]> git.proxmox.com Git - mirror_ovs.git/blob - lib/dpif.c
treewide: Convert leading tabs to spaces.
[mirror_ovs.git] / lib / dpif.c
1 /*
2 * Copyright (c) 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016 Nicira, Inc.
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at:
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 #include <config.h>
18 #include "dpif-provider.h"
19
20 #include <ctype.h>
21 #include <errno.h>
22 #include <inttypes.h>
23 #include <stdlib.h>
24 #include <string.h>
25
26 #include "coverage.h"
27 #include "dpctl.h"
28 #include "dp-packet.h"
29 #include "dpif-netdev.h"
30 #include "openvswitch/dynamic-string.h"
31 #include "flow.h"
32 #include "netdev.h"
33 #include "netlink.h"
34 #include "odp-execute.h"
35 #include "odp-util.h"
36 #include "openvswitch/ofp-print.h"
37 #include "openvswitch/ofpbuf.h"
38 #include "packets.h"
39 #include "openvswitch/poll-loop.h"
40 #include "route-table.h"
41 #include "seq.h"
42 #include "openvswitch/shash.h"
43 #include "sset.h"
44 #include "timeval.h"
45 #include "tnl-neigh-cache.h"
46 #include "tnl-ports.h"
47 #include "util.h"
48 #include "uuid.h"
49 #include "valgrind.h"
50 #include "openvswitch/ofp-errors.h"
51 #include "openvswitch/vlog.h"
52
53 VLOG_DEFINE_THIS_MODULE(dpif);
54
55 COVERAGE_DEFINE(dpif_destroy);
56 COVERAGE_DEFINE(dpif_port_add);
57 COVERAGE_DEFINE(dpif_port_del);
58 COVERAGE_DEFINE(dpif_flow_flush);
59 COVERAGE_DEFINE(dpif_flow_get);
60 COVERAGE_DEFINE(dpif_flow_put);
61 COVERAGE_DEFINE(dpif_flow_del);
62 COVERAGE_DEFINE(dpif_execute);
63 COVERAGE_DEFINE(dpif_purge);
64 COVERAGE_DEFINE(dpif_execute_with_help);
65 COVERAGE_DEFINE(dpif_meter_set);
66 COVERAGE_DEFINE(dpif_meter_get);
67 COVERAGE_DEFINE(dpif_meter_del);
68
69 static const struct dpif_class *base_dpif_classes[] = {
70 #if defined(__linux__) || defined(_WIN32)
71 &dpif_netlink_class,
72 #endif
73 &dpif_netdev_class,
74 };
75
76 struct registered_dpif_class {
77 const struct dpif_class *dpif_class;
78 int refcount;
79 };
80 static struct shash dpif_classes = SHASH_INITIALIZER(&dpif_classes);
81 static struct sset dpif_blacklist = SSET_INITIALIZER(&dpif_blacklist);
82
83 /* Protects 'dpif_classes', including the refcount, and 'dpif_blacklist'. */
84 static struct ovs_mutex dpif_mutex = OVS_MUTEX_INITIALIZER;
85
86 /* Rate limit for individual messages going to or from the datapath, output at
87 * DBG level. This is very high because, if these are enabled, it is because
88 * we really need to see them. */
89 static struct vlog_rate_limit dpmsg_rl = VLOG_RATE_LIMIT_INIT(600, 600);
90
91 /* Not really much point in logging many dpif errors. */
92 static struct vlog_rate_limit error_rl = VLOG_RATE_LIMIT_INIT(60, 5);
93
94 static void log_operation(const struct dpif *, const char *operation,
95 int error);
96 static bool should_log_flow_message(const struct vlog_module *module,
97 int error);
98
99 /* Incremented whenever tnl route, arp, etc changes. */
100 struct seq *tnl_conf_seq;
101
102 static bool
103 dpif_is_internal_port(const char *type)
104 {
105 /* For userspace datapath, tap devices are the equivalent
106 * of internal devices in the kernel datapath, so both
107 * these types are 'internal' devices. */
108 return !strcmp(type, "internal") || !strcmp(type, "tap");
109 }
110
111 static void
112 dp_initialize(void)
113 {
114 static struct ovsthread_once once = OVSTHREAD_ONCE_INITIALIZER;
115
116 if (ovsthread_once_start(&once)) {
117 int i;
118
119 tnl_conf_seq = seq_create();
120 dpctl_unixctl_register();
121 tnl_port_map_init();
122 tnl_neigh_cache_init();
123 route_table_init();
124
125 for (i = 0; i < ARRAY_SIZE(base_dpif_classes); i++) {
126 dp_register_provider(base_dpif_classes[i]);
127 }
128
129 ovsthread_once_done(&once);
130 }
131 }
132
133 static int
134 dp_register_provider__(const struct dpif_class *new_class)
135 {
136 struct registered_dpif_class *registered_class;
137 int error;
138
139 if (sset_contains(&dpif_blacklist, new_class->type)) {
140 VLOG_DBG("attempted to register blacklisted provider: %s",
141 new_class->type);
142 return EINVAL;
143 }
144
145 if (shash_find(&dpif_classes, new_class->type)) {
146 VLOG_WARN("attempted to register duplicate datapath provider: %s",
147 new_class->type);
148 return EEXIST;
149 }
150
151 error = new_class->init ? new_class->init() : 0;
152 if (error) {
153 VLOG_WARN("failed to initialize %s datapath class: %s",
154 new_class->type, ovs_strerror(error));
155 return error;
156 }
157
158 registered_class = xmalloc(sizeof *registered_class);
159 registered_class->dpif_class = new_class;
160 registered_class->refcount = 0;
161
162 shash_add(&dpif_classes, new_class->type, registered_class);
163
164 return 0;
165 }
166
167 /* Registers a new datapath provider. After successful registration, new
168 * datapaths of that type can be opened using dpif_open(). */
169 int
170 dp_register_provider(const struct dpif_class *new_class)
171 {
172 int error;
173
174 ovs_mutex_lock(&dpif_mutex);
175 error = dp_register_provider__(new_class);
176 ovs_mutex_unlock(&dpif_mutex);
177
178 return error;
179 }
180
181 /* Unregisters a datapath provider. 'type' must have been previously
182 * registered and not currently be in use by any dpifs. After unregistration
183 * new datapaths of that type cannot be opened using dpif_open(). */
184 static int
185 dp_unregister_provider__(const char *type)
186 {
187 struct shash_node *node;
188 struct registered_dpif_class *registered_class;
189
190 node = shash_find(&dpif_classes, type);
191 if (!node) {
192 return EAFNOSUPPORT;
193 }
194
195 registered_class = node->data;
196 if (registered_class->refcount) {
197 VLOG_WARN("attempted to unregister in use datapath provider: %s", type);
198 return EBUSY;
199 }
200
201 shash_delete(&dpif_classes, node);
202 free(registered_class);
203
204 return 0;
205 }
206
207 /* Unregisters a datapath provider. 'type' must have been previously
208 * registered and not currently be in use by any dpifs. After unregistration
209 * new datapaths of that type cannot be opened using dpif_open(). */
210 int
211 dp_unregister_provider(const char *type)
212 {
213 int error;
214
215 dp_initialize();
216
217 ovs_mutex_lock(&dpif_mutex);
218 error = dp_unregister_provider__(type);
219 ovs_mutex_unlock(&dpif_mutex);
220
221 return error;
222 }
223
224 /* Blacklists a provider. Causes future calls of dp_register_provider() with
225 * a dpif_class which implements 'type' to fail. */
226 void
227 dp_blacklist_provider(const char *type)
228 {
229 ovs_mutex_lock(&dpif_mutex);
230 sset_add(&dpif_blacklist, type);
231 ovs_mutex_unlock(&dpif_mutex);
232 }
233
234 /* Adds the types of all currently registered datapath providers to 'types'.
235 * The caller must first initialize the sset. */
236 void
237 dp_enumerate_types(struct sset *types)
238 {
239 struct shash_node *node;
240
241 dp_initialize();
242
243 ovs_mutex_lock(&dpif_mutex);
244 SHASH_FOR_EACH(node, &dpif_classes) {
245 const struct registered_dpif_class *registered_class = node->data;
246 sset_add(types, registered_class->dpif_class->type);
247 }
248 ovs_mutex_unlock(&dpif_mutex);
249 }
250
251 static void
252 dp_class_unref(struct registered_dpif_class *rc)
253 {
254 ovs_mutex_lock(&dpif_mutex);
255 ovs_assert(rc->refcount);
256 rc->refcount--;
257 ovs_mutex_unlock(&dpif_mutex);
258 }
259
260 static struct registered_dpif_class *
261 dp_class_lookup(const char *type)
262 {
263 struct registered_dpif_class *rc;
264
265 ovs_mutex_lock(&dpif_mutex);
266 rc = shash_find_data(&dpif_classes, type);
267 if (rc) {
268 rc->refcount++;
269 }
270 ovs_mutex_unlock(&dpif_mutex);
271
272 return rc;
273 }
274
275 /* Clears 'names' and enumerates the names of all known created datapaths with
276 * the given 'type'. The caller must first initialize the sset. Returns 0 if
277 * successful, otherwise a positive errno value.
