2 * Copyright (c) 2014 VMware, Inc.
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at:
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
32 #define OVS_DBG_MOD OVS_DBG_VPORT
35 #define VPORT_NIC_ENTER(_nic) \
36 OVS_LOG_TRACE("Enter: PortId: %x, NicIndex: %d", _nic->PortId, \
39 #define VPORT_NIC_EXIT(_nic) \
40 OVS_LOG_TRACE("Exit: PortId: %x, NicIndex: %d", _nic->PortId, \
43 #define VPORT_PORT_ENTER(_port) \
44 OVS_LOG_TRACE("Enter: PortId: %x", _port->PortId)
46 #define VPORT_PORT_EXIT(_port) \
47 OVS_LOG_TRACE("Exit: PortId: %x", _port->PortId)
49 #define OVS_VPORT_DEFAULT_WAIT_TIME_MICROSEC 100
51 /* Context structure used to pass back and forth information to the tunnel
53 typedef struct _OVS_TUNFLT_INIT_CONTEXT {
54 POVS_SWITCH_CONTEXT switchContext;
58 POVS_VPORT_ENTRY vport;
62 } OVS_TUNFLT_INIT_CONTEXT, *POVS_TUNFLT_INIT_CONTEXT;
65 extern POVS_SWITCH_CONTEXT gOvsSwitchContext;
67 static VOID OvsInitVportWithPortParam(POVS_VPORT_ENTRY vport,
68 PNDIS_SWITCH_PORT_PARAMETERS portParam);
69 static VOID OvsInitVportWithNicParam(POVS_SWITCH_CONTEXT switchContext,
70 POVS_VPORT_ENTRY vport, PNDIS_SWITCH_NIC_PARAMETERS nicParam);
71 static VOID OvsInitPhysNicVport(POVS_VPORT_ENTRY physExtVPort,
72 POVS_VPORT_ENTRY virtExtVport, UINT32 nicIndex);
73 static __inline VOID OvsWaitActivate(POVS_SWITCH_CONTEXT switchContext,
75 static NTSTATUS OvsGetExtInfoIoctl(POVS_VPORT_GET vportGet,
76 POVS_VPORT_EXT_INFO extInfo);
77 static NTSTATUS CreateNetlinkMesgForNetdev(POVS_VPORT_EXT_INFO info,
82 static POVS_VPORT_ENTRY OvsFindVportByHvNameW(POVS_SWITCH_CONTEXT switchContext,
83 PWSTR wsName, SIZE_T wstrSize);
84 static NDIS_STATUS InitHvVportCommon(POVS_SWITCH_CONTEXT switchContext,
85 POVS_VPORT_ENTRY vport,
87 static NTSTATUS OvsRemoveTunnelVport(POVS_USER_PARAMS_CONTEXT usrParamsCtx,
88 POVS_SWITCH_CONTEXT switchContext,
89 POVS_VPORT_ENTRY vport,
92 static VOID OvsTunnelVportPendingInit(PVOID context,
95 static VOID OvsTunnelVportPendingRemove(PVOID context,
98 static VOID AssignNicNameSpecial(POVS_VPORT_ENTRY vport);
101 * Functions implemented in relaton to NDIS port manipulation.
104 HvCreatePort(POVS_SWITCH_CONTEXT switchContext,
105 PNDIS_SWITCH_PORT_PARAMETERS portParam)
107 POVS_VPORT_ENTRY vport;
108 LOCK_STATE_EX lockState;
109 NDIS_STATUS status = NDIS_STATUS_SUCCESS;
110 BOOLEAN newPort = FALSE;
112 VPORT_PORT_ENTER(portParam);
114 NdisAcquireRWLockWrite(switchContext->dispatchLock, &lockState, 0);
115 /* Lookup by port ID. */
116 vport = OvsFindVportByPortIdAndNicIndex(switchContext,
117 portParam->PortId, 0);
119 OVS_LOG_ERROR("Port add failed due to duplicate port name, "
120 "port Id: %u", portParam->PortId);
121 status = STATUS_DATA_NOT_ACCEPTED;
122 goto create_port_done;
126 * Lookup by port name to see if this port with this name had been added
127 * (and deleted) previously.
