ->port_dump_next() returns nonzero. | |
972 | * | |
973 | * Usage Example | |
974 | * ============= | |
975 | * | |
976 | * int error; | |
977 | * void *state; | |
978 | * | |
979 | * error = ofproto->ofproto_class->port_dump_start(ofproto, &state); | |
980 | * if (!error) { | |
981 | * for (;;) { | |
982 | * struct ofproto_port port; | |
983 | * | |
984 | * error = ofproto->ofproto_class->port_dump_next( | |
985 | * ofproto, state, &port); | |
986 | * if (error) { | |
987 | * break; | |
988 | * } | |
989 | * // Do something with 'port' here (without modifying or freeing | |
990 | * // any of its data). | |
991 | * } | |
992 | * ofproto->ofproto_class->port_dump_done(ofproto, state); | |
993 | * } | |
994 | * // 'error' is now EOF (success) or a positive errno value (failure). | |
995 | */ | |
abe529af | 996 | int (*port_dump_start)(const struct ofproto *ofproto, void **statep); |
abe529af BP |
997 | int (*port_dump_next)(const struct ofproto *ofproto, void *state, |
998 | struct ofproto_port *port); | |
abe529af BP |
999 | int (*port_dump_done)(const struct ofproto *ofproto, void *state); |
1000 | ||
1001 | /* Polls for changes in the set of ports in 'ofproto'. If the set of ports | |
1002 | * in 'ofproto' has changed, then this function should do one of the | |
1003 | * following: | |
1004 | * | |
1005 | * - Preferably: store the name of the device that was added to or deleted | |
1006 | * from 'ofproto' in '*devnamep' and return 0. The caller is responsible | |
1007 | * for freeing '*devnamep' (with free()) when it no longer needs it. | |
1008 | * | |
1009 | * - Alternatively: return ENOBUFS, without indicating the device that was | |
1010 | * added or deleted. | |
1011 | * | |
1012 | * Occasional 'false positives', in which the function returns 0 while | |
1013 | * indicating a device that was not actually added or deleted or returns | |
1014 | * ENOBUFS without any change, are acceptable. | |
1015 | * | |
1016 | * The purpose of 'port_poll' is to let 'ofproto' know about changes made | |
1017 | * externally to the 'ofproto' object, e.g. by a system administrator via | |
1018 | * ovs-dpctl. Therefore, it's OK, and even preferable, for port_poll() to | |
1019 | * not report changes made through calls to 'port_add' or 'port_del' on the | |
1020 | * same 'ofproto' object. (But it's OK for it to report them too, just | |
1021 | * slightly less efficient.) | |
1022 | * | |
1023 | * If the set of ports in 'ofproto' has not changed, returns EAGAIN. May | |
1024 | * also return other positive errno values to indicate that something has | |
5bf0e941 BP |
1025 | * gone wrong. |
1026 | * | |
1027 | * If the set of ports in a datapath is fixed, or if the only way that the | |
1028 | * set of ports in a datapath can change is through ->port_add() and | |
1029 | * ->port_del(), then this function may be a null pointer. | |
1030 | */ | |
abe529af BP |
1031 | int (*port_poll)(const struct ofproto *ofproto, char **devnamep); |
1032 | ||
5bf0e941 BP |
1033 | /* Arranges for the poll loop to wake up when ->port_poll() will return a |
1034 | * value other than EAGAIN. | |
1035 | * | |
1036 | * If the set of ports in a datapath is fixed, or if the only way that the | |
1037 | * set of ports in a datapath can change is through ->port_add() and | |
1038 | * ->port_del(), or if the poll loop will always wake up anyway when | |
1039 | * ->port_poll() will return a value other than EAGAIN, then this function | |
1040 | * may be a null pointer. | |
1041 | */ | |
abe529af BP |
1042 | void (*port_poll_wait)(const struct ofproto *ofproto); |
1043 | ||
5bf0e941 BP |
1044 | /* Checks the status of LACP negotiation for 'port'. Returns 1 if LACP |
1045 | * partner information for 'port' is up-to-date, 0 if LACP partner | |
1046 | * information is not current (generally indicating a connectivity | |
1047 | * problem), or -1 if LACP is not enabled on 'port'. | |
1048 | * | |
1049 | * This function may be a null pointer if the ofproto implementation does | |
1050 | * not support LACP. */ | |
abe529af BP |
1051 | int (*port_is_lacp_current)(const struct ofport *port); |
1052 | ||
5bf0e941 BP |
1053 | /* ## ----------------------- ## */ |
1054 | /* ## OpenFlow Rule Functions ## */ | |
1055 | /* ## ----------------------- ## */ | |
1056 | ||
81a76618 | 1057 | /* Chooses an appropriate table for 'match' within 'ofproto'. On |
0ab6decf | 1058 | * success, stores the table ID into '*table_idp' and returns 0. On |
90bf1e07 | 1059 | * failure, returns an OpenFlow error code. |
0ab6decf | 1060 | * |
81a76618 | 1061 | * The choice of table should be a function of 'match' and 'ofproto''s |
0ab6decf BP |
1062 | * datapath capabilities. It should not depend on the flows already in |
1063 | * 'ofproto''s flow tables. Failure implies that an OpenFlow rule with | |
