X-Git-Url: http://git.onelab.eu/?a=blobdiff_plain;f=lib%2Fvconn.c;h=6c77d060c7589bc01c38340e07b0b46cdb9c0dc6;hb=de6c85b0a2e61105d288c23b718f6599761c2a2e;hp=ec0ac4e154022d5be2031f1e72d5226f8957fd28;hpb=d295e8e97acae13552a5b220d3fbcff8201064a2;p=sliver-openvswitch.git diff --git a/lib/vconn.c b/lib/vconn.c index ec0ac4e15..6c77d060c 100644 --- a/lib/vconn.c +++ b/lib/vconn.c @@ -1,5 +1,5 @@ /* - * Copyright (c) 2008, 2009, 2010 Nicira Networks. + * Copyright (c) 2008, 2009, 2010, 2011, 2012 Nicira, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -27,6 +27,8 @@ #include "dynamic-string.h" #include "fatal-signal.h" #include "flow.h" +#include "ofp-errors.h" +#include "ofp-msgs.h" #include "ofp-print.h" #include "ofp-util.h" #include "ofpbuf.h" @@ -37,8 +39,13 @@ #include "random.h" #include "util.h" #include "vlog.h" +#include "socket-util.h" -VLOG_DEFINE_THIS_MODULE(vconn) +VLOG_DEFINE_THIS_MODULE(vconn); + +COVERAGE_DEFINE(vconn_open); +COVERAGE_DEFINE(vconn_received); +COVERAGE_DEFINE(vconn_sent); /* State of an active vconn.*/ enum vconn_state { @@ -131,10 +138,10 @@ vconn_usage(bool active, bool passive, bool bootstrap OVS_UNUSED) printf("\n"); if (active) { printf("Active OpenFlow connection methods:\n"); - printf(" tcp:IP[:PORT] " + printf(" tcp:IP[:PORT] " "PORT (default: %d) at remote IP\n", OFP_TCP_PORT); #ifdef HAVE_OPENSSL - printf(" ssl:IP[:PORT] " + printf(" ssl:IP[:PORT] " "SSL PORT (default: %d) at remote IP\n", OFP_SSL_PORT); #endif printf(" unix:FILE Unix domain socket named FILE\n"); @@ -208,13 +215,16 @@ vconn_verify_name(const char *name) * * The vconn will automatically negotiate an OpenFlow protocol version * acceptable to both peers on the connection. The version negotiated will be - * no lower than 'min_version' and no higher than OFP_VERSION. + * one of those in the 'allowed_versions' bitmap: version 'x' is allowed if + * allowed_versions & (1 << x) is nonzero. If 'allowed_versions' is zero, then + * OFPUTIL_DEFAULT_VERSIONS are allowed. * * Returns 0 if successful, otherwise a positive errno value. If successful, * stores a pointer to the new connection in '*vconnp', otherwise a null * pointer. */ int -vconn_open(const char *name, int min_version, struct vconn **vconnp) +vconn_open(const char *name, uint32_t allowed_versions, + struct vconn **vconnp, uint8_t dscp) { struct vconn_class *class; struct vconn *vconn; @@ -224,6 +234,10 @@ vconn_open(const char *name, int min_version, struct vconn **vconnp) COVERAGE_INC(vconn_open); check_vconn_classes(); + if (!allowed_versions) { + allowed_versions = OFPUTIL_DEFAULT_VERSIONS; + } + /* Look up the class. */ error = vconn_lookup_class(name, &class); if (!class) { @@ -232,7 +246,7 @@ vconn_open(const char *name, int min_version, struct vconn **vconnp) /* Call class's "open" function. */ suffix_copy = xstrdup(strchr(name, ':') + 1); - error = class->open(name, suffix_copy, &vconn); + error = class->open(name, allowed_versions, suffix_copy, &vconn, dscp); free(suffix_copy); if (error) { goto error; @@ -240,7 +254,6 @@ vconn_open(const char *name, int min_version, struct vconn **vconnp) /* Success. */ assert(vconn->state != VCS_CONNECTING || vconn->class->connect); - vconn->min_version = min_version; *vconnp = vconn; return 0; @@ -254,6 +267,12 @@ error: void vconn_run(struct vconn *vconn) { + if (vconn->state == VCS_CONNECTING || + vconn->state == VCS_SEND_HELLO || + vconn->state == VCS_RECV_HELLO) { + vconn_connect(vconn); + } + if (vconn->class->run) { (vconn->class->run)(vconn); } @@ -264,28 +283,29 @@ vconn_run(struct vconn *vconn) void vconn_run_wait(struct