129 vport = OvsFindVportByHvNameW(gOvsSwitchContext,
130 portParam->PortFriendlyName.String,
131 portParam->PortFriendlyName.Length);
132 if (vport && vport->isAbsentOnHv == FALSE) {
133 OVS_LOG_ERROR("Port add failed since a port already exists on "
134 "the specified port Id: %u, ovsName: %s",
135 portParam->PortId, vport->ovsName);
136 status = STATUS_DATA_NOT_ACCEPTED;
137 goto create_port_done;
141 ASSERT(vport->isAbsentOnHv);
142 ASSERT(vport->portNo != OVS_DPPORT_NUMBER_INVALID);
145 * It should be possible to simply just mark this port as "not deleted"
146 * given that the port Id and the name are the same and also provided
147 * that the other properties that we cache have not changed.
149 if (vport->portType != portParam->PortType) {
150 OVS_LOG_INFO("Port add failed due to PortType change, port Id: %u"
151 " old: %u, new: %u", portParam->PortId,
152 vport->portType, portParam->PortType);
153 status = STATUS_DATA_NOT_ACCEPTED;
154 goto create_port_done;
156 vport->isAbsentOnHv = FALSE;
158 vport = (POVS_VPORT_ENTRY)OvsAllocateVport();
160 status = NDIS_STATUS_RESOURCES;
161 goto create_port_done;
165 OvsInitVportWithPortParam(vport, portParam);
166 InitHvVportCommon(switchContext, vport, newPort);
169 NdisReleaseRWLock(switchContext->dispatchLock, &lockState);
170 VPORT_PORT_EXIT(portParam);
176 * Function updating the port properties
179 HvUpdatePort(POVS_SWITCH_CONTEXT switchContext,
180 PNDIS_SWITCH_PORT_PARAMETERS portParam)
182 POVS_VPORT_ENTRY vport;
183 LOCK_STATE_EX lockState;
184 OVS_VPORT_STATE ovsState;
185 NDIS_SWITCH_NIC_STATE nicState;
187 VPORT_PORT_ENTER(portParam);
189 NdisAcquireRWLockWrite(switchContext->dispatchLock, &lockState, 0);
190 vport = OvsFindVportByPortIdAndNicIndex(switchContext,
191 portParam->PortId, 0);
193 * Update properties only for NETDEV ports for supprting PS script
196 goto update_port_done;
199 /* Store the nic and the OVS states as Nic Create won't be called */
200 ovsState = vport->ovsState;
201 nicState = vport->nicState;
204 * Currently only the port friendly name is being updated
205 * Make sure that no other properties are changed
207 ASSERT(portParam->PortId == vport->portId);
208 ASSERT(portParam->PortState == vport->portState);
209 ASSERT(portParam->PortType == vport->portType);
212 * Call the set parameters function the handle all properties
213 * change in a single place in case future version supports change of
216 OvsInitVportWithPortParam(vport, portParam);
217 /* Retore the nic and OVS states */
218 vport->nicState = nicState;
219 vport->ovsState = ovsState;
222 NdisReleaseRWLock(switchContext->dispatchLock, &lockState);
223 VPORT_PORT_EXIT(portParam);
225 /* Must always return success */
226 return NDIS_STATUS_SUCCESS;
230 HvTeardownPort(POVS_SWITCH_CONTEXT switchContext,
231 PNDIS_SWITCH_PORT_PARAMETERS portParam)
233 POVS_VPORT_ENTRY vport;
234 LOCK_STATE_EX lockState;
236 VPORT_PORT_ENTER(portParam);
238 NdisAcquireRWLockWrite(switchContext->dispatchLock, &lockState, 0);
239 vport = OvsFindVportByPortIdAndNicIndex(switchContext,
240 portParam->PortId, 0);
242 /* add assertion here */
243 vport->portState = NdisSwitchPortStateTeardown;
244 vport->ovsState = OVS_STATE_PORT_TEAR_DOWN;
246 OVS_LOG_WARN("Vport not present.");
248 NdisReleaseRWLock(switchContext->dispatchLock, &lockState);
250 VPORT_PORT_EXIT(portParam);
255 HvDeletePort(POVS_SWITCH_CONTEXT switchContext,
256 PNDIS_SWITCH_PORT_PARAMETERS portParams)
258 POVS_VPORT_ENTRY vport;
259 LOCK_STATE_EX lockState;
261 VPORT_PORT_ENTER(portParams);
263 NdisAcquireRWLockWrite(switchContext->dispatchLock, &lockState, 0);
264 vport = OvsFindVportByPortIdAndNicIndex(switchContext,
265 portParams->PortId, 0);
268 * XXX: we can only destroy and remove the port if its datapath port
269 * counterpart was deleted. If the datapath port counterpart is present,
270 * we only mark the vport for deletion, so that a netlink command vport
271 * delete will delete the vport.