81a76618 BP |
1064 | * 'match' as its matching condition can never be inserted into 'ofproto', |
1065 | * even starting from an empty flow table. | |
0ab6decf BP |
1066 | * |
1067 | * If multiple tables are candidates for inserting the flow, the function | |
1068 | * should choose one arbitrarily (but deterministically). | |
1069 | * | |
13521ff5 | 1070 | * If this function is NULL then table 0 is always chosen. */ |
90bf1e07 | 1071 | enum ofperr (*rule_choose_table)(const struct ofproto *ofproto, |
81a76618 | 1072 | const struct match *match, |
90bf1e07 | 1073 | uint8_t *table_idp); |
0ab6decf | 1074 | |
8037acb4 BP |
1075 | /* Life-cycle functions for a "struct rule". |
1076 | * | |
1077 | * | |
1078 | * Rule Life Cycle | |
1079 | * =============== | |
1080 | * | |
1081 | * The life cycle of a struct rule is an elaboration of the basic life | |
1082 | * cycle described above under "Life Cycle". | |
1083 | * | |
1084 | * After a rule is successfully constructed, it is then inserted. If | |
834fe5cb BP |
1085 | * insertion is successful, then before it is later destructed, it is |
1086 | * deleted. | |
8037acb4 BP |
1087 | * |
1088 | * You can think of a rule as having the following extra steps inserted | |
1089 | * between "Life Cycle" steps 4 and 5: | |
1090 | * | |
1091 | * 4.1. The client inserts the rule into the flow table, making it | |
1092 | * visible in flow table lookups. | |
1093 | * | |
834fe5cb BP |
1094 | * 4.2. The client calls "rule_insert" to insert the flow. The |
1095 | * implementation attempts to install the flow in the underlying | |
1096 | * hardware and returns an error code indicate success or failure. | |
1097 | * On failure, go to step 5. | |
8037acb4 BP |
1098 | * |
1099 | * 4.3. The rule is now installed in the flow table. Eventually it will | |
1100 | * be deleted. | |
1101 | * | |
1102 | * 4.4. The client removes the rule from the flow table. It is no longer | |
1103 | * visible in flow table lookups. | |
1104 | * | |
834fe5cb BP |
1105 | * 4.5. The client calls "rule_delete". The implementation uninstalls |
1106 | * the flow from the underlying hardware. Deletion is not allowed | |
1107 | * to fail. | |
7ee20df1 BP |
1108 | * |
1109 | * | |
1110 | * Construction | |
1111 | * ============ | |
1112 | * | |
8037acb4 BP |
1113 | * When ->rule_construct() is called, 'rule' is a new rule that is not yet |
1114 | * inserted into a flow table. ->rule_construct() should initialize enough | |
1115 | * of the rule's derived state for 'rule' to be suitable for inserting into | |
1116 | * a flow table. ->rule_construct() should not modify any base members of | |
1117 | * struct rule. | |
7ee20df1 | 1118 | * |
8037acb4 BP |
1119 | * If ->rule_construct() fails (as indicated by returning a nonzero |
1120 | * OpenFlow error code), the ofproto base code will uninitialize and | |
1121 | * deallocate 'rule'. See "Rule Life Cycle" above for more details. | |
7ee20df1 | 1122 | * |
8037acb4 BP |
1123 | * ->rule_construct() may also: |
1124 | * | |
1125 | * - Validate that the datapath supports the matching rule in 'rule->cr' | |
7ee20df1 BP |
1126 | * datapath. For example, if the rule's table does not support |
1127 | * registers, then it is an error if 'rule->cr' does not wildcard all | |
5bf0e941 BP |
1128 | * registers. |
1129 | * | |
548de4dd | 1130 | * - Validate that the datapath can correctly implement 'rule->ofpacts'. |
5bf0e941 | 1131 | * |
8037acb4 BP |
1132 | * Some implementations might need to defer these tasks to ->rule_insert(), |
1133 | * which is also acceptable. | |
1134 | * | |
1135 | * | |
1136 | * Insertion | |
1137 | * ========= | |
1138 | * | |
1139 | * Following successful construction, the ofproto base case inserts 'rule' | |
1140 | * into its flow table, then it calls ->rule_insert(). ->rule_insert() | |
834fe5cb BP |
1141 | * must add the new rule to the datapath flow table and return only after |
1142 | * this is complete (whether it succeeds or fails). | |
08944c1d | 1143 | * |
8037acb4 BP |
1144 | * If ->rule_insert() fails, the ofproto base code will remove 'rule' from |
1145 | * the flow table, destruct, uninitialize, and deallocate 'rule'. See | |
1146 | * "Rule Life Cycle" above for more details. | |
5bf0e941 | 1147 | * |
5bf0e941 | 1148 | * |
8037acb4 BP |
1149 | * Deletion |
1150 | * ======== | |
5bf0e941 | 1151 | * |
8037acb4 | 1152 | * The ofproto base code removes 'rule' from its flow table before it calls |
834fe5cb BP |
1153 | * ->rule_delete(). ->rule_delete() must remove 'rule' from the datapath |
1154 | * flow table and return only after this has completed successfully. | |
7ee20df1 | 1155 | * |
8037acb4 | 1156 | * Rule deletion must not fail. |
7ee20df1 BP |
1157 | * |
1158 | * | |
1159 | * Destruction | |