278 *
279 * Some kinds of datapaths might not be practically enumerable. This is not
280 * considered an error. */
281 int
282 dp_enumerate_names(const char *type, struct sset *names)
283 {
284 struct registered_dpif_class *registered_class;
285 const struct dpif_class *dpif_class;
286 int error;
287
288 dp_initialize();
289 sset_clear(names);
290
291 registered_class = dp_class_lookup(type);
292 if (!registered_class) {
293 VLOG_WARN("could not enumerate unknown type: %s", type);
294 return EAFNOSUPPORT;
295 }
296
297 dpif_class = registered_class->dpif_class;
298 error = (dpif_class->enumerate
299 ? dpif_class->enumerate(names, dpif_class)
300 : 0);
301 if (error) {
302 VLOG_WARN("failed to enumerate %s datapaths: %s", dpif_class->type,
303 ovs_strerror(error));
304 }
305 dp_class_unref(registered_class);
306
307 return error;
308 }
309
310 /* Parses 'datapath_name_', which is of the form [type@]name into its
311 * component pieces. 'name' and 'type' must be freed by the caller.
312 *
313 * The returned 'type' is normalized, as if by dpif_normalize_type(). */
314 void
315 dp_parse_name(const char *datapath_name_, char **name, char **type)
316 {
317 char *datapath_name = xstrdup(datapath_name_);
318 char *separator;
319
320 separator = strchr(datapath_name, '@');
321 if (separator) {
322 *separator = '\0';
323 *type = datapath_name;
324 *name = xstrdup(dpif_normalize_type(separator + 1));
325 } else {
326 *name = datapath_name;
327 *type = xstrdup(dpif_normalize_type(NULL));
328 }
329 }
330
331 static int
332 do_open(const char *name, const char *type, bool create, struct dpif **dpifp)
333 {
334 struct dpif *dpif = NULL;
335 int error;
336 struct registered_dpif_class *registered_class;
337
338 dp_initialize();
339
340 type = dpif_normalize_type(type);
341 registered_class = dp_class_lookup(type);
342 if (!registered_class) {
343 VLOG_WARN("could not create datapath %s of unknown type %s", name,
344 type);
345 error = EAFNOSUPPORT;
346 goto exit;
347 }
348
349 error = registered_class->dpif_class->open(registered_class->dpif_class,
350 name, create, &dpif);
351 if (!error) {
352 struct dpif_port_dump port_dump;
353 struct dpif_port dpif_port;
354
355 ovs_assert(dpif->dpif_class == registered_class->dpif_class);
356
357 DPIF_PORT_FOR_EACH(&dpif_port, &port_dump, dpif) {
358 struct netdev *netdev;
359 int err;
360
361 if (dpif_is_internal_port(dpif_port.type)) {
362 continue;
363 }
364
365 err = netdev_open(dpif_port.name, dpif_port.type, &netdev);
366
367 if (!err) {
368 netdev_ports_insert(netdev, dpif->dpif_class, &dpif_port);
369 netdev_close(netdev);
370 } else {
371 VLOG_WARN("could not open netdev %s type %s: %s",
372 dpif_port.name, dpif_port.type, ovs_strerror(err));
373 }
374 }
375 } else {
376 dp_class_unref(registered_class);
377 }
378
379 exit:
380 *dpifp = error ? NULL : dpif;
381 return error;
382 }
383
384 /* Tries to open an existing datapath named 'name' and type 'type'. Will fail
385 * if no datapath with 'name' and 'type' exists. 'type' may be either NULL or
386 * the empty string to specify the default system type. Returns 0 if
387 * successful, otherwise a positive errno value. On success stores a pointer
388 * to the datapath in '*dpifp', otherwise a null pointer. */
389 int
390 dpif_open(const char *name, const char *type, struct dpif **dpifp)
391 {
392 return do_open(name, type, false, dpifp);
393 }
394
395 /* Tries to create and open a new datapath with the given 'name' and 'type'.
396 * 'type' may be either NULL or the empty string to specify the default system
397 * type. Will fail if a datapath with 'name' and 'type' already exists.
398 * Returns 0 if successful, otherwise a positive errno value. On success
399 * stores a pointer to the datapath in '*dpifp', otherwise a null pointer. */
400 int
401 dpif_create(const char *name, const char *type, struct dpif **dpifp)
402 {
403 return do_open(name, type, true, dpifp);
404 }
405
406 /* Tries to open a datapath with the given 'name' and 'type', creating it if it
407 * does not exist. 'type' may be either NULL or the empty string to specify
408 * the default system type. Returns 0 if successful, otherwise a positive
409 * errno value. On success stores a pointer to the datapath in '*dpifp',
410 * otherwise a null pointer. */
411 int
412 dpif_create_and_open(const char *name, const char *type, struct dpif **dpifp)
413 {
414 int error;
415
416 error = dpif_create(name, type, dpifp);
417 if (error == EEXIST || error == EBUSY) {
418 error = dpif_open(name, type, dpifp);
419 if (error) {
420 VLOG_WARN("datapath %s already exists but cannot be opened: %s",
421 name, ovs_strerror(error));
422 }
423 } else if (error) {
424 VLOG_WARN("failed to create datapath %s: %s",
425 name, ovs_strerror(error));
426 }
427 return error;
428 }
429
430 static void
431 dpif_remove_netdev_ports(struct dpif *dpif) {
432 struct dpif_port_dump port_dump;
433 struct dpif_port dpif_port;
434
435 DPIF_PORT_FOR_EACH (&dpif_port, &port_dump, dpif) {
436 if (!dpif_is_internal_port(dpif_port.type)) {
437 netdev_ports_remove(dpif_port.port_no, dpif->dpif_class);
438 }
439 }
440 }
441
442 /* Closes and frees the connection to 'dpif'. Does not destroy the datapath
443 * itself; call dpif_delete() first, instead, if that is desirable. */
444 void
445 dpif_close(struct dpif *dpif)
446 {
447 if (dpif) {
448 struct registered_dpif_class *rc;
449
450 rc = shash_find_data(&dpif_classes, dpif->dpif_class->type);
451
452 if (rc->refcount == 1) {
453 dpif_remove_netdev_ports(dpif);
454 }
455 dpif_uninit(dpif, true);
456 dp_class_unref(rc);
457 }
458 }
459
460 /* Performs periodic work needed by 'dpif'. */
461 bool
462 dpif_run(struct dpif *dpif)
463 {
464 if (dpif->dpif_class->run) {
465 return dpif->dpif_class->run(dpif);
466 }
467 return false;
468 }
469
470 /* Arranges for poll_block() to wake up when dp_run() needs to be called for
471 * 'dpif'. */
472 void
473 dpif_wait(struct dpif *dpif)
474 {
475 if (dpif->dpif_class->wait) {
476 dpif->dpif_class->wait(dpif);
477 }
478 }
479
480 /* Returns the name of datapath 'dpif' prefixed with the type
481 * (for use in log messages). */
482 const char *
483 dpif_name(const struct dpif *dpif)
484 {
485 return dpif->full_name;
486 }
487
488 /* Returns the name of datapath 'dpif' without the type
489 * (for use in device names). */
490 const char *
491 dpif_base_name(const struct dpif *dpif)
492 {
493 return dpif->base_name;
494 }
495
496 /* Returns the type of datapath 'dpif'. */
497 const char *
498 dpif_type(const struct dpif *dpif)
499 {
500 return dpif->dpif_class->type;
501 }
502
503 /* Returns the fully spelled out name for the given datapath 'type'.
504 *
505 * Normalized type string can be compared with strcmp(). Unnormalized type
506 * string might be the same even if they have different spellings. */
507 const char *
508 dpif_normalize_type(const char *type)
509 {
510 return type && type[0] ? type : "system";
511 }
512
513 /* Destroys the datapath that 'dpif' is connected to, first removing all of its
514 * ports. After calling this function, it does not make sense to pass 'dpif'
515 * to any functions other than dpif_name() or dpif_close(). */
516 int
517 dpif_delete(struct dpif *dpif)
518 {
519 int error;
520
521 COVERAGE_INC(dpif_destroy);
522
523 error = dpif->dpif_class->destroy(dpif);
524 log_operation(dpif, "delete", error);
525 return error;
526 }
527
528 /* Retrieves statistics for 'dpif' into 'stats'. Returns 0 if successful,
529 * otherwise a positive errno value. */
530 int
531 dpif_get_dp_stats(const struct dpif *dpif, struct dpif_dp_stats *stats)
532 {
533 int error = dpif->dpif_class->get_stats(dpif, stats);
534 if (error) {
535 memset(stats, 0, sizeof *stats);
536 }
537 log_operation(dpif, "get_stats", error);
538 return error;
539 }
540
541 const char *
542 dpif_port_open_type(const char *datapath_type, const char *port_type)
543 {
544 struct registered_dpif_class *rc;
545
546 datapath_type = dpif_normalize_type(datapath_type);
547
548 ovs_mutex_lock(&dpif_mutex);
549 rc = shash_find_data(&dpif_classes, datapath_type);
550 if (rc && rc->dpif_class->port_open_type) {
551 port_type = rc->dpif_class->port_open_type(rc->dpif_class, port_type);
552 }
553 ovs_mutex_unlock(&dpif_mutex);
554
555 return port_type;
556 }
557
558 /* Attempts to add 'netdev' as a port on 'dpif'. If 'port_nop' is
559 * non-null and its value is not ODPP_NONE, then attempts to use the
560 * value as the port number.