274 OvsRemoveAndDeleteVport(NULL, switchContext, vport, TRUE, FALSE);
276 OVS_LOG_WARN("Vport not present.");
278 NdisReleaseRWLock(switchContext->dispatchLock, &lockState);
280 VPORT_PORT_EXIT(portParams);
285 * Functions implemented in relaton to NDIS NIC manipulation.
288 HvCreateNic(POVS_SWITCH_CONTEXT switchContext,
289 PNDIS_SWITCH_NIC_PARAMETERS nicParam)
291 POVS_VPORT_ENTRY vport;
294 NDIS_STATUS status = NDIS_STATUS_SUCCESS;
296 LOCK_STATE_EX lockState;
298 VPORT_NIC_ENTER(nicParam);
300 /* Wait for lists to be initialized. */
301 OvsWaitActivate(switchContext, OVS_VPORT_DEFAULT_WAIT_TIME_MICROSEC);
303 if (!switchContext->isActivated) {
304 OVS_LOG_WARN("Switch is not activated yet.");
305 /* Veto the creation of nic */
306 status = NDIS_STATUS_NOT_SUPPORTED;
310 NdisAcquireRWLockWrite(switchContext->dispatchLock, &lockState, 0);
311 vport = OvsFindVportByPortIdAndNicIndex(switchContext, nicParam->PortId, 0);
313 OVS_LOG_ERROR("Create NIC without Switch Port,"
314 " PortId: %x, NicIndex: %d",
315 nicParam->PortId, nicParam->NicIndex);
316 status = NDIS_STATUS_INVALID_PARAMETER;
320 if (nicParam->NicType == NdisSwitchNicTypeExternal &&
321 nicParam->NicIndex != 0) {
322 POVS_VPORT_ENTRY virtExtVport =
323 (POVS_VPORT_ENTRY)switchContext->virtualExternalVport;
325 vport = OvsFindVportByPortIdAndNicIndex(switchContext,
329 /* Find by interface name */
330 WCHAR interfaceName[IF_MAX_STRING_SIZE] = { 0 };
331 NET_LUID interfaceLuid = { 0 };
333 status = ConvertInterfaceGuidToLuid(&nicParam->NetCfgInstanceId,
335 if (status == STATUS_SUCCESS) {
336 status = ConvertInterfaceLuidToAlias(&interfaceLuid,
338 IF_MAX_STRING_SIZE + 1);
339 if (status == STATUS_SUCCESS) {
340 RtlStringCbLengthW(interfaceName,
343 vport = OvsFindVportByHvNameW(switchContext,
350 /* XXX: Handle this event appropriately */
351 vport = (POVS_VPORT_ENTRY)OvsAllocateVport();
353 status = NDIS_STATUS_RESOURCES;
359 OvsInitPhysNicVport(vport, virtExtVport, nicParam->NicIndex);
360 OvsInitVportWithNicParam(switchContext, vport, nicParam);
361 status = InitHvVportCommon(switchContext, vport, TRUE);
362 vport->isAbsentOnHv = FALSE;
363 if (status != NDIS_STATUS_SUCCESS) {
364 OvsFreeMemoryWithTag(vport, OVS_VPORT_POOL_TAG);
368 OvsInitVportWithNicParam(switchContext, vport, nicParam);
370 portNo = vport->portNo;
371 if (vport->ovsState == OVS_STATE_CONNECTED) {
372 event = OVS_EVENT_CONNECT | OVS_EVENT_LINK_UP;
373 } else if (vport->ovsState == OVS_STATE_NIC_CREATED) {
374 event = OVS_EVENT_CONNECT;
378 NdisReleaseRWLock(switchContext->dispatchLock, &lockState);
379 if (portNo != OVS_DPPORT_NUMBER_INVALID && event) {
380 OvsPostEvent(portNo, event);
384 VPORT_NIC_EXIT(nicParam);
385 OVS_LOG_TRACE("Exit: status %8x.\n", status);
391 /* Mark already created NIC as connected. */
393 HvConnectNic(POVS_SWITCH_CONTEXT switchContext,
394 PNDIS_SWITCH_NIC_PARAMETERS nicParam)
396 LOCK_STATE_EX lockState;
397 POVS_VPORT_ENTRY vport;
400 VPORT_NIC_ENTER(nicParam);
402 /* Wait for lists to be initialized. */
403 OvsWaitActivate(switchContext, OVS_VPORT_DEFAULT_WAIT_TIME_MICROSEC);
405 if (!switchContext->isActivated) {
406 OVS_LOG_WARN("Switch is not activated yet.");
410 NdisAcquireRWLockWrite(switchContext->dispatchLock, &lockState, 0);
411 vport = OvsFindVportByPortIdAndNicIndex(switchContext,
416 OVS_LOG_WARN("Vport not present.");