vconn *vconn) { + if (vconn->state == VCS_CONNECTING || + vconn->state == VCS_SEND_HELLO || + vconn->state == VCS_RECV_HELLO) { + vconn_connect_wait(vconn); + } + if (vconn->class->run_wait) { (vconn->class->run_wait)(vconn); } } int -vconn_open_block(const char *name, int min_version, struct vconn **vconnp) +vconn_open_block(const char *name, uint32_t allowed_versions, + struct vconn **vconnp) { struct vconn *vconn; int error; fatal_signal_run(); - error = vconn_open(name, min_version, &vconn); + error = vconn_open(name, allowed_versions, &vconn, DSCP_DEFAULT); if (!error) { - while ((error == vconn_connect(vconn)) == EAGAIN) { - vconn_run(vconn); - vconn_run_wait(vconn); - vconn_connect_wait(vconn); - poll_block(); - } - assert(error != EINPROGRESS); + error = vconn_connect_block(vconn); } if (error) { @@ -315,9 +335,17 @@ vconn_get_name(const struct vconn *vconn) return vconn->name; } +/* Returns the allowed_versions of 'vconn', that is, + * the allowed_versions passed to vconn_open(). */ +uint32_t +vconn_get_allowed_versions(const struct vconn *vconn) +{ + return vconn->allowed_versions; +} + /* Returns the IP address of the peer, or 0 if the peer is not connected over * an IP-based protocol or if its IP address is not yet known. */ -uint32_t +ovs_be32 vconn_get_remote_ip(const struct vconn *vconn) { return vconn->remote_ip; @@ -325,7 +353,7 @@ vconn_get_remote_ip(const struct vconn *vconn) /* Returns the transport port of the peer, or 0 if the connection does not * contain a port or if the port is not yet known. */ -uint16_t +ovs_be16 vconn_get_remote_port(const struct vconn *vconn) { return vconn->remote_port; @@ -334,7 +362,7 @@ vconn_get_remote_port(const struct vconn *vconn) /* Returns the IP address used to connect to the peer, or 0 if the * connection is not an IP-based protocol or if its IP address is not * yet known. */ -uint32_t +ovs_be32 vconn_get_local_ip(const struct vconn *vconn) { return vconn->local_ip; @@ -342,12 +370,23 @@ vconn_get_local_ip(const struct vconn *vconn) /* Returns the transport port used to connect to the peer, or 0 if the * connection does not contain a port or if the port is not yet known. */ -uint16_t +ovs_be16 vconn_get_local_port(const struct vconn *vconn) { return vconn->local_port; } +/* Returns the OpenFlow version negotiated with the peer, or -1 if version + * negotiation is not yet complete. + * + * A vconn that has successfully connected (that is, vconn_connect() or + * vconn_send() or vconn_recv() has returned 0) always negotiated a version. */ +int +vconn_get_version(const struct vconn *vconn) +{ + return vconn->version ? vconn->version : -1; +} + static void vcs_connecting(struct vconn *vconn) { @@ -367,7 +406,7 @@ vcs_send_hello(struct vconn *vconn) struct ofpbuf *b; int retval; - make_openflow(sizeof(struct ofp_header), OFPT_HELLO, &b); + b = ofputil_encode_hello(vconn->allowed_versions); retval = do_send(vconn, b); if (!retval) { vconn->state = VCS_RECV_HELLO; @@ -380,6 +419,28 @@ vcs_send_hello(struct vconn *vconn) } } +static char * +version_bitmap_to_string(uint32_t bitmap) +{ + struct ds s; + + ds_init(&s); + if (!bitmap) { + ds_put_cstr(&s, "no versions"); + } else if (is_pow2(bitmap)) { + ds_put_cstr(&s, "version "); + ofputil_format_version(&s, leftmost_1bit_idx(bitmap)); + } else if (is_pow2((bitmap >> 1) + 1)) { + ds_put_cstr(&s, "version "); + ofputil_format_version(&s, leftmost_1bit_idx(bitmap)); + ds_put_cstr(&s, "and earlier"); + } else { + ds_put_cstr(&s, "versions "); + ofputil_format_version_bitmap(&s, bitmap); + } + return ds_steal_cstr(&s); +} + static