561 *
562 * If successful, returns 0 and sets '*port_nop' to the new port's port
563 * number (if 'port_nop' is non-null). On failure, returns a positive
564 * errno value and sets '*port_nop' to ODPP_NONE (if 'port_nop' is
565 * non-null). */
566 int
567 dpif_port_add(struct dpif *dpif, struct netdev *netdev, odp_port_t *port_nop)
568 {
569 const char *netdev_name = netdev_get_name(netdev);
570 odp_port_t port_no = ODPP_NONE;
571 int error;
572
573 COVERAGE_INC(dpif_port_add);
574
575 if (port_nop) {
576 port_no = *port_nop;
577 }
578
579 error = dpif->dpif_class->port_add(dpif, netdev, &port_no);
580 if (!error) {
581 VLOG_DBG_RL(&dpmsg_rl, "%s: added %s as port %"PRIu32,
582 dpif_name(dpif), netdev_name, port_no);
583
584 if (!dpif_is_internal_port(netdev_get_type(netdev))) {
585
586 struct dpif_port dpif_port;
587
588 dpif_port.type = CONST_CAST(char *, netdev_get_type(netdev));
589 dpif_port.name = CONST_CAST(char *, netdev_name);
590 dpif_port.port_no = port_no;
591 netdev_ports_insert(netdev, dpif->dpif_class, &dpif_port);
592 }
593 } else {
594 VLOG_WARN_RL(&error_rl, "%s: failed to add %s as port: %s",
595 dpif_name(dpif), netdev_name, ovs_strerror(error));
596 port_no = ODPP_NONE;
597 }
598 if (port_nop) {
599 *port_nop = port_no;
600 }
601 return error;
602 }
603
604 /* Attempts to remove 'dpif''s port number 'port_no'. Returns 0 if successful,
605 * otherwise a positive errno value. */
606 int
607 dpif_port_del(struct dpif *dpif, odp_port_t port_no, bool local_delete)
608 {
609 int error = 0;
610
611 COVERAGE_INC(dpif_port_del);
612
613 if (!local_delete) {
614 error = dpif->dpif_class->port_del(dpif, port_no);
615 if (!error) {
616 VLOG_DBG_RL(&dpmsg_rl, "%s: port_del(%"PRIu32")",
617 dpif_name(dpif), port_no);
618 } else {
619 log_operation(dpif, "port_del", error);
620 }
621 }
622
623 netdev_ports_remove(port_no, dpif->dpif_class);
624 return error;
625 }
626
627 /* Makes a deep copy of 'src' into 'dst'. */
628 void
629 dpif_port_clone(struct dpif_port *dst, const struct dpif_port *src)
630 {
631 dst->name = xstrdup(src->name);
632 dst->type = xstrdup(src->type);
633 dst->port_no = src->port_no;
634 }
635
636 /* Frees memory allocated to members of 'dpif_port'.
637 *
638 * Do not call this function on a dpif_port obtained from
639 * dpif_port_dump_next(): that function retains ownership of the data in the
640 * dpif_port. */
641 void
642 dpif_port_destroy(struct dpif_port *dpif_port)
643 {
644 free(dpif_port->name);
645 free(dpif_port->type);
646 }
647
648 /* Checks if port named 'devname' exists in 'dpif'. If so, returns
649 * true; otherwise, returns false. */
650 bool
651 dpif_port_exists(const struct dpif *dpif, const char *devname)
652 {
653 int error = dpif->dpif_class->port_query_by_name(dpif, devname, NULL);
654 if (error != 0 && error != ENODEV) {
655 VLOG_WARN_RL(&error_rl, "%s: failed to query port %s: %s",
656 dpif_name(dpif), devname, ovs_strerror(error));
657 }
658
659 return !error;
660 }
661
662 /* Refreshes configuration of 'dpif's port. */
663 int
664 dpif_port_set_config(struct dpif *dpif, odp_port_t port_no,
665 const struct smap *cfg)
666 {
667 int error = 0;
668
669 if (dpif->dpif_class->port_set_config) {
670 error = dpif->dpif_class->port_set_config(dpif, port_no, cfg);
671 if (error) {
672 log_operation(dpif, "port_set_config", error);
673 }
674 }
675
676 return error;
677 }
678
679 /* Looks up port number 'port_no' in 'dpif'. On success, returns 0 and
680 * initializes '*port' appropriately; on failure, returns a positive errno
681 * value.
682 *
683 * Retuns ENODEV if the port doesn't exist.
684 *
685 * The caller owns the data in 'port' and must free it with
686 * dpif_port_destroy() when it is no longer needed. */
687 int
688 dpif_port_query_by_number(const struct dpif *dpif, odp_port_t port_no,
689 struct dpif_port *port)
690 {
691 int error = dpif->dpif_class->port_query_by_number(dpif, port_no, port);
692 if (!error) {
693 VLOG_DBG_RL(&dpmsg_rl, "%s: port %"PRIu32" is device %s",
694 dpif_name(dpif), port_no, port->name);
695 } else {
696 memset(port, 0, sizeof *port);
697 VLOG_WARN_RL(&error_rl, "%s: failed to query port %"PRIu32": %s",
698 dpif_name(dpif), port_no, ovs_strerror(error));
699 }
700 return error;
701 }
702
703 /* Looks up port named 'devname' in 'dpif'. On success, returns 0 and
704 * initializes '*port' appropriately; on failure, returns a positive errno
705 * value.
706 *
707 * Retuns ENODEV if the port doesn't exist.
708 *
709 * The caller owns the data in 'port' and must free it with
710 * dpif_port_destroy() when it is no longer needed. */
711 int
712 dpif_port_query_by_name(const struct dpif *dpif, const char *devname,
713 struct dpif_port *port)
714 {
715 int error = dpif->dpif_class->port_query_by_name(dpif, devname, port);
716 if (!error) {
717 VLOG_DBG_RL(&dpmsg_rl, "%s: device %s is on port %"PRIu32,
718 dpif_name(dpif), devname, port->port_no);
719 } else {
720 memset(port, 0, sizeof *port);
721
722 /* For ENODEV we use DBG level because the caller is probably
723 * interested in whether 'dpif' actually has a port 'devname', so that
724 * it's not an issue worth logging if it doesn't. Other errors are
725 * uncommon and more likely to indicate a real problem. */
726 VLOG_RL(&error_rl, error == ENODEV ? VLL_DBG : VLL_WARN,
727 "%s: failed to query port %s: %s",
728 dpif_name(dpif), devname, ovs_strerror(error));
729 }
730 return error;
731 }
732
733 /* Returns the Netlink PID value to supply in OVS_ACTION_ATTR_USERSPACE
734 * actions as the OVS_USERSPACE_ATTR_PID attribute's value, for use in
735 * flows whose packets arrived on port 'port_no'. In the case where the
736 * provider allocates multiple Netlink PIDs to a single port, it may use
737 * 'hash' to spread load among them. The caller need not use a particular
738 * hash function; a 5-tuple hash is suitable.
739 *
740 * (The datapath implementation might use some different hash function for
741 * distributing packets received via flow misses among PIDs. This means
742 * that packets received via flow misses might be reordered relative to
743 * packets received via userspace actions. This is not ordinarily a
744 * problem.)
745 *
746 * A 'port_no' of ODPP_NONE is a special case: it returns a reserved PID, not
747 * allocated to any port, that the client may use for special purposes.
748 *
749 * The return value is only meaningful when DPIF_UC_ACTION has been enabled in
750 * the 'dpif''s listen mask. It is allowed to change when DPIF_UC_ACTION is
751 * disabled and then re-enabled, so a client that does that must be prepared to
752 * update all of the flows that it installed that contain
753 * OVS_ACTION_ATTR_USERSPACE actions. */
754 uint32_t
755 dpif_port_get_pid(const struct dpif *dpif, odp_port_t port_no, uint32_t hash)
756 {
757 return (dpif->dpif_class->port_get_pid
758 ? (dpif->dpif_class->port_get_pid)(dpif, port_no, hash)
759 : 0);
760 }
761
762 /* Looks up port number 'port_no' in 'dpif'. On success, returns 0 and copies
763 * the port's name into the 'name_size' bytes in 'name', ensuring that the
764 * result is null-terminated. On failure, returns a positive errno value and
765 * makes 'name' the empty string. */
766 int
767 dpif_port_get_name(struct dpif *dpif, odp_port_t port_no,
768 char *name, size_t name_size)
769 {
770 struct dpif_port port;
771 int error;
772
773 ovs_assert(name_size > 0);
774
775 error = dpif_port_query_by_number(dpif, port_no, &port);
776 if (!error) {
777 ovs_strlcpy(name, port.name, name_size);
778 dpif_port_destroy(&port);
779 } else {
780 *name = '\0';
781 }
782 return error;
783 }
784
785 /* Initializes 'dump' to begin dumping the ports in a dpif.
786 *
787 * This function provides no status indication. An error status for the entire
788 * dump operation is provided when it is completed by calling
789 * dpif_port_dump_done().
790 */
791 void
792 dpif_port_dump_start(struct dpif_port_dump *dump, const struct dpif *dpif)
793 {
794 dump->dpif = dpif;
795 dump->error = dpif->dpif_class->port_dump_start(dpif, &dump->state);
796 log_operation(dpif, "port_dump_start", dump->error);
797 }
798
799 /* Attempts to retrieve another port from 'dump', which must have been
800 * initialized with dpif_port_dump_start(). On success, stores a new dpif_port
801 * into 'port' and returns true. On failure, returns false.