417 NdisReleaseRWLock(switchContext->dispatchLock, &lockState);
422 vport->ovsState = OVS_STATE_CONNECTED;
423 vport->nicState = NdisSwitchNicStateConnected;
424 portNo = vport->portNo;
426 NdisReleaseRWLock(switchContext->dispatchLock, &lockState);
428 /* XXX only if portNo != INVALID or always? */
429 OvsPostEvent(portNo, OVS_EVENT_LINK_UP);
431 if (nicParam->NicType == NdisSwitchNicTypeInternal) {
432 OvsInternalAdapterUp(portNo, &nicParam->NetCfgInstanceId);
436 VPORT_NIC_EXIT(nicParam);
440 HvUpdateNic(POVS_SWITCH_CONTEXT switchContext,
441 PNDIS_SWITCH_NIC_PARAMETERS nicParam)
443 POVS_VPORT_ENTRY vport;
444 LOCK_STATE_EX lockState;
446 UINT32 status = 0, portNo = 0;
448 VPORT_NIC_ENTER(nicParam);
450 /* Wait for lists to be initialized. */
451 OvsWaitActivate(switchContext, OVS_VPORT_DEFAULT_WAIT_TIME_MICROSEC);
453 if (!switchContext->isActivated) {
454 OVS_LOG_WARN("Switch is not activated yet.");
455 goto update_nic_done;
458 NdisAcquireRWLockWrite(switchContext->dispatchLock, &lockState, 0);
459 vport = OvsFindVportByPortIdAndNicIndex(switchContext,
463 NdisReleaseRWLock(switchContext->dispatchLock, &lockState);
464 OVS_LOG_WARN("Vport search failed.");
465 goto update_nic_done;
467 switch (nicParam->NicType) {
468 case NdisSwitchNicTypeExternal:
469 case NdisSwitchNicTypeInternal:
470 RtlCopyMemory(&vport->netCfgInstanceId, &nicParam->NetCfgInstanceId,
472 AssignNicNameSpecial(vport);
474 case NdisSwitchNicTypeSynthetic:
475 case NdisSwitchNicTypeEmulated:
476 if (!RtlEqualMemory(vport->vmMacAddress, nicParam->VMMacAddress,
477 sizeof (vport->vmMacAddress))) {
478 status |= OVS_EVENT_MAC_CHANGE;
479 RtlCopyMemory(vport->vmMacAddress, nicParam->VMMacAddress,
480 sizeof (vport->vmMacAddress));
486 if (!RtlEqualMemory(vport->permMacAddress, nicParam->PermanentMacAddress,
487 sizeof (vport->permMacAddress))) {
488 RtlCopyMemory(vport->permMacAddress, nicParam->PermanentMacAddress,
489 sizeof (vport->permMacAddress));
490 status |= OVS_EVENT_MAC_CHANGE;
492 if (!RtlEqualMemory(vport->currMacAddress, nicParam->CurrentMacAddress,
493 sizeof (vport->currMacAddress))) {
494 RtlCopyMemory(vport->currMacAddress, nicParam->CurrentMacAddress,
495 sizeof (vport->currMacAddress));
496 status |= OVS_EVENT_MAC_CHANGE;
499 if (vport->mtu != nicParam->MTU) {
500 vport->mtu = nicParam->MTU;
501 status |= OVS_EVENT_MTU_CHANGE;
503 vport->numaNodeId = nicParam->NumaNodeId;
504 portNo = vport->portNo;
506 NdisReleaseRWLock(switchContext->dispatchLock, &lockState);
507 if (status && portNo) {
508 OvsPostEvent(portNo, status);
511 VPORT_NIC_EXIT(nicParam);
516 HvDisconnectNic(POVS_SWITCH_CONTEXT switchContext,
517 PNDIS_SWITCH_NIC_PARAMETERS nicParam)
519 POVS_VPORT_ENTRY vport;
521 LOCK_STATE_EX lockState;
522 BOOLEAN isInternalPort = FALSE;
524 VPORT_NIC_ENTER(nicParam);
526 /* Wait for lists to be initialized. */
527 OvsWaitActivate(switchContext, OVS_VPORT_DEFAULT_WAIT_TIME_MICROSEC);
529 if (!switchContext->isActivated) {
530 OVS_LOG_WARN("Switch is not activated yet.");
534 NdisAcquireRWLockWrite(switchContext->dispatchLock, &lockState, 0);
535 vport = OvsFindVportByPortIdAndNicIndex(switchContext,
540 OVS_LOG_WARN("Vport not present.");
541 NdisReleaseRWLock(switchContext->dispatchLock, &lockState);
545 vport->nicState = NdisSwitchNicStateDisconnected;
546 vport->ovsState = OVS_STATE_NIC_CREATED;