void vcs_recv_hello(struct vconn *vconn) { @@ -388,34 +449,45 @@ vcs_recv_hello(struct vconn *vconn) retval = do_recv(vconn, &b); if (!retval) { - struct ofp_header *oh = b->data; + enum ofptype type; + enum ofperr error; + + error = ofptype_decode(&type, b->data); + if (!error && type == OFPTYPE_HELLO) { + char *peer_s, *local_s; + uint32_t common_versions; - if (oh->type == OFPT_HELLO) { - if (b->size > sizeof *oh) { + if (!ofputil_decode_hello(b->data, &vconn->peer_versions)) { struct ds msg = DS_EMPTY_INITIALIZER; - ds_put_format(&msg, "%s: extra-long hello:\n", vconn->name); + ds_put_format(&msg, "%s: unknown data in hello:\n", + vconn->name); ds_put_hex_dump(&msg, b->data, b->size, 0, true); VLOG_WARN_RL(&bad_ofmsg_rl, "%s", ds_cstr(&msg)); ds_destroy(&msg); } - vconn->version = MIN(OFP_VERSION, oh->version); - if (vconn->version < vconn->min_version) { + local_s = version_bitmap_to_string(vconn->allowed_versions); + peer_s = version_bitmap_to_string(vconn->peer_versions); + + common_versions = vconn->peer_versions & vconn->allowed_versions; + if (!common_versions) { + vconn->version = leftmost_1bit_idx(vconn->peer_versions); VLOG_WARN_RL(&bad_ofmsg_rl, - "%s: version negotiation failed: we support " - "versions 0x%02x to 0x%02x inclusive but peer " - "supports no later than version 0x%02"PRIx8, - vconn->name, vconn->min_version, OFP_VERSION, - oh->version); + "%s: version negotiation failed (we support " + "%s, peer supports %s)", + vconn->name, local_s, peer_s); vconn->state = VCS_SEND_ERROR; } else { + vconn->version = leftmost_1bit_idx(common_versions); VLOG_DBG("%s: negotiated OpenFlow version 0x%02x " - "(we support versions 0x%02x to 0x%02x inclusive, " - "peer no later than version 0x%02"PRIx8")", - vconn->name, vconn->version, vconn->min_version, - OFP_VERSION, oh->version); + "(we support %s, peer supports %s)", vconn->name, + vconn->version, local_s, peer_s); vconn->state = VCS_CONNECTED; } + + free(local_s); + free(peer_s); + ofpbuf_delete(b); return; } else { @@ -438,19 +510,19 @@ vcs_recv_hello(struct vconn *vconn) static void vcs_send_error(struct vconn *vconn) { - struct ofp_error_msg *error; struct ofpbuf *b; char s[128]; int retval; + char *local_s, *peer_s; - snprintf(s, sizeof s, "We support versions 0x%02x to 0x%02x inclusive but " - "you support no later than version 0x%02"PRIx8".", - vconn->min_version, OFP_VERSION, vconn->version); - error = make_openflow(sizeof *error, OFPT_ERROR, &b); - error->type = htons(OFPET_HELLO_FAILED); - error->code = htons(OFPHFC_INCOMPATIBLE); - ofpbuf_put(b, s, strlen(s)); - update_openflow_length(b); + local_s = version_bitmap_to_string(vconn->allowed_versions); + peer_s = version_bitmap_to_string(vconn->peer_versions); + snprintf(s, sizeof s, "We support %s, you support %s, no common versions.", + local_s, peer_s); + free(peer_s); + free(local_s); + + b = ofperr_encode_hello(OFPERR_OFPHFC_INCOMPATIBLE, vconn->version, s); retval = do_send(vconn, b); if (retval) { ofpbuf_delete(b); @@ -470,7 +542,6 @@ vconn_connect(struct vconn *vconn) { enum vconn_state last_state; - assert(vconn->min_version >= 0); do { last_state = vconn->state; switch (vconn->state) { @@ -515,10 +586,33 @@ vconn_connect(struct vconn *vconn) int vconn_recv(struct vconn *vconn, struct ofpbuf **msgp) { - int retval = vconn_connect(vconn); + struct ofpbuf *msg; + int retval; + + retval = vconn_connect(vconn); if (!retval) { - retval = do_recv(vconn, msgp); + retval = do_recv(vconn, &msg); + } + if (!retval) { + const struct ofp_header *oh = msg->data; + if (oh->version != vconn->version) { + enum