802 *
803 * Failure might indicate an actual error or merely that the last port has been
804 * dumped. An error status for the entire dump operation is provided when it
805 * is completed by calling dpif_port_dump_done().
806 *
807 * The dpif owns the data stored in 'port'. It will remain valid until at
808 * least the next time 'dump' is passed to dpif_port_dump_next() or
809 * dpif_port_dump_done(). */
810 bool
811 dpif_port_dump_next(struct dpif_port_dump *dump, struct dpif_port *port)
812 {
813 const struct dpif *dpif = dump->dpif;
814
815 if (dump->error) {
816 return false;
817 }
818
819 dump->error = dpif->dpif_class->port_dump_next(dpif, dump->state, port);
820 if (dump->error == EOF) {
821 VLOG_DBG_RL(&dpmsg_rl, "%s: dumped all ports", dpif_name(dpif));
822 } else {
823 log_operation(dpif, "port_dump_next", dump->error);
824 }
825
826 if (dump->error) {
827 dpif->dpif_class->port_dump_done(dpif, dump->state);
828 return false;
829 }
830 return true;
831 }
832
833 /* Completes port table dump operation 'dump', which must have been initialized
834 * with dpif_port_dump_start(). Returns 0 if the dump operation was
835 * error-free, otherwise a positive errno value describing the problem. */
836 int
837 dpif_port_dump_done(struct dpif_port_dump *dump)
838 {
839 const struct dpif *dpif = dump->dpif;
840 if (!dump->error) {
841 dump->error = dpif->dpif_class->port_dump_done(dpif, dump->state);
842 log_operation(dpif, "port_dump_done", dump->error);
843 }
844 return dump->error == EOF ? 0 : dump->error;
845 }
846
847 /* Polls for changes in the set of ports in 'dpif'. If the set of ports in
848 * 'dpif' has changed, this function does one of the following:
849 *
850 * - Stores the name of the device that was added to or deleted from 'dpif' in
851 * '*devnamep' and returns 0. The caller is responsible for freeing
852 * '*devnamep' (with free()) when it no longer needs it.
853 *
854 * - Returns ENOBUFS and sets '*devnamep' to NULL.
855 *
856 * This function may also return 'false positives', where it returns 0 and
857 * '*devnamep' names a device that was not actually added or deleted or it
858 * returns ENOBUFS without any change.
859 *
860 * Returns EAGAIN if the set of ports in 'dpif' has not changed. May also
861 * return other positive errno values to indicate that something has gone
862 * wrong. */
863 int
864 dpif_port_poll(const struct dpif *dpif, char **devnamep)
865 {
866 int error = dpif->dpif_class->port_poll(dpif, devnamep);
867 if (error) {
868 *devnamep = NULL;
869 }
870 return error;
871 }
872
873 /* Arranges for the poll loop to wake up when port_poll(dpif) will return a
874 * value other than EAGAIN. */
875 void
876 dpif_port_poll_wait(const struct dpif *dpif)
877 {
878 dpif->dpif_class->port_poll_wait(dpif);
879 }
880
881 /* Extracts the flow stats for a packet. The 'flow' and 'packet'
882 * arguments must have been initialized through a call to flow_extract().
883 * 'used' is stored into stats->used. */
884 void
885 dpif_flow_stats_extract(const struct flow *flow, const struct dp_packet *packet,
886 long long int used, struct dpif_flow_stats *stats)
887 {
888 stats->tcp_flags = ntohs(flow->tcp_flags);
889 stats->n_bytes = dp_packet_size(packet);
890 stats->n_packets = 1;
891 stats->used = used;
892 }
893
894 /* Appends a human-readable representation of 'stats' to 's'. */
895 void
896 dpif_flow_stats_format(const struct dpif_flow_stats *stats, struct ds *s)
897 {
898 ds_put_format(s, "packets:%"PRIu64", bytes:%"PRIu64", used:",
899 stats->n_packets, stats->n_bytes);
900 if (stats->used) {
901 ds_put_format(s, "%.3fs", (time_msec() - stats->used) / 1000.0);
902 } else {
903 ds_put_format(s, "never");
904 }
905 if (stats->tcp_flags) {
906 ds_put_cstr(s, ", flags:");
907 packet_format_tcp_flags(s, stats->tcp_flags);
908 }
909 }
910
911 /* Places the hash of the 'key_len' bytes starting at 'key' into '*hash'. */
912 void
913 dpif_flow_hash(const struct dpif *dpif OVS_UNUSED,
914 const void *key, size_t key_len, ovs_u128 *hash)
915 {
916 static struct ovsthread_once once = OVSTHREAD_ONCE_INITIALIZER;
917 static uint32_t secret;
918
919 if (ovsthread_once_start(&once)) {
920 secret = random_uint32();
921 ovsthread_once_done(&once);
922 }
923 hash_bytes128(key, key_len, secret, hash);
924 uuid_set_bits_v4((struct uuid *)hash);
925 }
926
927 /* Deletes all flows from 'dpif'. Returns 0 if successful, otherwise a
928 * positive errno value. */
929 int
930 dpif_flow_flush(struct dpif *dpif)
931 {
932 int error;
933
934 COVERAGE_INC(dpif_flow_flush);
935
936 error = dpif->dpif_class->flow_flush(dpif);
937 log_operation(dpif, "flow_flush", error);
938 return error;
939 }
940
941 /* Attempts to install 'key' into the datapath, fetches it, then deletes it.
942 * Returns true if the datapath supported installing 'flow', false otherwise.
943 */
944 bool
945 dpif_probe_feature(struct dpif *dpif, const char *name,
946 const struct ofpbuf *key, const struct ofpbuf *actions,
947 const ovs_u128 *ufid)
948 {
949 struct dpif_flow flow;
950 struct ofpbuf reply;
951 uint64_t stub[DPIF_FLOW_BUFSIZE / 8];
952 bool enable_feature = false;
953 int error;
954 const struct nlattr *nl_actions = actions ? actions->data : NULL;
955 const size_t nl_actions_size = actions ? actions->size : 0;
956
957 /* Use DPIF_FP_MODIFY to cover the case where ovs-vswitchd is killed (and
958 * restarted) at just the right time such that feature probes from the
959 * previous run are still present in the datapath. */
960 error = dpif_flow_put(dpif, DPIF_FP_CREATE | DPIF_FP_MODIFY | DPIF_FP_PROBE,
961 key->data, key->size, NULL, 0,
962 nl_actions, nl_actions_size,
963 ufid, NON_PMD_CORE_ID, NULL);
964 if (error) {
965 if (error != EINVAL && error != EOVERFLOW) {
966 VLOG_WARN("%s: %s flow probe failed (%s)",
967 dpif_name(dpif), name, ovs_strerror(error));
968 }
969 return false;
970 }
971
972 ofpbuf_use_stack(&reply, &stub, sizeof stub);
973 error = dpif_flow_get(dpif, key->data, key->size, ufid,
974 NON_PMD_CORE_ID, &reply, &flow);
975 if (!error
976 && (!ufid || (flow.ufid_present
977 && ovs_u128_equals(*ufid, flow.ufid)))) {
978 enable_feature = true;
979 }
980
981 error = dpif_flow_del(dpif, key->data, key->size, ufid,
982 NON_PMD_CORE_ID, NULL);
983 if (error) {
984 VLOG_WARN("%s: failed to delete %s feature probe flow",
985 dpif_name(dpif), name);
986 }
987
988 return enable_feature;
989 }
990
991 /* A dpif_operate() wrapper for performing a single DPIF_OP_FLOW_GET. */
992 int
993 dpif_flow_get(struct dpif *dpif,
994 const struct nlattr *key, size_t key_len, const ovs_u128 *ufid,
995 const unsigned pmd_id, struct ofpbuf *buf, struct dpif_flow *flow)
996 {
997 struct dpif_op *opp;
998 struct dpif_op op;
999
1000 op.type = DPIF_OP_FLOW_GET;
1001 op.flow_get.key = key;
1002 op.flow_get.key_len = key_len;
1003 op.flow_get.ufid = ufid;
1004 op.flow_get.pmd_id = pmd_id;
1005 op.flow_get.buffer = buf;
1006
1007 memset(flow, 0, sizeof *flow);
1008 op.flow_get.flow = flow;
1009 op.flow_get.flow->key = key;
1010 op.flow_get.flow->key_len = key_len;
1011
1012 opp = &op;
1013 dpif_operate(dpif, &opp, 1);
1014
1015 return op.error;
1016 }
1017
1018 /* A dpif_operate() wrapper for performing a single DPIF_OP_FLOW_PUT. */
1019 int
1020 dpif_flow_put(struct dpif *dpif, enum dpif_flow_put_flags flags,
1021 const struct nlattr *key, size_t key_len,
1022 const struct nlattr *mask, size_t mask_len,
1023 const struct nlattr *actions, size_t actions_len,
1024 const ovs_u128 *ufid, const unsigned pmd_id,
1025 struct dpif_flow_stats *stats)
1026 {
1027 struct dpif_op *opp;
1028 struct dpif_op op;
1029
1030 op.type = DPIF_OP_FLOW_PUT;
1031 op.flow_put.flags = flags;
1032 op.flow_put.key = key;
1033 op.flow_put.key_len = key_len;
1034 op.flow_put.mask = mask;
1035 op.flow_put.mask_len = mask_len;
1036 op.flow_put.actions = actions;
1037 op.flow_put.actions_len = actions_len;
1038 op.flow_put.ufid = ufid;
1039 op.flow_put.pmd_id = pmd_id;
1040 op.flow_put.stats = stats;
1041
1042 opp = &op;
1043 dpif_operate(dpif, &opp, 1);
1044
1045 return op.error;
1046 }
1047
1048 /* A dpif_operate() wrapper for performing a single DPIF_OP_FLOW_DEL. */
1049 int
1050 dpif_flow_del(struct dpif *dpif,
1051 const struct nlattr *key, size_t key_len, const ovs_u128 *ufid,
1052 const unsigned pmd_id, struct dpif_flow_stats *stats)
1053 {
1054 struct dpif_op *opp;
1055 struct dpif_op op;
1056
1057 op.type = DPIF_OP_FLOW_DEL;
1058 op.flow_del.key = key;
1059 op.flow_del.key_len = key_len;
1060 op.flow_del.ufid = ufid;
1061 op.flow_del.pmd_id = pmd_id;
1062 op.flow_del.stats = stats;
1063 op.flow_del.terse = false;
1064
1065 opp = &op;
1066 dpif_operate(dpif, &opp, 1);
1067
1068 return op.error;
1069 }
1070
1071 /* Creates and returns a new 'struct dpif_flow_dump' for iterating through the
1072 * flows in 'dpif'. If 'terse' is true, then only UFID and statistics will
1073 * be returned in the dump. Otherwise, all fields will be returned.