547 portNo = vport->portNo;
549 if (vport->ovsType == OVS_VPORT_TYPE_INTERNAL) {
550 isInternalPort = TRUE;
553 NdisReleaseRWLock(switchContext->dispatchLock, &lockState);
555 /* XXX if portNo != INVALID or always? */
556 OvsPostEvent(portNo, OVS_EVENT_LINK_DOWN);
558 if (isInternalPort) {
559 OvsInternalAdapterDown();
563 VPORT_NIC_EXIT(nicParam);
568 HvDeleteNic(POVS_SWITCH_CONTEXT switchContext,
569 PNDIS_SWITCH_NIC_PARAMETERS nicParam)
571 LOCK_STATE_EX lockState;
572 POVS_VPORT_ENTRY vport;
575 VPORT_NIC_ENTER(nicParam);
576 /* Wait for lists to be initialized. */
577 OvsWaitActivate(switchContext, OVS_VPORT_DEFAULT_WAIT_TIME_MICROSEC);
579 if (!switchContext->isActivated) {
580 OVS_LOG_WARN("Switch is not activated yet.");
584 NdisAcquireRWLockWrite(switchContext->dispatchLock, &lockState, 0);
585 vport = OvsFindVportByPortIdAndNicIndex(switchContext,
590 OVS_LOG_WARN("Vport not present.");
591 NdisReleaseRWLock(switchContext->dispatchLock, &lockState);
595 vport->nicState = NdisSwitchNicStateUnknown;
596 vport->ovsState = OVS_STATE_PORT_CREATED;
598 portNo = vport->portNo;
599 if (vport->portType == NdisSwitchPortTypeExternal &&
600 vport->nicIndex != 0) {
601 OvsRemoveAndDeleteVport(NULL, switchContext, vport, TRUE, FALSE);
604 NdisReleaseRWLock(switchContext->dispatchLock, &lockState);
605 /* XXX if portNo != INVALID or always? */
606 OvsPostEvent(portNo, OVS_EVENT_DISCONNECT);
609 VPORT_NIC_EXIT(nicParam);
614 * OVS Vport related functionality.
617 OvsFindVportByPortNo(POVS_SWITCH_CONTEXT switchContext,
620 POVS_VPORT_ENTRY vport;
621 PLIST_ENTRY head, link;
622 UINT32 hash = OvsJhashBytes((const VOID *)&portNo, sizeof(portNo),
624 head = &(switchContext->portNoHashArray[hash & OVS_VPORT_MASK]);
625 LIST_FORALL(head, link) {
626 vport = CONTAINING_RECORD(link, OVS_VPORT_ENTRY, portNoLink);
627 if (vport->portNo == portNo) {
636 OvsFindTunnelVportByDstPort(POVS_SWITCH_CONTEXT switchContext,
638 OVS_VPORT_TYPE ovsPortType)
640 POVS_VPORT_ENTRY vport;
641 PLIST_ENTRY head, link;
642 UINT32 hash = OvsJhashBytes((const VOID *)&dstPort, sizeof(dstPort),
644 head = &(switchContext->tunnelVportsArray[hash & OVS_VPORT_MASK]);
645 LIST_FORALL(head, link) {
646 vport = CONTAINING_RECORD(link, OVS_VPORT_ENTRY, tunnelVportLink);
647 if (GetPortFromPriv(vport) == dstPort &&
648 vport->ovsType == ovsPortType) {
657 OvsFindVportByOvsName(POVS_SWITCH_CONTEXT switchContext,
660 POVS_VPORT_ENTRY vport;
661 PLIST_ENTRY head, link;
663 SIZE_T length = strlen(name) + 1;
665 hash = OvsJhashBytes((const VOID *)name, length, OVS_HASH_BASIS);
666 head = &(switchContext->ovsPortNameHashArray[hash & OVS_VPORT_MASK]);
668 LIST_FORALL(head, link) {
669 vport = CONTAINING_RECORD(link, OVS_VPORT_ENTRY, ovsNameLink);
670 if (!strcmp(name, vport->ovsName)) {
678 /* OvsFindVportByHvName: "name" is assumed to be null-terminated */
680 OvsFindVportByHvNameW(POVS_SWITCH_CONTEXT switchContext,
681 PWSTR wsName, SIZE_T wstrSize)
683 POVS_VPORT_ENTRY vport = NULL;
684 PLIST_ENTRY head, link;
687 for (i = 0; i < OVS_MAX_VPORT_ARRAY_SIZE; i++) {
688 head = &(switchContext->portIdHashArray[i]);
689 LIST_FORALL(head, link) {
690 vport = CONTAINING_RECORD(link, OVS_VPORT_ENTRY, portIdLink);
693 * NOTE about portFriendlyName:
694 * If the string is NULL-terminated, the Length member does not
695 * include the terminating NULL character.