ofptype type; + + if (ofptype_decode(&type, msg->data) + || (type != OFPTYPE_HELLO && + type != OFPTYPE_ERROR && + type != OFPTYPE_ECHO_REQUEST && + type != OFPTYPE_ECHO_REPLY)) { + VLOG_ERR_RL(&bad_ofmsg_rl, "%s: received OpenFlow version " + "0x%02"PRIx8" != expected %02x", + vconn->name, oh->version, vconn->version); + ofpbuf_delete(msg); + retval = EPROTO; + } + } } + + *msgp = retval ? NULL : msg; return retval; } @@ -527,40 +621,12 @@ do_recv(struct vconn *vconn, struct ofpbuf **msgp) { int retval = (vconn->class->recv)(vconn, msgp); if (!retval) { - struct ofp_header *oh; - COVERAGE_INC(vconn_received); if (VLOG_IS_DBG_ENABLED()) { char *s = ofp_to_string((*msgp)->data, (*msgp)->size, 1); VLOG_DBG_RL(&ofmsg_rl, "%s: received: %s", vconn->name, s); free(s); } - - oh = ofpbuf_at_assert(*msgp, 0, sizeof *oh); - if (oh->version != vconn->version - && oh->type != OFPT_HELLO - && oh->type != OFPT_ERROR - && oh->type != OFPT_ECHO_REQUEST - && oh->type != OFPT_ECHO_REPLY - && oh->type != OFPT_VENDOR) - { - if (vconn->version < 0) { - VLOG_ERR_RL(&bad_ofmsg_rl, - "%s: received OpenFlow message type %"PRIu8" " - "before version negotiation complete", - vconn->name, oh->type); - } else { - VLOG_ERR_RL(&bad_ofmsg_rl, - "%s: received OpenFlow version 0x%02"PRIx8" " - "!= expected %02x", - vconn->name, oh->version, vconn->version); - } - ofpbuf_delete(*msgp); - retval = EPROTO; - } - } - if (retval) { - *msgp = NULL; } return retval; } @@ -591,7 +657,8 @@ do_send(struct vconn *vconn, struct ofpbuf *msg) int retval; assert(msg->size >= sizeof(struct ofp_header)); - assert(((struct ofp_header *) msg->data)->length == htons(msg->size)); + + ofpmsg_update_length(msg); if (!VLOG_IS_DBG_ENABLED()) { COVERAGE_INC(vconn_sent); retval = (vconn->class->send)(vconn, msg); @@ -607,6 +674,24 @@ do_send(struct vconn *vconn, struct ofpbuf *msg) return retval; } +/* Same as vconn_connect(), except that it waits until the connection on + * 'vconn' completes or fails. Thus, it will never return EAGAIN. */ +int +vconn_connect_block(struct vconn *vconn) +{ + int error; + + while ((error = vconn_connect(vconn)) == EAGAIN) { + vconn_run(vconn); + vconn_run_wait(vconn); + vconn_connect_wait(vconn); + poll_block(); + } + assert(error != EINPROGRESS); + + return error; +} + /* Same as vconn_send, except that it waits until 'msg' can be transmitted. */ int vconn_send_block(struct vconn *vconn, struct ofpbuf *msg) @@ -648,10 +733,10 @@ vconn_recv_block(struct vconn *vconn, struct ofpbuf **msgp) * * 'request' is always destroyed, regardless of the return value. */ int -vconn_recv_xid(struct vconn *vconn, uint32_t xid, struct ofpbuf **replyp) +vconn_recv_xid(struct vconn *vconn, ovs_be32 xid, struct ofpbuf **replyp) { for (;;) { - uint32_t recv_xid; + ovs_be32 recv_xid; struct ofpbuf *reply; int error; @@ -667,7 +752,8 @@ vconn_recv_xid(struct vconn *vconn, uint32_t xid, struct ofpbuf **replyp) } VLOG_DBG_RL(&bad_ofmsg_rl, "%s: received reply with xid %08"PRIx32 - " != expected %08"PRIx32, vconn->name, recv_xid, xid); + " != expected %08"PRIx32, + vconn->name, ntohl(recv_xid), ntohl(xid)); ofpbuf_delete(reply); } } @@ -677,12 +763,16 @@ vconn_recv_xid(struct vconn *vconn, uint32_t xid, struct ofpbuf **replyp) * is stored in '*replyp' for the caller to examine and free. Otherwise * returns a positive errno value, or EOF, and sets '*replyp' to null. * + * 'request' should be an OpenFlow request that requires a reply. Otherwise, + * if there is no reply, this function can end up blocking forever (or until + * the peer drops the connection). + * * 