1074 *
1075 * This function always successfully returns a dpif_flow_dump. Error
1076 * reporting is deferred to dpif_flow_dump_destroy(). */
1077 struct dpif_flow_dump *
1078 dpif_flow_dump_create(const struct dpif *dpif, bool terse, char *type)
1079 {
1080 return dpif->dpif_class->flow_dump_create(dpif, terse, type);
1081 }
1082
1083 /* Destroys 'dump', which must have been created with dpif_flow_dump_create().
1084 * All dpif_flow_dump_thread structures previously created for 'dump' must
1085 * previously have been destroyed.
1086 *
1087 * Returns 0 if the dump operation was error-free, otherwise a positive errno
1088 * value describing the problem. */
1089 int
1090 dpif_flow_dump_destroy(struct dpif_flow_dump *dump)
1091 {
1092 const struct dpif *dpif = dump->dpif;
1093 int error = dpif->dpif_class->flow_dump_destroy(dump);
1094 log_operation(dpif, "flow_dump_destroy", error);
1095 return error == EOF ? 0 : error;
1096 }
1097
1098 /* Returns new thread-local state for use with dpif_flow_dump_next(). */
1099 struct dpif_flow_dump_thread *
1100 dpif_flow_dump_thread_create(struct dpif_flow_dump *dump)
1101 {
1102 return dump->dpif->dpif_class->flow_dump_thread_create(dump);
1103 }
1104
1105 /* Releases 'thread'. */
1106 void
1107 dpif_flow_dump_thread_destroy(struct dpif_flow_dump_thread *thread)
1108 {
1109 thread->dpif->dpif_class->flow_dump_thread_destroy(thread);
1110 }
1111
1112 /* Attempts to retrieve up to 'max_flows' more flows from 'thread'. Returns 0
1113 * if and only if no flows remained to be retrieved, otherwise a positive
1114 * number reflecting the number of elements in 'flows[]' that were updated.
1115 * The number of flows returned might be less than 'max_flows' because
1116 * fewer than 'max_flows' remained, because this particular datapath does not
1117 * benefit from batching, or because an error occurred partway through
1118 * retrieval. Thus, the caller should continue calling until a 0 return value,
1119 * even if intermediate return values are less than 'max_flows'.
1120 *
1121 * No error status is immediately provided. An error status for the entire
1122 * dump operation is provided when it is completed by calling
1123 * dpif_flow_dump_destroy().
1124 *
1125 * All of the data stored into 'flows' is owned by the datapath, not by the
1126 * caller, and the caller must not modify or free it. The datapath guarantees
1127 * that it remains accessible and unchanged until the first of:
1128 * - The next call to dpif_flow_dump_next() for 'thread', or
1129 * - The next rcu quiescent period. */
1130 int
1131 dpif_flow_dump_next(struct dpif_flow_dump_thread *thread,
1132 struct dpif_flow *flows, int max_flows)
1133 {
1134 struct dpif *dpif = thread->dpif;
1135 int n;
1136
1137 ovs_assert(max_flows > 0);
1138 n = dpif->dpif_class->flow_dump_next(thread, flows, max_flows);
1139 if (n > 0) {
1140 struct dpif_flow *f;
1141
1142 for (f = flows; f < &flows[n]
1143 && should_log_flow_message(&this_module, 0); f++) {
1144 log_flow_message(dpif, 0, &this_module, "flow_dump",
1145 f->key, f->key_len, f->mask, f->mask_len,
1146 &f->ufid, &f->stats, f->actions, f->actions_len);
1147 }
1148 } else {
1149 VLOG_DBG_RL(&dpmsg_rl, "%s: dumped all flows", dpif_name(dpif));
1150 }
1151 return n;
1152 }
1153
1154 struct dpif_execute_helper_aux {
1155 struct dpif *dpif;
1156 const struct flow *flow;
1157 int error;
1158 const struct nlattr *meter_action; /* Non-NULL, if have a meter action. */
1159 };
1160
1161 /* This is called for actions that need the context of the datapath to be
1162 * meaningful. */
1163 static void
1164 dpif_execute_helper_cb(void *aux_, struct dp_packet_batch *packets_,
1165 const struct nlattr *action, bool should_steal)
1166 {
1167 struct dpif_execute_helper_aux *aux = aux_;
1168 int type = nl_attr_type(action);
1169 struct dp_packet *packet = packets_->packets[0];
1170
1171 ovs_assert(packets_->count == 1);
1172
1173 switch ((enum ovs_action_attr)type) {
1174 case OVS_ACTION_ATTR_METER:
1175 /* Maintain a pointer to the first meter action seen. */
1176 if (!aux->meter_action) {
1177 aux->meter_action = action;
1178 }
1179 break;
1180
1181 case OVS_ACTION_ATTR_CT:
1182 case OVS_ACTION_ATTR_OUTPUT:
1183 case OVS_ACTION_ATTR_TUNNEL_PUSH:
1184 case OVS_ACTION_ATTR_TUNNEL_POP:
1185 case OVS_ACTION_ATTR_USERSPACE:
1186 case OVS_ACTION_ATTR_RECIRC: {
1187 struct dpif_execute execute;
1188 struct ofpbuf execute_actions;
1189 uint64_t stub[256 / 8];
1190 struct pkt_metadata *md = &packet->md;
1191
1192 if (flow_tnl_dst_is_set(&md->tunnel) || aux->meter_action) {
1193 ofpbuf_use_stub(&execute_actions, stub, sizeof stub);
1194
1195 if (aux->meter_action) {
1196 const struct nlattr *a = aux->meter_action;
1197
1198 /* XXX: This code collects meter actions since the last action
1199 * execution via the datapath to be executed right before the
1200 * current action that needs to be executed by the datapath.
1201 * This is only an approximation, but better than nothing.
1202 * Fundamentally, we should have a mechanism by which the
1203 * datapath could return the result of the meter action so that
1204 * we could execute them at the right order. */
1205 do {
1206 ofpbuf_put(&execute_actions, a, NLA_ALIGN(a->nla_len));
1207 /* Find next meter action before 'action', if any. */
1208 do {
1209 a = nl_attr_next(a);
1210 } while (a != action &&
1211 nl_attr_type(a) != OVS_ACTION_ATTR_METER);
1212 } while (a != action);
1213 }
1214
1215 /* The Linux kernel datapath throws away the tunnel information
1216 * that we supply as metadata. We have to use a "set" action to
1217 * supply it. */
1218 if (md->tunnel.ip_dst) {
1219 odp_put_tunnel_action(&md->tunnel, &execute_actions, NULL);
1220 }
1221 ofpbuf_put(&execute_actions, action, NLA_ALIGN(action->nla_len));
1222
1223 execute.actions = execute_actions.data;
1224 execute.actions_len = execute_actions.size;
1225 } else {
1226 execute.actions = action;
1227 execute.actions_len = NLA_ALIGN(action->nla_len);
1228 }
1229
1230 struct dp_packet *clone = NULL;
1231 uint32_t cutlen = dp_packet_get_cutlen(packet);
1232 if (cutlen && (type == OVS_ACTION_ATTR_OUTPUT
1233 || type == OVS_ACTION_ATTR_TUNNEL_PUSH
1234 || type == OVS_ACTION_ATTR_TUNNEL_POP
1235 || type == OVS_ACTION_ATTR_USERSPACE)) {
1236 dp_packet_reset_cutlen(packet);
1237 if (!should_steal) {
1238 packet = clone = dp_packet_clone(packet);
1239 }
1240 dp_packet_set_size(packet, dp_packet_size(packet) - cutlen);
1241 }
1242
1243 execute.packet = packet;
1244 execute.flow = aux->flow;
1245 execute.needs_help = false;
1246 execute.probe = false;
1247 execute.mtu = 0;
1248 aux->error = dpif_execute(aux->dpif, &execute);
1249 log_execute_message(aux->dpif, &this_module, &execute,
1250 true, aux->error);
1251
1252 dp_packet_delete(clone);
1253
1254 if (flow_tnl_dst_is_set(&md->tunnel) || aux->meter_action) {
1255 ofpbuf_uninit(&execute_actions);
1256
1257 /* Do not re-use the same meters for later output actions. */
1258 aux->meter_action = NULL;
1259 }
1260 break;
1261 }
1262
1263 case OVS_ACTION_ATTR_HASH:
1264 case OVS_ACTION_ATTR_PUSH_VLAN:
1265 case OVS_ACTION_ATTR_POP_VLAN:
1266 case OVS_ACTION_ATTR_PUSH_MPLS:
1267 case OVS_ACTION_ATTR_POP_MPLS:
1268 case OVS_ACTION_ATTR_SET:
1269 case OVS_ACTION_ATTR_SET_MASKED:
1270 case OVS_ACTION_ATTR_SAMPLE:
1271 case OVS_ACTION_ATTR_TRUNC:
1272 case OVS_ACTION_ATTR_PUSH_ETH:
1273 case OVS_ACTION_ATTR_POP_ETH:
1274 case OVS_ACTION_ATTR_CLONE:
1275 case OVS_ACTION_ATTR_PUSH_NSH:
1276 case OVS_ACTION_ATTR_POP_NSH:
1277 case OVS_ACTION_ATTR_CT_CLEAR:
1278 case OVS_ACTION_ATTR_UNSPEC:
1279 case __OVS_ACTION_ATTR_MAX:
1280 OVS_NOT_REACHED();
1281 }
1282 dp_packet_delete_batch(packets_, should_steal);
1283 }
1284
1285 /* Executes 'execute' by performing most of the actions in userspace and
1286 * passing the fully constructed packets to 'dpif' for output and userspace
1287 * actions.