1160 | * =========== | |
1161 | * | |
8037acb4 | 1162 | * ->rule_destruct() must uninitialize derived state. |
7ee20df1 BP |
1163 | * |
1164 | * Rule destruction must not fail. */ | |
abe529af | 1165 | struct rule *(*rule_alloc)(void); |
15aaf599 BP |
1166 | enum ofperr (*rule_construct)(struct rule *rule) |
1167 | /* OVS_REQUIRES(ofproto_mutex) */; | |
b20f4073 BP |
1168 | enum ofperr (*rule_insert)(struct rule *rule) |
1169 | /* OVS_REQUIRES(ofproto_mutex) */; | |
15aaf599 | 1170 | void (*rule_delete)(struct rule *rule) /* OVS_REQUIRES(ofproto_mutex) */; |
abe529af BP |
1171 | void (*rule_destruct)(struct rule *rule); |
1172 | void (*rule_dealloc)(struct rule *rule); | |
1173 | ||
5bf0e941 BP |
1174 | /* Obtains statistics for 'rule', storing the number of packets that have |
1175 | * matched it in '*packet_count' and the number of bytes in those packets | |
5e9d0469 BP |
1176 | * in '*byte_count'. UINT64_MAX indicates that the packet count or byte |
1177 | * count is unknown. */ | |
abe529af | 1178 | void (*rule_get_stats)(struct rule *rule, uint64_t *packet_count, |
dc437090 | 1179 | uint64_t *byte_count, long long int *used) |
15aaf599 | 1180 | /* OVS_EXCLUDED(ofproto_mutex) */; |
abe529af | 1181 | |
5bf0e941 BP |
1182 | /* Applies the actions in 'rule' to 'packet'. (This implements sending |
1183 | * buffered packets for OpenFlow OFPT_FLOW_MOD commands.) | |
1184 | * | |
1185 | * Takes ownership of 'packet' (so it should eventually free it, with | |
1186 | * ofpbuf_delete()). | |
1187 | * | |
1188 | * 'flow' reflects the flow information for 'packet'. All of the | |
1189 | * information in 'flow' is extracted from 'packet', except for | |
296e07ac | 1190 | * flow->tunnel and flow->in_port, which are assigned the correct values |
0e553d9c | 1191 | * for the incoming packet. The register values are zeroed. 'packet''s |
437d0d22 JR |
1192 | * header pointers and offsets (e.g. packet->l3) are appropriately |
1193 | * initialized. packet->l3 is aligned on a 32-bit boundary. | |
5bf0e941 | 1194 | * |
0e553d9c | 1195 | * The implementation should add the statistics for 'packet' into 'rule'. |
5bf0e941 | 1196 | * |
90bf1e07 BP |
1197 | * Returns 0 if successful, otherwise an OpenFlow error code. */ |
1198 | enum ofperr (*rule_execute)(struct rule *rule, const struct flow *flow, | |
1199 | struct ofpbuf *packet); | |
5bf0e941 | 1200 | |
af822017 BP |
1201 | /* If the datapath can properly implement changing 'rule''s actions to the |
1202 | * 'ofpacts_len' bytes in 'ofpacts', returns 0. Otherwise, returns an enum | |
1203 | * ofperr indicating why the new actions wouldn't work. | |
1204 | * | |
1205 | * May be a null pointer if any set of actions is acceptable. */ | |
1206 | enum ofperr (*rule_premodify_actions)(const struct rule *rule, | |
1207 | const struct ofpact *ofpacts, | |
1208 | size_t ofpacts_len) | |
1209 | /* OVS_REQUIRES(ofproto_mutex) */; | |
1210 | ||
7ee20df1 | 1211 | /* When ->rule_modify_actions() is called, the caller has already replaced |
834fe5cb BP |
1212 | * the OpenFlow actions in 'rule' by a new set. (If |
1213 | * ->rule_premodify_actions is nonnull, then it was previously called to | |
1214 | * verify that the new set of actions is acceptable.) | |
7ee20df1 | 1215 | * |
834fe5cb | 1216 | * ->rule_modify_actions() must: |
7ee20df1 | 1217 | * |
7ee20df1 BP |
1218 | * - Update the datapath flow table with the new actions. |
1219 | * | |
b277c7cc BP |
1220 | * - Only if 'reset_counters' is true, reset any packet or byte counters |
1221 | * associated with the rule to zero, so that rule_get_stats() will not | |
1222 | * longer count those packets or bytes. | |
1223 | * | |
af822017 | 1224 | * Rule modification must not fail. |
5bf0e941 | 1225 | * |
7ee20df1 BP |
1226 | * ->rule_modify_actions() should not modify any base members of struct |
1227 | * rule. */ | |
15aaf599 BP |
1228 | void (*rule_modify_actions)(struct rule *rule, bool reset_counters) |
1229 | /* OVS_REQUIRES(ofproto_mutex) */; | |
abe529af | 1230 | |
7257b535 BP |
1231 | /* Changes the OpenFlow IP fragment handling policy to 'frag_handling', |
1232 | * which takes one of the following values, with the corresponding | |
1233 | * meanings: | |
1234 | * | |
1235 | * - OFPC_FRAG_NORMAL: The switch should treat IP fragments the same way | |
1236 | * as other packets, omitting TCP and UDP port numbers (always setting | |
1237 | * them to 0). | |
1238 | * | |
1239 | * - OFPC_FRAG_DROP: The switch should drop all IP fragments without | |
1240 | * passing them through the flow table. | |
1241 | * | |
1242 | * - OFPC_FRAG_REASM: The switch should reassemble IP fragments before | |
1243 | * passing packets through the flow table. | |
1244 | * | |
1245 | * - OFPC_FRAG_NX_MATCH (a Nicira extension): Similar to OFPC_FRAG_NORMAL, | |