'request' is always destroyed, regardless of the return value. */ int vconn_transact(struct vconn *vconn, struct ofpbuf *request, struct ofpbuf **replyp) { - uint32_t send_xid = ((struct ofp_header *) request->data)->xid; + ovs_be32 send_xid = ((struct ofp_header *) request->data)->xid; int error; *replyp = NULL; @@ -693,6 +783,104 @@ vconn_transact(struct vconn *vconn, struct ofpbuf *request, return error ? error : vconn_recv_xid(vconn, send_xid, replyp); } +/* Sends 'request' followed by a barrier request to 'vconn', then blocks until + * it receives a reply to the barrier. If successful, stores the reply to + * 'request' in '*replyp', if one was received, and otherwise NULL, then + * returns 0. Otherwise returns a positive errno value, or EOF, and sets + * '*replyp' to null. + * + * This function is useful for sending an OpenFlow request that doesn't + * ordinarily include a reply but might report an error in special + * circumstances. + * + * 'request' is always destroyed, regardless of the return value. */ +int +vconn_transact_noreply(struct vconn *vconn, struct ofpbuf *request, + struct ofpbuf **replyp) +{ + ovs_be32 request_xid; + ovs_be32 barrier_xid; + struct ofpbuf *barrier; + int error; + + *replyp = NULL; + + /* Send request. */ + request_xid = ((struct ofp_header *) request->data)->xid; + error = vconn_send_block(vconn, request); + if (error) { + ofpbuf_delete(request); + return error; + } + + /* Send barrier. */ + barrier = ofputil_encode_barrier_request(vconn_get_version(vconn)); + barrier_xid = ((struct ofp_header *) barrier->data)->xid; + error = vconn_send_block(vconn, barrier); + if (error) { + ofpbuf_delete(barrier); + return error; + } + + for (;;) { + struct ofpbuf *msg; + ovs_be32 msg_xid; + int error; + + error = vconn_recv_block(vconn, &msg); + if (error) { + ofpbuf_delete(*replyp); + *replyp = NULL; + return error; + } + + msg_xid = ((struct ofp_header *) msg->data)->xid; + if (msg_xid == request_xid) { + if (*replyp) { + VLOG_WARN_RL(&bad_ofmsg_rl, "%s: duplicate replies with " + "xid %08"PRIx32, vconn->name, ntohl(msg_xid)); + ofpbuf_delete(*replyp); + } + *replyp = msg; + } else { + ofpbuf_delete(msg); + if (msg_xid == barrier_xid) { + return 0; + } else { + VLOG_DBG_RL(&bad_ofmsg_rl, "%s: reply with xid %08"PRIx32 + " != expected %08"PRIx32" or %08"PRIx32, + vconn->name, ntohl(msg_xid), + ntohl(request_xid), ntohl(barrier_xid)); + } + } + } +} + +/* vconn_transact_noreply() for a list of "struct ofpbuf"s, sent one by one. + * All of the requests on 'requests' are always destroyed, regardless of the + * return value. */ +int +vconn_transact_multiple_noreply(struct vconn *vconn, struct list *requests, + struct ofpbuf **replyp) +{ + struct ofpbuf *request, *next; + + LIST_FOR_EACH_SAFE (request, next, list_node, requests) { + int error; + + list_remove(&request->list_node); + + error = vconn_transact_noreply(vconn, request, replyp); + if (error || *replyp) { + ofpbuf_list_delete(requests); + return error; + } + } + + *replyp = NULL; + return 0; +} + void vconn_wait(struct vconn *vconn, enum vconn_wait_type wait) { @@ -780,11 +968,18 @@ pvconn_verify_name(const char *name) * connection name in the form "TYPE:ARGS", where TYPE is an passive vconn * class's name and ARGS are vconn class-specific. * + * vconns accepted by the pvconn will automatically negotiate an OpenFlow + * protocol version acceptable to both peers on the connection. The version + * negotiated will be one of those in the 'allowed_versions' bitmap: version + * 'x' is allowed if allowed_versions & (1 << x) is nonzero. If + * 