X-Git-Url: http://git.onelab.eu/?a=blobdiff_plain;f=lib%2Fdpif.c;h=6407490def8ebf7f33f7f5876f5cb7030da0908b;hb=12333d665075b5a1042bac3916ed0df00e549266;hp=b36df5f48e615d526237732e5e5ce1449dadb4dc;hpb=d927b51cb493cfd169a3c9dd70531b19a06892b1;p=sliver-openvswitch.git diff --git a/lib/dpif.c b/lib/dpif.c index b36df5f48..6407490de 100644 --- a/lib/dpif.c +++ b/lib/dpif.c @@ -31,6 +31,7 @@ * derivatives without specific, written prior permission. */ +#include #include "dpif.h" #include @@ -40,11 +41,11 @@ #include #include -#include "buffer.h" #include "netlink.h" -#include "ofp-print.h" -#include "openflow-netlink.h" -#include "openflow.h" +#include "netlink-protocol.h" +#include "ofpbuf.h" +#include "openflow/openflow-netlink.h" +#include "openflow/openflow.h" #include "packets.h" #include "util.h" #include "xtoxll.h" @@ -52,6 +53,9 @@ #include "vlog.h" #define THIS_MODULE VLM_dpif +/* Not really much point in logging many dpif errors. */ +static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(5, 60); + /* The Generic Netlink family number used for OpenFlow. */ static int openflow_family; @@ -99,19 +103,21 @@ dpif_open(int dp_idx, bool subscribe, struct dpif *dp) void dpif_close(struct dpif *dp) { - nl_sock_destroy(dp->sock); + if (dp) { + nl_sock_destroy(dp->sock); + } } static const struct nl_policy openflow_policy[] = { [DP_GENL_A_DP_IDX] = { .type = NL_A_U32 }, [DP_GENL_A_OPENFLOW] = { .type = NL_A_UNSPEC, .min_len = sizeof(struct ofp_header), - .max_len = OFP_MAXLEN }, + .max_len = 65535 }, }; /* Tries to receive an openflow message from the kernel on 'sock'. If * successful, stores the received message into '*msgp' and returns 0. The - * caller is responsible for destroying the message with buffer_delete(). On + * caller is responsible for destroying the message with ofpbuf_delete(). On * failure, returns a positive errno value and stores a null pointer into * '*msgp'. * @@ -121,33 +127,37 @@ static const struct nl_policy openflow_policy[] = { * If 'wait' is true, dpif_recv_openflow waits for a message to be ready; * otherwise, returns EAGAIN if the 'sock' receive buffer is empty. */ int -dpif_recv_openflow(struct dpif *dp, struct buffer **bufferp, +dpif_recv_openflow(struct dpif *dp, struct ofpbuf **bufferp, bool wait) { struct nlattr *attrs[ARRAY_SIZE(openflow_policy)]; - struct buffer *buffer; + struct ofpbuf *buffer; struct ofp_header *oh; - size_t ofp_len; + uint16_t ofp_len; int retval; - *bufferp = NULL; + buffer = *bufferp = NULL; do { + ofpbuf_delete(buffer); retval = nl_sock_recv(dp->sock, &buffer, wait); - } while (retval == ENOBUFS || (!retval && nl_msg_nlmsgerr(buffer, NULL))); + } while (retval == ENOBUFS + || (!retval + && (nl_msg_nlmsgerr(buffer, NULL) + || nl_msg_nlmsghdr(buffer)->nlmsg_type == NLMSG_DONE))); if (retval) { if (retval != EAGAIN) { - VLOG_WARN("dpif_recv_openflow: %s", strerror(retval)); + VLOG_WARN_RL(&rl, "dpif_recv_openflow: %s", strerror(retval)); } return retval; } if (nl_msg_genlmsghdr(buffer) == NULL) { - VLOG_DBG("received packet too short for Generic Netlink"); + VLOG_DBG_RL(&rl, "received packet too short for Generic Netlink"); goto error; } if (nl_msg_nlmsghdr(buffer)->nlmsg_type != openflow_family) { - VLOG_DBG("received type (%"PRIu16") != openflow family (%d)", - nl_msg_nlmsghdr(buffer)->nlmsg_type, openflow_family); + VLOG_DBG_RL(&rl, "received type (%"PRIu16") != openflow family (%d)", + nl_msg_nlmsghdr(buffer)->nlmsg_type, openflow_family); goto error; } @@ -156,8 +166,9 @@ dpif_recv_openflow(struct dpif *dp, struct buffer **bufferp, goto error; } if (nl_attr_get_u32(attrs[DP_GENL_A_DP_IDX]) != dp->dp_idx) { - VLOG_WARN("received dp_idx (%"PRIu32") differs from expected (%d)", - nl_attr_get_u32(attrs[DP_GENL_A_DP_IDX]), dp->dp_idx); + VLOG_WARN_RL(&rl, "received dp_idx (%"PRIu32") differs from expected " + "(%d)", nl_attr_get_u32(attrs[DP_GENL_A_DP_IDX]), + dp->dp_idx); goto error; } @@ -165,15 +176,16 @@ dpif_recv_openflow(struct dpif *dp, struct buffer **bufferp, buffer->size = nl_attr_get_size(attrs[DP_GENL_A_OPENFLOW]); ofp_len = ntohs(oh->length); if (ofp_len != buffer->size) { - VLOG_WARN("ofp_header.length %"PRIu16" != attribute length %zu\n", - ofp_len, buffer->size); + VLOG_WARN_RL(&rl, + "ofp_header.length %"PRIu16" != attribute length %zu\n", + ofp_len, buffer->size); buffer->size = MIN(ofp_len, buffer->size); } *bufferp = buffer; return 0; error: - buffer_delete(buffer); + ofpbuf_delete(buffer); return EPROTO; } @@ -189,9 +201,11 @@ error: * for details). */ int -dpif_send_openflow(struct dpif *dp, struct buffer *buffer, bool wait) +dpif_send_openflow(struct dpif *dp, struct ofpbuf *buffer, bool wait) { - struct buffer hdr; + struct ofp_header *oh; + unsigned int dump_flag; + struct ofpbuf hdr; struct nlattr *nla; uint32_t fixed_buffer[64 / 4]; struct iovec iov[3]; @@ -199,12 +213,17 @@ dpif_send_openflow(struct dpif *dp, struct buffer *buffer, bool wait) int n_iov; int retval; - buffer_use(&hdr, fixed_buffer, sizeof fixed_buffer); + /* The reply to OFPT_STATS_REQUEST may be multiple segments long, so we + * need to specify NLM_F_DUMP in the request. */ + oh = ofpbuf_at_assert(buffer, 0, sizeof *oh); + dump_flag = oh->type == OFPT_STATS_REQUEST ? NLM_F_DUMP : 0; + + ofpbuf_use(&hdr, fixed_buffer, sizeof fixed_buffer); nl_msg_put_genlmsghdr(&hdr, dp->sock, 32, openflow_family, - NLM_F_REQUEST, DP_GENL_C_OPENFLOW, 1); + NLM_F_REQUEST | dump_flag, DP_GENL_C_OPENFLOW, 1); nl_msg_put_u32(&hdr, DP_GENL_A_DP_IDX, dp->dp_idx); - nla = buffer_put_uninit(&hdr, sizeof nla); - nla->nla_len = sizeof nla + buffer->size; + nla = ofpbuf_put_uninit(&hdr, sizeof *nla); + nla->nla_len = sizeof *nla + buffer->size; nla->nla_type = DP_GENL_A_OPENFLOW; pad_bytes = NLA_ALIGN(nla->nla_len) - nla->nla_len; nl_msg_nlmsghdr(&hdr)->nlmsg_len = hdr.size + buffer->size + pad_bytes; @@ -221,7 +240,7 @@ dpif_send_openflow(struct dpif *dp, struct buffer *buffer, bool wait) } retval = nl_sock_sendv(dp->sock, iov, n_iov, false); if (retval && retval != EAGAIN) { - VLOG_WARN("dpif_send_openflow: %s", strerror(retval)); + VLOG_WARN_RL(&rl, "dpif_send_openflow: %s", strerror(retval)); } return retval; } @@ -257,212 +276,6 @@ dpif_del_port(struct dpif *dp, const char *netdev) { return send_mgmt_command(dp, DP_GENL_C_DEL_PORT, netdev); } - -/* Prints a description of 'dp' to stdout. Returns 0 if successful, otherwise - * a positive errno value. */ -int -dpif_show(struct dpif *dp) -{ - static const struct nl_policy show_policy[] = { - [DP_GENL_A_DP_INFO] = { .type = NL_A_UNSPEC, - .min_len = sizeof(struct ofp_data_hello), - .max_len = SIZE_MAX }, - }; - - struct buffer request, *reply; - struct nlattr *attrs[ARRAY_SIZE(show_policy)]; - struct ofp_data_hello *odh; - int retval; - size_t len; - - buffer_init(&request, 0); - nl_msg_put_genlmsghdr(&request, dp->sock, 0, openflow_family, - NLM_F_REQUEST, DP_GENL_C_SHOW_DP, 1); - nl_msg_put_u32(&request, DP_GENL_A_DP_IDX, dp->dp_idx); - retval = nl_sock_transact(dp->sock, &request, &reply); - buffer_uninit(&request); - if (retval) { - return retval; - } - if (!nl_policy_parse(reply, show_policy, attrs, - ARRAY_SIZE(show_policy))) { - buffer_delete(reply); - return EPROTO; - } - - odh = (void *) nl_attr_get(attrs[DP_GENL_A_DP_INFO]); - if (odh->header.version != OFP_VERSION - || odh->header.type != OFPT_DATA_HELLO) { - VLOG_ERR("bad show query response (%"PRIu8",%"PRIu8")", - odh->header.version, odh->header.type); - buffer_delete(reply); - return EPROTO; - } - - len = nl_attr_get_size(attrs[DP_GENL_A_DP_INFO]); - ofp_print_data_hello(stdout, odh, len, 1); - - return retval; -} - -static const struct nl_policy table_policy[] = { - [DP_GENL_A_NUMTABLES] = { .type = NL_A_U32 }, - [DP_GENL_A_TABLE] = { .type = NL_A_UNSPEC }, -}; - -/* Writes a description of 'dp''s tables to stdout. Returns 0 if successful, - * otherwise a positive errno value. */ -int -dpif_dump_tables(struct dpif *dp) -{ - struct buffer request, *reply; - struct nlattr *attrs[ARRAY_SIZE(table_policy)]; - const struct ofp_table *tables; - int n_tables; - int i; - int retval; - - buffer_init(&request, 0); - nl_msg_put_genlmsghdr(&request, dp->sock, 0, openflow_family, - NLM_F_REQUEST, DP_GENL_C_QUERY_TABLE, 1); - nl_msg_put_u32(&request, DP_GENL_A_DP_IDX, dp->dp_idx); - retval = nl_sock_transact(dp->sock, &request, &reply); - buffer_uninit(&request); - if (retval) { - return retval; - } - if (!nl_policy_parse(reply, table_policy, attrs, - ARRAY_SIZE(table_policy))) { - buffer_delete(reply); - return EPROTO; - } - - tables = nl_attr_get(attrs[DP_GENL_A_TABLE]); - n_tables = (nl_attr_get_size(attrs[DP_GENL_A_TABLE]) - / sizeof(struct ofp_table)); - n_tables = MIN(n_tables, nl_attr_get_u32(attrs[DP_GENL_A_NUMTABLES])); - for (i = 0; i < n_tables; i++) { - const struct ofp_table *ot = &tables[i]; - if (ot->header.version != 1 || ot->header.type != OFPT_TABLE) { - VLOG_DBG("bad table query response (%"PRIu8",%"PRIu8")", - ot->header.version, ot->header.type); - retval = EPROTO; - break; - } - - ofp_print_table(stdout, ot); - fprintf(stdout,"\n"); - } - buffer_delete(reply); - - return retval; -} - -static const struct nl_policy flow_policy[] = { - [DP_GENL_A_TABLEIDX] = { .type = NL_A_U16 }, - [DP_GENL_A_NUMFLOWS] = { .type = NL_A_U32 }, - [DP_GENL_A_FLOW] = { .type = NL_A_UNSPEC }, -}; - -struct _dump_ofp_flow_mod -{ - struct ofp_flow_mod ofm; - struct ofp_action oa; -}; - -/* Writes a description of flows in the given 'table' in 'dp' to stdout. If - * 'match' is null, all flows in the table are written; otherwise, only - * matching flows are written. Returns 0 if successful, otherwise a positive - * errno value. */ -int -dpif_dump_flows(struct dpif *dp, int table, struct ofp_match *match) -{ - struct buffer request, *reply; - struct ofp_flow_mod *ofm; - int retval; - - buffer_init(&request, 0); - nl_msg_put_genlmsghdr(&request, dp->sock, 0, openflow_family, NLM_F_REQUEST, - DP_GENL_C_QUERY_FLOW, 1); - nl_msg_put_u32(&request, DP_GENL_A_DP_IDX, dp->dp_idx); - nl_msg_put_u16(&request, DP_GENL_A_TABLEIDX, table); - ofm = nl_msg_put_unspec_uninit(&request, DP_GENL_A_FLOW, sizeof *ofm); - memset(ofm, 0, sizeof *ofm); - ofm->header.version = 1; - ofm->header.type = OFPT_FLOW_MOD; - ofm->header.length = htons(sizeof ofm); - if (match) { - ofm->match = *match; - } else { - ofm->match.wildcards = htons(OFPFW_ALL); - } - retval = nl_sock_transact(dp->sock, &request, &reply); - buffer_uninit(&request); - if (retval) { - return retval; - } - - for (;;) { - struct nlattr *attrs[ARRAY_SIZE(flow_policy)]; - const struct _dump_ofp_flow_mod *flows, *ofm; - int n_flows; - - if (!nl_policy_parse(reply, flow_policy, attrs, - ARRAY_SIZE(flow_policy))) { - buffer_delete(reply); - return EPROTO; - } - n_flows = (nl_attr_get_size(attrs[DP_GENL_A_FLOW]) - / sizeof(struct ofp_flow_mod)); - n_flows = MIN(n_flows, nl_attr_get_u32(attrs[DP_GENL_A_NUMFLOWS])); - if (n_flows <= 0) { - break; - } - - flows = nl_attr_get(attrs[DP_GENL_A_FLOW]); - for (ofm = flows; ofm < &flows[n_flows]; ofm++) { - if (ofm->ofm.header.version != 1){ - VLOG_DBG("recv_dp_flow incorrect version"); - buffer_delete(reply); - return EPROTO; - } else if (ofm->ofm.header.type != OFPT_FLOW_MOD) { - VLOG_DBG("recv_fp_flow bad return message type"); - buffer_delete(reply); - return EPROTO; - } - - ofp_print_flow_mod(stdout, &ofm->ofm, - sizeof(struct ofp_flow_mod), 1); - putc('\n', stdout); - } - - buffer_delete(reply); - retval = nl_sock_recv(dp->sock, &reply, true); - if (retval) { - return retval; - } - } - return 0; -} - -/* Tells dp to send num_packets up through netlink for benchmarking*/ -int -dpif_benchmark_nl(struct dpif *dp, uint32_t num_packets, uint32_t packet_size) -{ - struct buffer request; - int retval; - - buffer_init(&request, 0); - nl_msg_put_genlmsghdr(&request, dp->sock, 0, openflow_family, - NLM_F_REQUEST, DP_GENL_C_BENCHMARK_NL, 1); - nl_msg_put_u32(&request, DP_GENL_A_DP_IDX, dp->dp_idx); - nl_msg_put_u32(&request, DP_GENL_A_NPACKETS, num_packets); - nl_msg_put_u32(&request, DP_GENL_A_PSIZE, packet_size); - retval = nl_sock_send(dp->sock, &request, true); - buffer_uninit(&request); - - return retval; -} static const struct nl_policy openflow_multicast_policy[] = { [DP_GENL_A_DP_IDX] = { .type = NL_A_U32 }, @@ -476,7 +289,7 @@ static int lookup_openflow_multicast_group(int dp_idx, int *multicast_group) { struct nl_sock *sock; - struct buffer request, *reply; + struct ofpbuf request, *reply; struct nlattr *attrs[ARRAY_SIZE(openflow_multicast_policy)]; int retval; @@ -484,12 +297,12 @@ lookup_openflow_multicast_group(int dp_idx, int *multicast_group) if (retval) { return retval; } - buffer_init(&request, 0); + ofpbuf_init(&request, 0); nl_msg_put_genlmsghdr(&request, sock, 0, openflow_family, NLM_F_REQUEST, DP_GENL_C_QUERY_DP, 1); nl_msg_put_u32(&request, DP_GENL_A_DP_IDX, dp_idx); retval = nl_sock_transact(sock, &request, &reply); - buffer_uninit(&request); + ofpbuf_uninit(&request); if (retval) { nl_sock_destroy(sock); return retval; @@ -497,12 +310,12 @@ lookup_openflow_multicast_group(int dp_idx, int *multicast_group) if (!nl_policy_parse(reply, openflow_multicast_policy, attrs, ARRAY_SIZE(openflow_multicast_policy))) { nl_sock_destroy(sock); - buffer_delete(reply); + ofpbuf_delete(reply); return EPROTO; } *multicast_group = nl_attr_get_u32(attrs[DP_GENL_A_MC_GROUP]); nl_sock_destroy(sock); - buffer_delete(reply); + ofpbuf_delete(reply); return 0; } @@ -513,10 +326,10 @@ lookup_openflow_multicast_group(int dp_idx, int *multicast_group) static int send_mgmt_command(struct dpif *dp, int command, const char *netdev) { - struct buffer request, *reply; + struct ofpbuf request, *reply; int retval; - buffer_init(&request, 0); + ofpbuf_init(&request, 0); nl_msg_put_genlmsghdr(&request, dp->sock, 32, openflow_family, NLM_F_REQUEST | NLM_F_ACK, command, 1); nl_msg_put_u32(&request, DP_GENL_A_DP_IDX, dp->dp_idx); @@ -524,8 +337,8 @@ send_mgmt_command(struct dpif *dp, int command, const char *netdev) nl_msg_put_string(&request, DP_GENL_A_PORTNAME, netdev); } retval = nl_sock_transact(dp->sock, &request, &reply); - buffer_uninit(&request); - buffer_delete(reply); + ofpbuf_uninit(&request); + ofpbuf_delete(reply); return retval; }