1288 *
1289 * This helps with actions that a given 'dpif' doesn't implement directly. */
1290 static int
1291 dpif_execute_with_help(struct dpif *dpif, struct dpif_execute *execute)
1292 {
1293 struct dpif_execute_helper_aux aux = {dpif, execute->flow, 0, NULL};
1294 struct dp_packet_batch pb;
1295
1296 COVERAGE_INC(dpif_execute_with_help);
1297
1298 dp_packet_batch_init_packet(&pb, execute->packet);
1299 odp_execute_actions(&aux, &pb, false, execute->actions,
1300 execute->actions_len, dpif_execute_helper_cb);
1301 return aux.error;
1302 }
1303
1304 /* Returns true if the datapath needs help executing 'execute'. */
1305 static bool
1306 dpif_execute_needs_help(const struct dpif_execute *execute)
1307 {
1308 return execute->needs_help || nl_attr_oversized(execute->actions_len);
1309 }
1310
1311 /* A dpif_operate() wrapper for performing a single DPIF_OP_EXECUTE. */
1312 int
1313 dpif_execute(struct dpif *dpif, struct dpif_execute *execute)
1314 {
1315 if (execute->actions_len) {
1316 struct dpif_op *opp;
1317 struct dpif_op op;
1318
1319 op.type = DPIF_OP_EXECUTE;
1320 op.execute = *execute;
1321
1322 opp = &op;
1323 dpif_operate(dpif, &opp, 1);
1324
1325 return op.error;
1326 } else {
1327 return 0;
1328 }
1329 }
1330
1331 /* Executes each of the 'n_ops' operations in 'ops' on 'dpif', in the order in
1332 * which they are specified. Places each operation's results in the "output"
1333 * members documented in comments, and 0 in the 'error' member on success or a
1334 * positive errno on failure. */
1335 void
1336 dpif_operate(struct dpif *dpif, struct dpif_op **ops, size_t n_ops)
1337 {
1338 while (n_ops > 0) {
1339 size_t chunk;
1340
1341 /* Count 'chunk', the number of ops that can be executed without
1342 * needing any help. Ops that need help should be rare, so we
1343 * expect this to ordinarily be 'n_ops', that is, all the ops. */
1344 for (chunk = 0; chunk < n_ops; chunk++) {
1345 struct dpif_op *op = ops[chunk];
1346
1347 if (op->type == DPIF_OP_EXECUTE
1348 && dpif_execute_needs_help(&op->execute)) {
1349 break;
1350 }
1351 }
1352
1353 if (chunk) {
1354 /* Execute a chunk full of ops that the dpif provider can
1355 * handle itself, without help. */
1356 size_t i;
1357
1358 dpif->dpif_class->operate(dpif, ops, chunk);
1359
1360 for (i = 0; i < chunk; i++) {
1361 struct dpif_op *op = ops[i];
1362 int error = op->error;
1363
1364 switch (op->type) {
1365 case DPIF_OP_FLOW_PUT: {
1366 struct dpif_flow_put *put = &op->flow_put;
1367
1368 COVERAGE_INC(dpif_flow_put);
1369 log_flow_put_message(dpif, &this_module, put, error);
1370 if (error && put->stats) {
1371 memset(put->stats, 0, sizeof *put->stats);
1372 }
1373 break;
1374 }
1375
1376 case DPIF_OP_FLOW_GET: {
1377 struct dpif_flow_get *get = &op->flow_get;
1378
1379 COVERAGE_INC(dpif_flow_get);
1380 if (error) {
1381 memset(get->flow, 0, sizeof *get->flow);
1382 }
1383 log_flow_get_message(dpif, &this_module, get, error);
1384
1385 break;
1386 }
1387
1388 case DPIF_OP_FLOW_DEL: {
1389 struct dpif_flow_del *del = &op->flow_del;
1390
1391 COVERAGE_INC(dpif_flow_del);
1392 log_flow_del_message(dpif, &this_module, del, error);
1393 if (error && del->stats) {
1394 memset(del->stats, 0, sizeof *del->stats);
1395 }
1396 break;
1397 }
1398
1399 case DPIF_OP_EXECUTE:
1400 COVERAGE_INC(dpif_execute);
1401 log_execute_message(dpif, &this_module, &op->execute,
1402 false, error);
1403 break;
1404 }
1405 }
1406
1407 ops += chunk;
1408 n_ops -= chunk;
1409 } else {
1410 /* Help the dpif provider to execute one op. */
1411 struct dpif_op *op = ops[0];
1412
1413 COVERAGE_INC(dpif_execute);
1414 op->error = dpif_execute_with_help(dpif, &op->execute);
1415 ops++;
1416 n_ops--;
1417 }
1418 }
1419 }
1420
1421 /* Returns a string that represents 'type', for use in log messages. */
1422 const char *
1423 dpif_upcall_type_to_string(enum dpif_upcall_type type)
1424 {
1425 switch (type) {
1426 case DPIF_UC_MISS: return "miss";
1427 case DPIF_UC_ACTION: return "action";
1428 case DPIF_N_UC_TYPES: default: return "<unknown>";
1429 }
1430 }
1431
1432 /* Enables or disables receiving packets with dpif_recv() on 'dpif'. Returns 0
1433 * if successful, otherwise a positive errno value.
1434 *
1435 * Turning packet receive off and then back on may change the Netlink PID
1436 * assignments returned by dpif_port_get_pid(). If the client does this, it
1437 * must update all of the flows that have OVS_ACTION_ATTR_USERSPACE actions
1438 * using the new PID assignment. */
1439 int
1440 dpif_recv_set(struct dpif *dpif, bool enable)
1441 {
1442 int error = 0;
1443
1444 if (dpif->dpif_class->recv_set) {
1445 error = dpif->dpif_class->recv_set(dpif, enable);
1446 log_operation(dpif, "recv_set", error);
1447 }
1448 return error;
1449 }
1450
1451 /* Refreshes the poll loops and Netlink sockets associated to each port,
1452 * when the number of upcall handlers (upcall receiving thread) is changed
1453 * to 'n_handlers' and receiving packets for 'dpif' is enabled by
1454 * recv_set().
1455 *
1456 * Since multiple upcall handlers can read upcalls simultaneously from
1457 * 'dpif', each port can have multiple Netlink sockets, one per upcall
1458 * handler. So, handlers_set() is responsible for the following tasks:
1459 *
1460 * When receiving upcall is enabled, extends or creates the
1461 * configuration to support:
1462 *
1463 * - 'n_handlers' Netlink sockets for each port.
1464 *
1465 * - 'n_handlers' poll loops, one for each upcall handler.
1466 *
1467 * - registering the Netlink sockets for the same upcall handler to
1468 * the corresponding poll loop.