697 if (vport->portFriendlyName.Length == wstrSize &&
698 RtlEqualMemory(wsName, vport->portFriendlyName.String,
699 vport->portFriendlyName.Length)) {
708 * Look in the list of ports that were added from the Hyper-V switch and
712 for (i = 0; i < OVS_MAX_VPORT_ARRAY_SIZE; i++) {
713 head = &(switchContext->portNoHashArray[i]);
714 LIST_FORALL(head, link) {
715 vport = CONTAINING_RECORD(link, OVS_VPORT_ENTRY, portNoLink);
716 if (vport->portFriendlyName.Length == wstrSize &&
717 RtlEqualMemory(wsName, vport->portFriendlyName.String,
718 vport->portFriendlyName.Length)) {
732 OvsFindVportByHvNameA(POVS_SWITCH_CONTEXT switchContext,
735 POVS_VPORT_ENTRY vport = NULL;
736 /* 'portFriendlyName' is not NUL-terminated. */
737 SIZE_T length = strlen(name);
738 SIZE_T wstrSize = length * sizeof(WCHAR);
741 PWSTR wsName = OvsAllocateMemoryWithTag(wstrSize, OVS_VPORT_POOL_TAG);
745 for (i = 0; i < length; i++) {
748 vport = OvsFindVportByHvNameW(switchContext, wsName, wstrSize);
749 OvsFreeMemoryWithTag(wsName, OVS_VPORT_POOL_TAG);
754 OvsFindVportByPortIdAndNicIndex(POVS_SWITCH_CONTEXT switchContext,
755 NDIS_SWITCH_PORT_ID portId,
756 NDIS_SWITCH_NIC_INDEX index)
758 if (switchContext->virtualExternalVport &&
759 portId == switchContext->virtualExternalPortId &&
760 index == switchContext->virtualExternalVport->nicIndex) {
761 return (POVS_VPORT_ENTRY)switchContext->virtualExternalVport;
762 } else if (switchContext->internalVport &&
763 portId == switchContext->internalPortId &&
764 index == switchContext->internalVport->nicIndex) {
765 return (POVS_VPORT_ENTRY)switchContext->internalVport;
767 PLIST_ENTRY head, link;
768 POVS_VPORT_ENTRY vport;
770 hash = OvsJhashWords((UINT32 *)&portId, 1, OVS_HASH_BASIS);
771 head = &(switchContext->portIdHashArray[hash & OVS_VPORT_MASK]);
772 LIST_FORALL(head, link) {
773 vport = CONTAINING_RECORD(link, OVS_VPORT_ENTRY, portIdLink);
774 if (portId == vport->portId && index == vport->nicIndex) {
783 OvsAllocateVport(VOID)
785 POVS_VPORT_ENTRY vport;
786 vport = (POVS_VPORT_ENTRY)OvsAllocateMemoryWithTag(
787 sizeof(OVS_VPORT_ENTRY), OVS_VPORT_POOL_TAG);
791 RtlZeroMemory(vport, sizeof (OVS_VPORT_ENTRY));
792 vport->ovsState = OVS_STATE_UNKNOWN;
793 vport->isAbsentOnHv = FALSE;
794 vport->portNo = OVS_DPPORT_NUMBER_INVALID;
796 InitializeListHead(&vport->ovsNameLink);
797 InitializeListHead(&vport->portIdLink);
798 InitializeListHead(&vport->portNoLink);
804 OvsInitVportWithPortParam(POVS_VPORT_ENTRY vport,
805 PNDIS_SWITCH_PORT_PARAMETERS portParam)
807 vport->portType = portParam->PortType;
808 vport->portState = portParam->PortState;
809 vport->portId = portParam->PortId;
810 vport->nicState = NdisSwitchNicStateUnknown;
811 vport->isExternal = FALSE;
812 vport->isBridgeInternal = FALSE;
814 switch (vport->portType) {
815 case NdisSwitchPortTypeExternal:
816 vport->isExternal = TRUE;
817 vport->ovsType = OVS_VPORT_TYPE_NETDEV;
819 case NdisSwitchPortTypeInternal:
820 vport->ovsType = OVS_VPORT_TYPE_INTERNAL;
822 case NdisSwitchPortTypeSynthetic:
823 case NdisSwitchPortTypeEmulated:
824 vport->ovsType = OVS_VPORT_TYPE_NETDEV;
827 RtlCopyMemory(&vport->hvPortName, &portParam->PortName,
828 sizeof (NDIS_SWITCH_PORT_NAME));