1246 | * except that TCP and UDP port numbers should be included in fragments | |
1247 | * with offset 0. | |
1248 | * | |
1249 | * Implementations are not required to support every mode. | |
1250 | * OFPC_FRAG_NORMAL is the default mode when an ofproto is created. | |
1251 | * | |
1252 | * At the time of the call to ->set_frag_handling(), the current mode is | |
1253 | * available in 'ofproto->frag_handling'. ->set_frag_handling() returns | |
1254 | * true if the requested mode was set, false if it is not supported. | |
1255 | * | |
1256 | * Upon successful return, the caller changes 'ofproto->frag_handling' to | |
1257 | * reflect the new mode. | |
1258 | */ | |
1259 | bool (*set_frag_handling)(struct ofproto *ofproto, | |
1260 | enum ofp_config_flags frag_handling); | |
abe529af | 1261 | |
5bf0e941 | 1262 | /* Implements the OpenFlow OFPT_PACKET_OUT command. The datapath should |
f25d0cf3 | 1263 | * execute the 'ofpacts_len' bytes of "struct ofpacts" in 'ofpacts'. |
5bf0e941 | 1264 | * |
f25d0cf3 BP |
1265 | * The caller retains ownership of 'packet' and of 'ofpacts', so |
1266 | * ->packet_out() should not modify or free them. | |
5bf0e941 | 1267 | * |
548de4dd BP |
1268 | * This function must validate that it can correctly implement 'ofpacts'. |
1269 | * If not, then it should return an OpenFlow error code. | |
5bf0e941 BP |
1270 | * |
1271 | * 'flow' reflects the flow information for 'packet'. All of the | |
1272 | * information in 'flow' is extracted from 'packet', except for | |
296e07ac | 1273 | * flow->in_port (see below). flow->tunnel and its register values are |
751c7785 BP |
1274 | * zeroed. |
1275 | * | |
1276 | * flow->in_port comes from the OpenFlow OFPT_PACKET_OUT message. The | |
1277 | * implementation should reject invalid flow->in_port values by returning | |
2e1bfcb6 | 1278 | * OFPERR_OFPBRC_BAD_PORT. (If the implementation called |
91858960 BP |
1279 | * ofproto_init_max_ports(), then the client will reject these ports |
1280 | * itself.) For consistency, the implementation should consider valid for | |
1281 | * flow->in_port any value that could possibly be seen in a packet that it | |
1282 | * passes to connmgr_send_packet_in(). Ideally, even an implementation | |
1283 | * that never generates packet-ins (e.g. due to hardware limitations) | |
1284 | * should still allow flow->in_port values for every possible physical port | |
1285 | * and OFPP_LOCAL. The only virtual ports (those above OFPP_MAX) that the | |
1286 | * caller will ever pass in as flow->in_port, other than OFPP_LOCAL, are | |
1287 | * OFPP_NONE and OFPP_CONTROLLER. The implementation should allow both of | |
1288 | * these, treating each of them as packets generated by the controller as | |
1289 | * opposed to packets originating from some switch port. | |
751c7785 BP |
1290 | * |
1291 | * (Ordinarily the only effect of flow->in_port is on output actions that | |
1292 | * involve the input port, such as actions that output to OFPP_IN_PORT, | |
1293 | * OFPP_FLOOD, or OFPP_ALL. flow->in_port can also affect Nicira extension | |
1294 | * "resubmit" actions.) | |
5bf0e941 BP |
1295 | * |
1296 | * 'packet' is not matched against the OpenFlow flow table, so its | |
1297 | * statistics should not be included in OpenFlow flow statistics. | |
1298 | * | |
90bf1e07 BP |
1299 | * Returns 0 if successful, otherwise an OpenFlow error code. */ |
1300 | enum ofperr (*packet_out)(struct ofproto *ofproto, struct ofpbuf *packet, | |
1301 | const struct flow *flow, | |
f25d0cf3 BP |
1302 | const struct ofpact *ofpacts, |
1303 | size_t ofpacts_len); | |
5bf0e941 BP |
1304 | |
1305 | /* ## ------------------------- ## */ | |
1306 | /* ## OFPP_NORMAL configuration ## */ | |
1307 | /* ## ------------------------- ## */ | |
1308 | ||
abe529af BP |
1309 | /* Configures NetFlow on 'ofproto' according to the options in |
1310 | * 'netflow_options', or turns off NetFlow if 'netflow_options' is NULL. | |
1311 | * | |
1312 | * EOPNOTSUPP as a return value indicates that 'ofproto' does not support | |
f8cd50a4 | 1313 | * NetFlow, as does a null pointer. */ |
abe529af BP |
1314 | int (*set_netflow)(struct ofproto *ofproto, |
1315 | const struct netflow_options *netflow_options); | |
1316 | ||
1317 | void (*get_netflow_ids)(const struct ofproto *ofproto, | |
1318 | uint8_t *engine_type, uint8_t *engine_id); | |
1319 | ||
1320 | /* Configures sFlow on 'ofproto' according to the options in | |
1321 | * 'sflow_options', or turns off sFlow if 'sflow_options' is NULL. | |
1322 | * | |
1323 | * EOPNOTSUPP as a return value indicates that 'ofproto' does not support | |
1324 | * sFlow, as does a null pointer. */ | |
1325 | int (*set_sflow)(struct ofproto *ofproto, | |
1326 | const struct ofproto_sflow_options *sflow_options); | |
1327 | ||