1469 *
1470 * Returns 0 if successful, otherwise a positive errno value. */
1471 int
1472 dpif_handlers_set(struct dpif *dpif, uint32_t n_handlers)
1473 {
1474 int error = 0;
1475
1476 if (dpif->dpif_class->handlers_set) {
1477 error = dpif->dpif_class->handlers_set(dpif, n_handlers);
1478 log_operation(dpif, "handlers_set", error);
1479 }
1480 return error;
1481 }
1482
1483 void
1484 dpif_register_dp_purge_cb(struct dpif *dpif, dp_purge_callback *cb, void *aux)
1485 {
1486 if (dpif->dpif_class->register_dp_purge_cb) {
1487 dpif->dpif_class->register_dp_purge_cb(dpif, cb, aux);
1488 }
1489 }
1490
1491 void
1492 dpif_register_upcall_cb(struct dpif *dpif, upcall_callback *cb, void *aux)
1493 {
1494 if (dpif->dpif_class->register_upcall_cb) {
1495 dpif->dpif_class->register_upcall_cb(dpif, cb, aux);
1496 }
1497 }
1498
1499 void
1500 dpif_enable_upcall(struct dpif *dpif)
1501 {
1502 if (dpif->dpif_class->enable_upcall) {
1503 dpif->dpif_class->enable_upcall(dpif);
1504 }
1505 }
1506
1507 void
1508 dpif_disable_upcall(struct dpif *dpif)
1509 {
1510 if (dpif->dpif_class->disable_upcall) {
1511 dpif->dpif_class->disable_upcall(dpif);
1512 }
1513 }
1514
1515 void
1516 dpif_print_packet(struct dpif *dpif, struct dpif_upcall *upcall)
1517 {
1518 if (!VLOG_DROP_DBG(&dpmsg_rl)) {
1519 struct ds flow;
1520 char *packet;
1521
1522 packet = ofp_dp_packet_to_string(&upcall->packet);
1523
1524 ds_init(&flow);
1525 odp_flow_key_format(upcall->key, upcall->key_len, &flow);
1526
1527 VLOG_DBG("%s: %s upcall:\n%s\n%s",
1528 dpif_name(dpif), dpif_upcall_type_to_string(upcall->type),
1529 ds_cstr(&flow), packet);
1530
1531 ds_destroy(&flow);
1532 free(packet);
1533 }
1534 }
1535
1536 /* Pass custom configuration to the datapath implementation. Some of the
1537 * changes can be postponed until dpif_run() is called. */
1538 int
1539 dpif_set_config(struct dpif *dpif, const struct smap *cfg)
1540 {
1541 int error = 0;
1542
1543 if (dpif->dpif_class->set_config) {
1544 error = dpif->dpif_class->set_config(dpif, cfg);
1545 if (error) {
1546 log_operation(dpif, "set_config", error);
1547 }
1548 }
1549
1550 return error;
1551 }
1552
1553 /* Polls for an upcall from 'dpif' for an upcall handler. Since there can
1554 * be multiple poll loops, 'handler_id' is needed as index to identify the
1555 * corresponding poll loop. If successful, stores the upcall into '*upcall',
1556 * using 'buf' for storage. Should only be called if 'recv_set' has been used
1557 * to enable receiving packets from 'dpif'.
1558 *
1559 * 'upcall->key' and 'upcall->userdata' point into data in the caller-provided
1560 * 'buf', so their memory cannot be freed separately from 'buf'.
1561 *
1562 * The caller owns the data of 'upcall->packet' and may modify it. If
1563 * packet's headroom is exhausted as it is manipulated, 'upcall->packet'
1564 * will be reallocated. This requires the data of 'upcall->packet' to be
1565 * released with ofpbuf_uninit() before 'upcall' is destroyed. However,
1566 * when an error is returned, the 'upcall->packet' may be uninitialized
1567 * and should not be released.
1568 *
1569 * Returns 0 if successful, otherwise a positive errno value. Returns EAGAIN
1570 * if no upcall is immediately available. */
1571 int
1572 dpif_recv(struct dpif *dpif, uint32_t handler_id, struct dpif_upcall *upcall,
1573 struct ofpbuf *buf)
1574 {
1575 int error = EAGAIN;
1576
1577 if (dpif->dpif_class->recv) {
1578 error = dpif->dpif_class->recv(dpif, handler_id, upcall, buf);
1579 if (!error) {
1580 dpif_print_packet(dpif, upcall);
1581 } else if (error != EAGAIN) {
1582 log_operation(dpif, "recv", error);
1583 }
1584 }
1585 return error;
1586 }
1587
1588 /* Discards all messages that would otherwise be received by dpif_recv() on
1589 * 'dpif'. */
1590 void
1591 dpif_recv_purge(struct dpif *dpif)
1592 {
1593 COVERAGE_INC(dpif_purge);
1594 if (dpif->dpif_class->recv_purge) {
1595 dpif->dpif_class->recv_purge(dpif);
1596 }
1597 }
1598
1599 /* Arranges for the poll loop for an upcall handler to wake up when 'dpif'
1600 * 'dpif' has a message queued to be received with the recv member
1601 * function. Since there can be multiple poll loops, 'handler_id' is
1602 * needed as index to identify the corresponding poll loop. */
1603 void
1604 dpif_recv_wait(struct dpif *dpif, uint32_t handler_id)
1605 {
1606 if (dpif->dpif_class->recv_wait) {
1607 dpif->dpif_class->recv_wait(dpif, handler_id);
1608 }
1609 }
1610
1611 /*
1612 * Return the datapath version. Caller is responsible for freeing
1613 * the string.
1614 */
1615 char *
1616 dpif_get_dp_version(const struct dpif *dpif)
1617 {
1618 char *version = NULL;
1619
1620 if (dpif->dpif_class->get_datapath_version) {
1621 version = dpif->dpif_class->get_datapath_version();
1622 }
1623
1624 return version;
1625 }
1626
1627 /* Obtains the NetFlow engine type and engine ID for 'dpif' into '*engine_type'
1628 * and '*engine_id', respectively. */
1629 void
1630 dpif_get_netflow_ids(const struct dpif *dpif,
1631 uint8_t *engine_type, uint8_t *engine_id)
1632 {
1633 *engine_type = dpif->netflow_engine_type;
1634 *engine_id = dpif->netflow_engine_id;
1635 }
1636
1637 /* Translates OpenFlow queue ID 'queue_id' (in host byte order) into a priority
1638 * value used for setting packet priority.
1639 * On success, returns 0 and stores the priority into '*priority'.
1640 * On failure, returns a positive errno value and stores 0 into '*priority'. */
1641 int
1642 dpif_queue_to_priority(const struct dpif *dpif, uint32_t queue_id,
1643 uint32_t *priority)
1644 {
1645 int error = (dpif->dpif_class->queue_to_priority
1646 ? dpif->dpif_class->queue_to_priority(dpif, queue_id,
1647 priority)
1648 : EOPNOTSUPP);
1649 if (error) {
1650 *priority = 0;
1651 }
1652 log_operation(dpif, "queue_to_priority", error);
1653 return error;
1654 }
1655 \f
1656 void
1657 dpif_init(struct dpif *dpif, const struct dpif_class *dpif_class,
1658 const char *name,
1659 uint8_t netflow_engine_type, uint8_t netflow_engine_id)
1660 {
1661 dpif->dpif_class = dpif_class;
1662 dpif->base_name = xstrdup(name);
1663 dpif->full_name = xasprintf("%s@%s", dpif_class->type, name);
1664 dpif->netflow_engine_type = netflow_engine_type;
1665 dpif->netflow_engine_id = netflow_engine_id;
1666 }
1667
1668 /* Undoes the results of initialization.
1669 *
1670 * Normally this function only needs to be called from dpif_close().
1671 * However, it may be called by providers due to an error on opening
1672 * that occurs after initialization. It this case dpif_close() would
1673 * never be called. */
1674 void
1675 dpif_uninit(struct dpif *dpif, bool close)
1676 {
1677 char *base_name = dpif->base_name;
1678 char *full_name = dpif->full_name;
1679
1680 if (close) {
1681 dpif->dpif_class->close(dpif);
1682 }
1683
1684 free(base_name);
1685 free(full_name);
1686 }
1687 \f
1688 static void
1689 log_operation(const struct dpif *dpif, const char *operation, int error)
1690 {
1691 if (!error) {
1692 VLOG_DBG_RL(&dpmsg_rl, "%s: %s success", dpif_name(dpif), operation);
1693 } else if (ofperr_is_valid(error)) {
1694 VLOG_WARN_RL(&error_rl, "%s: %s failed (%s)",
1695 dpif_name(dpif), operation, ofperr_get_name(error));
1696 } else {
1697 VLOG_WARN_RL(&error_rl, "%s: %s failed (%s)",
1698 dpif_name(dpif), operation, ovs_strerror(error));
1699 }
1700 }
1701
1702 static enum vlog_level
1703 flow_message_log_level(int error)
1704 {
1705 /* If flows arrive in a batch, userspace may push down multiple
1706 * unique flow definitions that overlap when wildcards are applied.