829 /* For external and internal ports, 'portFriendlyName' is overwritten
831 RtlCopyMemory(&vport->portFriendlyName, &portParam->PortFriendlyName,
832 sizeof(NDIS_SWITCH_PORT_FRIENDLYNAME));
834 switch (vport->portState) {
835 case NdisSwitchPortStateCreated:
836 vport->ovsState = OVS_STATE_PORT_CREATED;
838 case NdisSwitchPortStateTeardown:
839 vport->ovsState = OVS_STATE_PORT_TEAR_DOWN;
841 case NdisSwitchPortStateDeleted:
842 vport->ovsState = OVS_STATE_PORT_DELETED;
849 OvsInitVportWithNicParam(POVS_SWITCH_CONTEXT switchContext,
850 POVS_VPORT_ENTRY vport,
851 PNDIS_SWITCH_NIC_PARAMETERS nicParam)
853 ASSERT(vport->portId == nicParam->PortId);
854 ASSERT(vport->ovsState == OVS_STATE_PORT_CREATED);
856 UNREFERENCED_PARAMETER(switchContext);
858 RtlCopyMemory(vport->permMacAddress, nicParam->PermanentMacAddress,
859 sizeof (nicParam->PermanentMacAddress));
860 RtlCopyMemory(vport->currMacAddress, nicParam->CurrentMacAddress,
861 sizeof (nicParam->CurrentMacAddress));
863 if (nicParam->NicType == NdisSwitchNicTypeSynthetic ||
864 nicParam->NicType == NdisSwitchNicTypeEmulated) {
865 RtlCopyMemory(vport->vmMacAddress, nicParam->VMMacAddress,
866 sizeof (nicParam->VMMacAddress));
867 RtlCopyMemory(&vport->vmName, &nicParam->VmName,
868 sizeof (nicParam->VmName));
870 RtlCopyMemory(&vport->netCfgInstanceId, &nicParam->NetCfgInstanceId,
871 sizeof (nicParam->NetCfgInstanceId));
873 RtlCopyMemory(&vport->nicName, &nicParam->NicName,
874 sizeof (nicParam->NicName));
875 vport->mtu = nicParam->MTU;
876 vport->nicState = nicParam->NicState;
877 vport->nicIndex = nicParam->NicIndex;
878 vport->numaNodeId = nicParam->NumaNodeId;
880 switch (vport->nicState) {
881 case NdisSwitchNicStateCreated:
882 vport->ovsState = OVS_STATE_NIC_CREATED;
884 case NdisSwitchNicStateConnected:
885 vport->ovsState = OVS_STATE_CONNECTED;
887 case NdisSwitchNicStateDisconnected:
888 vport->ovsState = OVS_STATE_NIC_CREATED;
890 case NdisSwitchNicStateDeleted:
891 vport->ovsState = OVS_STATE_PORT_CREATED;
897 * --------------------------------------------------------------------------
898 * Copies the relevant NDIS port properties from a virtual (pseudo) external
899 * NIC to a physical (real) external NIC.
900 * --------------------------------------------------------------------------
903 OvsInitPhysNicVport(POVS_VPORT_ENTRY physExtVport,
904 POVS_VPORT_ENTRY virtExtVport,
907 physExtVport->portType = virtExtVport->portType;
908 physExtVport->portState = virtExtVport->portState;
909 physExtVport->portId = virtExtVport->portId;
910 physExtVport->nicState = NdisSwitchNicStateUnknown;
911 physExtVport->ovsType = OVS_VPORT_TYPE_NETDEV;
912 physExtVport->isExternal = TRUE;
913 physExtVport->isBridgeInternal = FALSE;
914 physExtVport->nicIndex = (NDIS_SWITCH_NIC_INDEX)physNicIndex;
916 RtlCopyMemory(&physExtVport->hvPortName, &virtExtVport->hvPortName,
917 sizeof (NDIS_SWITCH_PORT_NAME));
919 /* 'portFriendlyName' is overwritten later. */
920 RtlCopyMemory(&physExtVport->portFriendlyName,
921 &virtExtVport->portFriendlyName,
922 sizeof(NDIS_SWITCH_PORT_FRIENDLYNAME));
924 physExtVport->ovsState = OVS_STATE_PORT_CREATED;
928 * --------------------------------------------------------------------------
929 * Initializes a tunnel vport.