29089a54 RL |
1328 | /* Configures IPFIX on 'ofproto' according to the options in |
1329 | * 'bridge_exporter_options' and the 'flow_exporters_options' | |
1330 | * array, or turns off IPFIX if 'bridge_exporter_options' and | |
1331 | * 'flow_exporters_options' is NULL. | |
1332 | * | |
1333 | * EOPNOTSUPP as a return value indicates that 'ofproto' does not support | |
1334 | * IPFIX, as does a null pointer. */ | |
1335 | int (*set_ipfix)( | |
1336 | struct ofproto *ofproto, | |
1337 | const struct ofproto_ipfix_bridge_exporter_options | |
1338 | *bridge_exporter_options, | |
1339 | const struct ofproto_ipfix_flow_exporter_options | |
1340 | *flow_exporters_options, size_t n_flow_exporters_options); | |
1341 | ||
abe529af BP |
1342 | /* Configures connectivity fault management on 'ofport'. |
1343 | * | |
a5610457 | 1344 | * If 'cfm_settings' is nonnull, configures CFM according to its members. |
abe529af | 1345 | * |
a5610457 | 1346 | * If 'cfm_settings' is null, removes any connectivity fault management |
abe529af BP |
1347 | * configuration from 'ofport'. |
1348 | * | |
1349 | * EOPNOTSUPP as a return value indicates that this ofproto_class does not | |
1350 | * support CFM, as does a null pointer. */ | |
a5610457 | 1351 | int (*set_cfm)(struct ofport *ofport, const struct cfm_settings *s); |
abe529af | 1352 | |
8f5514fe AW |
1353 | /* Checks the status change of CFM on 'ofport'. Returns true if |
1354 | * there is status change since last call or if CFM is not specified. */ | |
1355 | bool (*cfm_status_changed)(struct ofport *ofport); | |
1356 | ||
1357 | /* Populates 'smap' with the status of CFM on 'ofport'. Returns 0 on | |
1358 | * success, or a positive errno. EOPNOTSUPP as a return value indicates | |
1359 | * that this ofproto_class does not support CFM, as does a null pointer. | |
88bf179a AW |
1360 | * |
1361 | * The caller must provide and own '*status', and it must free the array | |
1362 | * returned in 'status->rmps'. '*status' is indeterminate if the return | |
1363 | * value is non-zero. */ | |
1364 | int (*get_cfm_status)(const struct ofport *ofport, | |
685acfd9 | 1365 | struct cfm_status *status); |
3967a833 | 1366 | |
ccc09689 EJ |
1367 | /* Configures BFD on 'ofport'. |
1368 | * | |
1369 | * If 'cfg' is NULL, or 'cfg' does not contain the key value pair | |
1370 | * "enable=true", removes BFD from 'ofport'. Otherwise, configures BFD | |
1371 | * according to 'cfg'. | |
1372 | * | |
1373 | * EOPNOTSUPP as a return value indicates that this ofproto_class does not | |
1374 | * support BFD, as does a null pointer. */ | |
1375 | int (*set_bfd)(struct ofport *ofport, const struct smap *cfg); | |
1376 | ||
8f5514fe AW |
1377 | /* Checks the status change of BFD on 'ofport'. Returns true if there |
1378 | * is status change since last call or if BFD is not specified. */ | |
1379 | bool (*bfd_status_changed)(struct ofport *ofport); | |
1380 | ||
ccc09689 | 1381 | /* Populates 'smap' with the status of BFD on 'ofport'. Returns 0 on |
8f5514fe AW |
1382 | * success, or a positive errno. EOPNOTSUPP as a return value indicates |
1383 | * that this ofproto_class does not support BFD, as does a null pointer. */ | |
ccc09689 EJ |
1384 | int (*get_bfd_status)(struct ofport *ofport, struct smap *smap); |
1385 | ||
21f7563c JP |
1386 | /* Configures spanning tree protocol (STP) on 'ofproto' using the |
1387 | * settings defined in 's'. | |
1388 | * | |
1389 | * If 's' is nonnull, configures STP according to its members. | |
1390 | * | |
1391 | * If 's' is null, removes any STP configuration from 'ofproto'. | |
1392 | * | |
1393 | * EOPNOTSUPP as a return value indicates that this ofproto_class does not | |
1394 | * support STP, as does a null pointer. */ | |
1395 | int (*set_stp)(struct ofproto *ofproto, | |
1396 | const struct ofproto_stp_settings *s); | |
1397 | ||
1398 | /* Retrieves state of spanning tree protocol (STP) on 'ofproto'. | |
1399 | * | |
1400 | * Stores STP state for 'ofproto' in 's'. If the 'enabled' member | |
1401 | * is false, the other member values are not meaningful. | |
1402 | * | |
1403 | * EOPNOTSUPP as a return value indicates that this ofproto_class does not | |
1404 | * support STP, as does a null pointer. */ | |
1405 | int (*get_stp_status)(struct ofproto *ofproto, | |
1406 | struct ofproto_stp_status *s); | |
1407 | ||
1408 | /* Configures spanning tree protocol (STP) on 'ofport' using the | |
1409 | * settings defined in 's'. | |
1410 | * | |
1411 | * If 's' is nonnull, configures STP according to its members. The | |
1412 | * caller is responsible for assigning STP port numbers (using the | |
1413 | * 'port_num' member in the range of 1 through 255, inclusive) and | |
1414 | * ensuring there are no duplicates. | |
1415 | * | |