1707 * Kernels that support flow wildcarding will reject these flows as
1708 * duplicates (EEXIST), so lower the log level to debug for these
1709 * types of messages. */
1710 return (error && error != EEXIST) ? VLL_WARN : VLL_DBG;
1711 }
1712
1713 static bool
1714 should_log_flow_message(const struct vlog_module *module, int error)
1715 {
1716 return !vlog_should_drop(module, flow_message_log_level(error),
1717 error ? &error_rl : &dpmsg_rl);
1718 }
1719
1720 void
1721 log_flow_message(const struct dpif *dpif, int error,
1722 const struct vlog_module *module,
1723 const char *operation,
1724 const struct nlattr *key, size_t key_len,
1725 const struct nlattr *mask, size_t mask_len,
1726 const ovs_u128 *ufid, const struct dpif_flow_stats *stats,
1727 const struct nlattr *actions, size_t actions_len)
1728 {
1729 struct ds ds = DS_EMPTY_INITIALIZER;
1730 ds_put_format(&ds, "%s: ", dpif_name(dpif));
1731 if (error) {
1732 ds_put_cstr(&ds, "failed to ");
1733 }
1734 ds_put_format(&ds, "%s ", operation);
1735 if (error) {
1736 ds_put_format(&ds, "(%s) ", ovs_strerror(error));
1737 }
1738 if (ufid) {
1739 odp_format_ufid(ufid, &ds);
1740 ds_put_cstr(&ds, " ");
1741 }
1742 odp_flow_format(key, key_len, mask, mask_len, NULL, &ds, true);
1743 if (stats) {
1744 ds_put_cstr(&ds, ", ");
1745 dpif_flow_stats_format(stats, &ds);
1746 }
1747 if (actions || actions_len) {
1748 ds_put_cstr(&ds, ", actions:");
1749 format_odp_actions(&ds, actions, actions_len, NULL);
1750 }
1751 vlog(module, flow_message_log_level(error), "%s", ds_cstr(&ds));
1752 ds_destroy(&ds);
1753 }
1754
1755 void
1756 log_flow_put_message(const struct dpif *dpif,
1757 const struct vlog_module *module,
1758 const struct dpif_flow_put *put,
1759 int error)
1760 {
1761 if (should_log_flow_message(module, error)
1762 && !(put->flags & DPIF_FP_PROBE)) {
1763 struct ds s;
1764
1765 ds_init(&s);
1766 ds_put_cstr(&s, "put");
1767 if (put->flags & DPIF_FP_CREATE) {
1768 ds_put_cstr(&s, "[create]");
1769 }
1770 if (put->flags & DPIF_FP_MODIFY) {
1771 ds_put_cstr(&s, "[modify]");
1772 }
1773 if (put->flags & DPIF_FP_ZERO_STATS) {
1774 ds_put_cstr(&s, "[zero]");
1775 }
1776 log_flow_message(dpif, error, module, ds_cstr(&s),
1777 put->key, put->key_len, put->mask, put->mask_len,
1778 put->ufid, put->stats, put->actions,
1779 put->actions_len);
1780 ds_destroy(&s);
1781 }
1782 }
1783
1784 void
1785 log_flow_del_message(const struct dpif *dpif,
1786 const struct vlog_module *module,
1787 const struct dpif_flow_del *del,
1788 int error)
1789 {
1790 if (should_log_flow_message(module, error)) {
1791 log_flow_message(dpif, error, module, "flow_del",
1792 del->key, del->key_len,
1793 NULL, 0, del->ufid, !error ? del->stats : NULL,
1794 NULL, 0);
1795 }
1796 }
1797
1798 /* Logs that 'execute' was executed on 'dpif' and completed with errno 'error'
1799 * (0 for success). 'subexecute' should be true if the execution is a result
1800 * of breaking down a larger execution that needed help, false otherwise.
1801 *
1802 *
1803 * XXX In theory, the log message could be deceptive because this function is
1804 * called after the dpif_provider's '->execute' function, which is allowed to
1805 * modify execute->packet and execute->md. In practice, though:
1806 *
1807 * - dpif-netlink doesn't modify execute->packet or execute->md.
1808 *
1809 * - dpif-netdev does modify them but it is less likely to have problems
1810 * because it is built into ovs-vswitchd and cannot have version skew,
1811 * etc.
1812 *
1813 * It would still be better to avoid the potential problem. I don't know of a
1814 * good way to do that, though, that isn't expensive. */
1815 void
1816 log_execute_message(const struct dpif *dpif,
1817 const struct vlog_module *module,
1818 const struct dpif_execute *execute,
1819 bool subexecute, int error)
1820 {
1821 if (!(error ? VLOG_DROP_WARN(&error_rl) : VLOG_DROP_DBG(&dpmsg_rl))
1822 && !execute->probe) {
1823 struct ds ds = DS_EMPTY_INITIALIZER;
1824 char *packet;
1825 uint64_t stub[1024 / 8];
1826 struct ofpbuf md = OFPBUF_STUB_INITIALIZER(stub);
1827
1828 packet = ofp_packet_to_string(dp_packet_data(execute->packet),
1829 dp_packet_size(execute->packet),
1830 execute->packet->packet_type);
1831 odp_key_from_dp_packet(&md, execute->packet);
1832 ds_put_format(&ds, "%s: %sexecute ",
1833 dpif_name(dpif),
1834 (subexecute ? "sub-"
1835 : dpif_execute_needs_help(execute) ? "super-"
1836 : ""));
1837 format_odp_actions(&ds, execute->actions, execute->actions_len, NULL);
1838 if (error) {
1839 ds_put_format(&ds, " failed (%s)", ovs_strerror(error));
1840 }
1841 ds_put_format(&ds, " on packet %s", packet);
1842 ds_put_format(&ds, " with metadata ");
1843 odp_flow_format(md.data, md.size, NULL, 0, NULL, &ds, true);
1844 ds_put_format(&ds, " mtu %d", execute->mtu);
1845 vlog(module, error ? VLL_WARN : VLL_DBG, "%s", ds_cstr(&ds));
1846 ds_destroy(&ds);
1847 free(packet);
1848 ofpbuf_uninit(&md);
1849 }
1850 }
1851
1852 void
1853 log_flow_get_message(const struct dpif *dpif,
1854 const struct vlog_module *module,
1855 const struct dpif_flow_get *get,
1856 int error)
1857 {
1858 if (should_log_flow_message(module, error)) {
1859 log_flow_message(dpif, error, module, "flow_get",
1860 get->key, get->key_len,
1861 get->flow->mask, get->flow->mask_len,
1862 get->ufid, &get->flow->stats,
1863 get->flow->actions, get->flow->actions_len);
1864 }
1865 }
1866
1867 bool
1868 dpif_supports_tnl_push_pop(const struct dpif *dpif)
1869 {
1870 return dpif_is_netdev(dpif);
1871 }
1872
1873 /* Meters */
1874 void
1875 dpif_meter_get_features(const struct dpif *dpif,
1876 struct ofputil_meter_features *features)
1877 {
1878 memset(features, 0, sizeof *features);
1879 if (dpif->dpif_class->meter_get_features) {
1880 dpif->dpif_class->meter_get_features(dpif, features);
1881 }
1882 }
1883
1884 /* Adds or modifies meter identified by 'meter_id' in 'dpif'. If '*meter_id'
1885 * is UINT32_MAX, adds a new meter, otherwise modifies an existing meter.
1886 *
1887 * If meter is successfully added, sets '*meter_id' to the new meter's
1888 * meter number. */
1889 int
1890 dpif_meter_set(struct dpif *dpif, ofproto_meter_id *meter_id,
1891 struct ofputil_meter_config *config)
1892 {
1893 int error;
1894
1895 COVERAGE_INC(dpif_meter_set);
1896
1897 error = dpif->dpif_class->meter_set(dpif, meter_id, config);
1898 if (!error) {
1899 VLOG_DBG_RL(&dpmsg_rl, "%s: DPIF meter %"PRIu32" set",
1900 dpif_name(dpif), meter_id->uint32);
1901 } else {
1902 VLOG_WARN_RL(&error_rl, "%s: failed to set DPIF meter %"PRIu32": %s",
1903 dpif_name(dpif), meter_id->uint32, ovs_strerror(error));
1904 meter_id->uint32 = UINT32_MAX;
1905 }
1906 return error;
1907 }
1908
1909 int
1910 dpif_meter_get(const struct dpif *dpif, ofproto_meter_id meter_id,
1911 struct ofputil_meter_stats *stats, uint16_t n_bands)
1912 {
1913 int error;
1914
1915 COVERAGE_INC(dpif_meter_get);
1916
1917 error = dpif->dpif_class->meter_get(dpif, meter_id, stats, n_bands);
1918 if (!error) {
1919 VLOG_DBG_RL(&dpmsg_rl, "%s: DPIF meter %"PRIu32" get stats",
1920 dpif_name(dpif), meter_id.uint32);
1921 } else {
1922 VLOG_WARN_RL(&error_rl,
1923 "%s: failed to get DPIF meter %"PRIu32" stats: %s",
1924 dpif_name(dpif), meter_id.uint32, ovs_strerror(error));
1925 stats->packet_in_count = ~0;
1926 stats->byte_in_count = ~0;
1927 stats->n_bands = 0;
1928 }
1929 return error;
1930 }
1931
1932 int
1933 dpif_meter_del(struct dpif *dpif, ofproto_meter_id meter_id,
1934 struct ofputil_meter_stats *stats, uint16_t n_bands)
1935 {
1936 int error;
1937
1938 COVERAGE_INC(dpif_meter_del);
1939
1940 error = dpif->dpif_class->meter_del(dpif, meter_id, stats, n_bands);
1941 if (!error) {
1942 VLOG_DBG_RL(&dpmsg_rl, "%s: DPIF meter %"PRIu32" deleted",
1943 dpif_name(dpif), meter_id.uint32);
1944 } else {
1945 VLOG_WARN_RL(&error_rl,
1946 "%s: failed to delete DPIF meter %"PRIu32": %s",
1947 dpif_name(dpif), meter_id.uint32, ovs_strerror(error));
1948 if (stats) {
1949 stats->packet_in_count = ~0;
1950 stats->byte_in_count = ~0;
1951 stats->n_bands = 0;
1952 }
1953 }
1954 return error;
1955 }