'allowed_versions' is zero, then OFPUTIL_DEFAULT_VERSIONS are allowed. + * * Returns 0 if successful, otherwise a positive errno value. If successful, * stores a pointer to the new connection in '*pvconnp', otherwise a null * pointer. */ int -pvconn_open(const char *name, struct pvconn **pvconnp) +pvconn_open(const char *name, uint32_t allowed_versions, + struct pvconn **pvconnp, uint8_t dscp) { struct pvconn_class *class; struct pvconn *pvconn; @@ -793,6 +988,10 @@ pvconn_open(const char *name, struct pvconn **pvconnp) check_vconn_classes(); + if (!allowed_versions) { + allowed_versions = OFPUTIL_DEFAULT_VERSIONS; + } + /* Look up the class. */ error = pvconn_lookup_class(name, &class); if (!class) { @@ -801,7 +1000,7 @@ pvconn_open(const char *name, struct pvconn **pvconnp) /* Call class's "open" function. */ suffix_copy = xstrdup(strchr(name, ':') + 1); - error = class->listen(name, suffix_copy, &pvconn); + error = class->listen(name, allowed_versions, suffix_copy, &pvconn, dscp); free(suffix_copy); if (error) { goto error; @@ -841,12 +1040,12 @@ pvconn_close(struct pvconn *pvconn) * * The new vconn will automatically negotiate an OpenFlow protocol version * acceptable to both peers on the connection. The version negotiated will be - * no lower than 'min_version' and no higher than OFP_VERSION. + * no lower than 'min_version' and no higher than 'max_version'. * * pvconn_accept() will not block waiting for a connection. If no connection * is ready to be accepted, it returns EAGAIN immediately. */ int -pvconn_accept(struct pvconn *pvconn, int min_version, struct vconn **new_vconn) +pvconn_accept(struct pvconn *pvconn, struct vconn **new_vconn) { int retval = (pvconn->class->accept)(pvconn, new_vconn); if (retval) { @@ -854,7 +1053,6 @@ pvconn_accept(struct pvconn *pvconn, int min_version, struct vconn **new_vconn) } else { assert((*new_vconn)->state != VCS_CONNECTING || (*new_vconn)->class->connect); - (*new_vconn)->min_version = min_version; } return retval; } @@ -884,15 +1082,15 @@ pvconn_wait(struct pvconn *pvconn) * The caller retains ownership of 'name'. */ void vconn_init(struct vconn *vconn, struct vconn_class *class, int connect_status, - const char *name) + const char *name, uint32_t allowed_versions) { vconn->class = class; vconn->state = (connect_status == EAGAIN ? VCS_CONNECTING : !connect_status ? VCS_SEND_HELLO : VCS_DISCONNECTED); vconn->error = connect_status; - vconn->version = -1; - vconn->min_version = -1; + vconn->version = 0; + vconn->allowed_versions = allowed_versions; vconn->remote_ip = 0; vconn->remote_port = 0; vconn->local_ip = 0; @@ -902,33 +1100,34 @@ vconn_init(struct vconn *vconn, struct vconn_class *class, int connect_status, } void -vconn_set_remote_ip(struct vconn *vconn, uint32_t ip) +vconn_set_remote_ip(struct vconn *vconn, ovs_be32 ip) { vconn->remote_ip = ip; } void -vconn_set_remote_port(struct vconn *vconn, uint16_t port) +vconn_set_remote_port(struct vconn *vconn, ovs_be16 port) { vconn->remote_port = port; } void -vconn_set_local_ip(struct vconn *vconn, uint32_t ip) +vconn_set_local_ip(struct vconn *vconn, ovs_be32 ip) { vconn->local_ip = ip; } void -vconn_set_local_port(struct vconn *vconn, uint16_t port) +vconn_set_local_port(struct vconn *vconn, ovs_be16 port) { vconn->local_port = port; } void -pvconn_init(struct pvconn *pvconn, struct pvconn_class *class, - const char *name) +pvconn_init(struct pvconn *pvconn, struct pvconn_class *class, + const char *name, uint32_t allowed_versions) { pvconn->class = class; pvconn->name = xstrdup(name); + pvconn->allowed_versions = allowed_versions; }