1416 | * If 's' is null, removes any STP configuration from 'ofport'. | |
1417 | * | |
1418 | * EOPNOTSUPP as a return value indicates that this ofproto_class does not | |
1419 | * support STP, as does a null pointer. */ | |
1420 | int (*set_stp_port)(struct ofport *ofport, | |
1421 | const struct ofproto_port_stp_settings *s); | |
1422 | ||
1423 | /* Retrieves spanning tree protocol (STP) port status of 'ofport'. | |
1424 | * | |
1425 | * Stores STP state for 'ofport' in 's'. If the 'enabled' member is | |
1426 | * false, the other member values are not meaningful. | |
1427 | * | |
1428 | * EOPNOTSUPP as a return value indicates that this ofproto_class does not | |
1429 | * support STP, as does a null pointer. */ | |
1430 | int (*get_stp_port_status)(struct ofport *ofport, | |
1431 | struct ofproto_port_stp_status *s); | |
1432 | ||
fd28ce3a JS |
1433 | /* Retrieves spanning tree protocol (STP) port statistics of 'ofport'. |
1434 | * | |
1435 | * Stores STP state for 'ofport' in 's'. If the 'enabled' member is | |
1436 | * false, the other member values are not meaningful. | |
1437 | * | |
1438 | * EOPNOTSUPP as a return value indicates that this ofproto_class does not | |
1439 | * support STP, as does a null pointer. */ | |
1440 | int (*get_stp_port_stats)(struct ofport *ofport, | |
1441 | struct ofproto_port_stp_stats *s); | |
1442 | ||
8b36f51e EJ |
1443 | /* Registers meta-data associated with the 'n_qdscp' Qualities of Service |
1444 | * 'queues' attached to 'ofport'. This data is not intended to be | |
1445 | * sufficient to implement QoS. Instead, providers may use this | |
1446 | * information to implement features which require knowledge of what queues | |
1447 | * exist on a port, and some basic information about them. | |
1448 | * | |
1449 | * EOPNOTSUPP as a return value indicates that this ofproto_class does not | |
1450 | * support QoS, as does a null pointer. */ | |
1451 | int (*set_queues)(struct ofport *ofport, | |
1452 | const struct ofproto_port_queue *queues, size_t n_qdscp); | |
1453 | ||
abe529af BP |
1454 | /* If 's' is nonnull, this function registers a "bundle" associated with |
1455 | * client data pointer 'aux' in 'ofproto'. A bundle is the same concept as | |
1456 | * a Port in OVSDB, that is, it consists of one or more "slave" devices | |
1457 | * (Interfaces, in OVSDB) along with VLAN and LACP configuration and, if | |
1458 | * there is more than one slave, a bonding configuration. If 'aux' is | |
1459 | * already registered then this function updates its configuration to 's'. | |
1460 | * Otherwise, this function registers a new bundle. | |
1461 | * | |
1462 | * If 's' is NULL, this function unregisters the bundle registered on | |
1463 | * 'ofproto' associated with client data pointer 'aux'. If no such bundle | |
1464 | * has been registered, this has no effect. | |
1465 | * | |
1466 | * This function affects only the behavior of the NXAST_AUTOPATH action and | |
1467 | * output to the OFPP_NORMAL port. An implementation that does not support | |
1468 | * it at all may set it to NULL or return EOPNOTSUPP. An implementation | |
1469 | * that supports only a subset of the functionality should implement what | |
1470 | * it can and return 0. */ | |
1471 | int (*bundle_set)(struct ofproto *ofproto, void *aux, | |
1472 | const struct ofproto_bundle_settings *s); | |
1473 | ||
1474 | /* If 'port' is part of any bundle, removes it from that bundle. If the | |
1475 | * bundle now has no ports, deletes the bundle. If the bundle now has only | |
1476 | * one port, deconfigures the bundle's bonding configuration. */ | |
1477 | void (*bundle_remove)(struct ofport *ofport); | |
1478 | ||
1479 | /* If 's' is nonnull, this function registers a mirror associated with | |
1480 | * client data pointer 'aux' in 'ofproto'. A mirror is the same concept as | |
1481 | * a Mirror in OVSDB. If 'aux' is already registered then this function | |
1482 | * updates its configuration to 's'. Otherwise, this function registers a | |
1483 | * new mirror. | |
1484 | * | |
1485 | * If 's' is NULL, this function unregisters the mirror registered on | |
1486 | * 'ofproto' associated with client data pointer 'aux'. If no such mirror | |
1487 | * has been registered, this has no effect. | |
1488 | * | |
c06bba01 JP |
1489 | * An implementation that does not support mirroring at all may set |
1490 | * it to NULL or return EOPNOTSUPP. An implementation that supports | |
1491 | * only a subset of the functionality should implement what it can | |
1492 | * and return 0. */ | |
abe529af BP |
1493 | int (*mirror_set)(struct ofproto *ofproto, void *aux, |
1494 | const struct ofproto_mirror_settings *s); | |
1495 | ||
9d24de3b JP |
1496 | /* Retrieves statistics from mirror associated with client data |
1497 | * pointer 'aux' in 'ofproto'. Stores packet and byte counts in | |
1498 | * 'packets' and 'bytes', respectively. If a particular counter is | |
1499 | * not supported, the appropriate argument is set to UINT64_MAX. | |
1500 | * | |
1501 | * EOPNOTSUPP as a return value indicates that this ofproto_class does not | |
1502 | * support retrieving mirror statistics. */ | |
1503 | int (*mirror_get_stats)(struct ofproto *ofproto, void *aux, | |
1504 | uint64_t *packets, uint64_t *bytes); | |
1505 | ||
abe529af BP |
1506 | /* Configures the VLANs whose bits are set to 1 in 'flood_vlans' as VLANs |
1507 | * on which all packets are flooded, instead of using MAC learning. If | |
1508 | * 'flood_vlans' is NULL, then MAC learning applies to all VLANs. | |
1509 | * | |
1510 | * This function affects only the behavior of the OFPP_NORMAL action. An | |
1511 | * implementation that does not support it may set it to NULL or return | |
1512 | * EOPNOTSUPP. */ | |
1513 | int (*set_flood_vlans)(struct ofproto *ofproto, | |
1514 | unsigned long *flood_vlans); | |
1515 | ||
1516 | /* Returns true if 'aux' is a registered bundle that is currently in use as | |
1517 | * the output for a mirror. */ | |
b4affc74 | 1518 | bool (*is_mirror_output_bundle)(const struct ofproto *ofproto, void *aux); |
8402c74b SS |
1519 | |
1520 | /* When the configuration option of forward_bpdu changes, this function | |
1521 | * will be invoked. */ | |
1522 | void (*forward_bpdu_changed)(struct ofproto *ofproto); | |
52a90c29 | 1523 | |
c4069512 BP |
1524 | /* Sets the MAC aging timeout for the OFPP_NORMAL action to 'idle_time', in |
1525 | * seconds, and the maximum number of MAC table entries to | |
1526 | * 'max_entries'. | |
1527 | * | |
1528 | * An implementation that doesn't support configuring these features may | |
1529 | * set this function to NULL or implement it as a no-op. */ | |
1530 | void (*set_mac_table_config)(struct ofproto *ofproto, | |
1531 | unsigned int idle_time, size_t max_entries); | |
e764773c | 1532 | |
7c38d0a5 FL |
1533 | /* Configures multicast snooping on 'ofport' using the settings |
1534 | * defined in 's'. | |
1535 | * | |
1536 | * If 's' is nonnull, this function updates multicast snooping | |
1537 | * configuration to 's' in 'ofproto'. | |
1538 | * | |
1539 | * If 's' is NULL, this function disables multicast snooping | |
1540 | * on 'ofproto'. | |
1541 | * | |
1542 | * An implementation that does not support multicast snooping may set | |
1543 | * it to NULL or return EOPNOTSUPP. */ | |
1544 | int (*set_mcast_snooping)(struct ofproto *ofproto, | |
1545 | const struct ofproto_mcast_snooping_settings *s); | |
1546 | ||
1547 | /* Configures multicast snooping port's flood setting on 'ofproto'. | |
1548 | * | |
1549 | * All multicast traffic is sent to struct port 'aux' in 'ofproto' | |
1550 | * if 'flood' is true. Otherwise, struct port 'aux' is an ordinary | |
1551 | * switch port. | |
1552 | * | |
1553 | * An implementation that does not support multicast snooping may set | |
1554 | * it to NULL or return EOPNOTSUPP. */ | |
1555 | int (*set_mcast_snooping_port)(struct ofproto *ofproto_, void *aux, | |
1556 | bool flood); | |
1557 | ||
52a90c29 BP |
1558 | /* Linux VLAN device support (e.g. "eth0.10" for VLAN 10.) |
1559 | * | |
1560 | * This is deprecated. It is only for compatibility with broken device drivers | |
1561 | * in old versions of Linux that do not properly support VLANs when VLAN | |
1562 | * devices are not used. When broken device drivers are no longer in | |
1563 | * widespread use, we will delete these interfaces. */ | |
1564 | ||
1565 | /* If 'realdev_ofp_port' is nonzero, then this function configures 'ofport' | |
1566 | * as a VLAN splinter port for VLAN 'vid', associated with the real device | |
1567 | * that has OpenFlow port number 'realdev_ofp_port'. | |
1568 | * | |
1569 | * If 'realdev_ofp_port' is zero, then this function deconfigures 'ofport' | |
1570 | * as a VLAN splinter port. | |
1571 | * | |
9cae45dc JR |
1572 | * This function should be NULL if an implementation does not support it. |
1573 | */ | |
52a90c29 | 1574 | int (*set_realdev)(struct ofport *ofport, |
4e022ec0 | 1575 | ofp_port_t realdev_ofp_port, int vid); |
9cae45dc JR |
1576 | |
1577 | /* ## ------------------------ ## */ | |
1578 | /* ## OpenFlow meter functions ## */ | |
1579 | /* ## ------------------------ ## */ | |
1580 | ||
1581 | /* These functions should be NULL if an implementation does not support | |
1582 | * them. They must be all null or all non-null.. */ | |
1583 | ||
1584 | /* Initializes 'features' to describe the metering features supported by | |
1585 | * 'ofproto'. */ | |
1586 | void (*meter_get_features)(const struct ofproto *ofproto, | |
1587 | struct ofputil_meter_features *features); | |
1588 | ||
1589 | /* If '*id' is UINT32_MAX, adds a new meter with the given 'config'. On | |
1590 | * success the function must store a provider meter ID other than | |
1591 | * UINT32_MAX in '*id'. All further references to the meter will be made | |
1592 | * with the returned provider meter id rather than the OpenFlow meter id. | |
1593 | * The caller does not try to interpret the provider meter id, giving the | |
1594 | * implementation the freedom to either use the OpenFlow meter_id value | |
1595 | * provided in the meter configuration, or any other value suitable for the | |
1596 | * implementation. | |
1597 | * | |
1598 | * If '*id' is a value other than UINT32_MAX, modifies the existing meter | |
e555eb7c JR |
1599 | * with that meter provider ID to have configuration 'config', while |
1600 | * leaving '*id' unchanged. On failure, the existing meter configuration | |
1601 | * is left intact. */ | |
9cae45dc JR |
1602 | enum ofperr (*meter_set)(struct ofproto *ofproto, ofproto_meter_id *id, |
1603 | const struct ofputil_meter_config *config); | |
1604 | ||
1605 | /* Gets the meter and meter band packet and byte counts for maximum of | |
1606 | * 'stats->n_bands' bands for the meter with provider ID 'id' within | |
1607 | * 'ofproto'. The caller fills in the other stats values. The band stats | |
1608 | * are copied to memory at 'stats->bands' provided by the caller. The | |
1609 | * number of returned band stats is returned in 'stats->n_bands'. */ | |
1610 | enum ofperr (*meter_get)(const struct ofproto *ofproto, | |
1611 | ofproto_meter_id id, | |
1612 | struct ofputil_meter_stats *stats); | |
1613 | ||
1614 | /* Deletes a meter, making the 'ofproto_meter_id' invalid for any | |
1615 | * further calls. */ | |
1616 | void (*meter_del)(struct ofproto *, ofproto_meter_id); | |
7395c052 NZ |
1617 | |
1618 | ||
1619 | /* ## -------------------- ## */ | |
1620 | /* ## OpenFlow 1.1+ groups ## */ | |
1621 | /* ## -------------------- ## */ | |
1622 | ||
1623 | struct ofgroup *(*group_alloc)(void); | |
1624 | enum ofperr (*group_construct)(struct ofgroup *); | |
1625 | void (*group_destruct)(struct ofgroup *); | |
1626 | void (*group_dealloc)(struct ofgroup *); | |
1627 | ||
809c7548 | 1628 | enum ofperr (*group_modify)(struct ofgroup *); |
7395c052 NZ |
1629 | |
1630 | enum ofperr (*group_get_stats)(const struct ofgroup *, | |
1631 | struct ofputil_group_stats *); | |
abe529af BP |
1632 | }; |
1633 | ||
1634 | extern const struct ofproto_class ofproto_dpif_class; | |
1635 | ||
1636 | int ofproto_class_register(const struct ofproto_class *); | |
1637 | int ofproto_class_unregister(const struct ofproto_class *); | |
d08a2e92 | 1638 | |
15aaf599 BP |
1639 | int ofproto_flow_mod(struct ofproto *, struct ofputil_flow_mod *) |
1640 | OVS_EXCLUDED(ofproto_mutex); | |
81a76618 BP |
1641 | void ofproto_add_flow(struct ofproto *, const struct match *, |
1642 | unsigned int priority, | |
15aaf599 BP |
1643 | const struct ofpact *ofpacts, size_t ofpacts_len) |
1644 | OVS_EXCLUDED(ofproto_mutex); | |
b20f4073 | 1645 | void ofproto_delete_flow(struct ofproto *, |
15aaf599 BP |
1646 | const struct match *, unsigned int priority) |
1647 | OVS_EXCLUDED(ofproto_mutex); | |
d08a2e92 BP |
1648 | void ofproto_flush_flows(struct ofproto *); |
1649 | ||
003ce655 JR |
1650 | \f |
1651 | static inline const struct rule_actions * | |
1652 | rule_get_actions(const struct rule *rule) | |
1653 | { | |
1654 | return ovsrcu_get(const struct rule_actions *, &rule->actions); | |
1655 | } | |
1656 | ||
1657 | /* Returns true if 'rule' is an OpenFlow 1.3 "table-miss" rule, false | |
1658 | * otherwise. | |
1659 | * | |
1660 | * ("Table-miss" rules are special because a packet_in generated through one | |
1661 | * uses OFPR_NO_MATCH as its reason, whereas packet_ins generated by any other | |
1662 | * rule use OFPR_ACTION.) */ | |
1663 | static inline bool | |
1664 | rule_is_table_miss(const struct rule *rule) | |
1665 | { | |
1666 | return rule->cr.priority == 0 && cls_rule_is_catchall(&rule->cr); | |
1667 | } | |
1668 | ||
5e8b38b0 BP |
1669 | /* Returns true if 'rule' should be hidden from the controller. |
1670 | * | |
1671 | * Rules with priority higher than UINT16_MAX are set up by ofproto itself | |
1672 | * (e.g. by in-band control) and are intentionally hidden from the | |
1673 | * controller. */ | |
1674 | static inline bool | |
1675 | rule_is_hidden(const struct rule *rule) | |
1676 | { | |
1677 | return rule->cr.priority > UINT16_MAX; | |
1678 | } | |
1679 | ||
003ce655 JR |
1680 | static inline struct rule * |
1681 | rule_from_cls_rule(const struct cls_rule *cls_rule) | |
1682 | { | |
1683 | return cls_rule ? CONTAINER_OF(cls_rule, struct rule, cr) : NULL; | |
1684 | } | |
1685 | ||
5bee6e26 | 1686 | #endif /* ofproto/ofproto-provider.h */ |