930 * --------------------------------------------------------------------------
933 OvsInitTunnelVport(PVOID userContext,
934 POVS_VPORT_ENTRY vport,
935 OVS_VPORT_TYPE ovsType,
938 NTSTATUS status = STATUS_SUCCESS;
939 POVS_USER_PARAMS_CONTEXT usrParamsCtx =
940 (POVS_USER_PARAMS_CONTEXT)userContext;
942 vport->isBridgeInternal = FALSE;
943 vport->ovsType = ovsType;
944 vport->ovsState = OVS_STATE_PORT_CREATED;
946 case OVS_VPORT_TYPE_GRE:
948 case OVS_VPORT_TYPE_VXLAN:
950 POVS_TUNFLT_INIT_CONTEXT tunnelContext = NULL;
952 tunnelContext = OvsAllocateMemoryWithTag(sizeof(*tunnelContext),
954 if (tunnelContext == NULL) {
955 status = STATUS_INSUFFICIENT_RESOURCES;
958 tunnelContext->inputBuffer = usrParamsCtx->inputBuffer;
959 tunnelContext->outputBuffer = usrParamsCtx->outputBuffer;
960 tunnelContext->outputLength = usrParamsCtx->outputLength;
961 tunnelContext->vport = vport;
963 status = OvsInitVxlanTunnel(usrParamsCtx->irp,
966 OvsTunnelVportPendingInit,
967 (PVOID)tunnelContext);
968 if (status != STATUS_PENDING) {
969 OvsFreeMemoryWithTag(tunnelContext, OVS_VPORT_POOL_TAG);
970 tunnelContext = NULL;
974 case OVS_VPORT_TYPE_STT:
975 status = OvsInitSttTunnel(vport, dstPort);
984 * --------------------------------------------------------------------------
985 * Initializes a bridge internal vport ie. a port of type
986 * OVS_VPORT_TYPE_INTERNAL but not present on the Hyper-V switch.
987 * --------------------------------------------------------------------------
990 OvsInitBridgeInternalVport(POVS_VPORT_ENTRY vport)
992 vport->isBridgeInternal = TRUE;
993 vport->ovsType = OVS_VPORT_TYPE_INTERNAL;
994 /* Mark the status to be connected, since there is no other initialization
996 vport->ovsState = OVS_STATE_CONNECTED;
997 return STATUS_SUCCESS;
1001 * --------------------------------------------------------------------------
1002 * For external and internal vports 'portFriendlyName' parameter, provided by
1003 * Hyper-V, is overwritten with the interface alias name.
1004 * --------------------------------------------------------------------------
1007 AssignNicNameSpecial(POVS_VPORT_ENTRY vport)
1009 NTSTATUS status = STATUS_SUCCESS;
1010 WCHAR interfaceName[IF_MAX_STRING_SIZE] = { 0 };
1011 NET_LUID interfaceLuid = { 0 };
1014 ASSERT(vport->portType == NdisSwitchPortTypeExternal ||
1015 vport->portType == NdisSwitchPortTypeInternal);
1017 status = ConvertInterfaceGuidToLuid(&vport->netCfgInstanceId,
1019 if (status == STATUS_SUCCESS) {
1020 status = ConvertInterfaceLuidToAlias(&interfaceLuid, interfaceName,
1021 IF_MAX_STRING_SIZE + 1);
1022 if (status == STATUS_SUCCESS) {
1023 if (vport->portType == NdisSwitchPortTypeExternal &&
1024 vport->nicIndex == 0) {
1025 RtlStringCbPrintfW(vport->portFriendlyName.String, IF_MAX_STRING_SIZE,
1026 L"%s.virtualAdapter", interfaceName);
1028 RtlStringCbPrintfW(vport->portFriendlyName.String,
1029 IF_MAX_STRING_SIZE, L"%s", interfaceName);
1032 RtlStringCbLengthW(vport->portFriendlyName.String, IF_MAX_STRING_SIZE,
1034 vport->portFriendlyName.Length = (USHORT)len;
1036 OVS_LOG_INFO("Fail to convert interface LUID to alias, status: %x",
1040 OVS_LOG_INFO("Fail to convert interface GUID to LUID, status: %x",
1047 * --------------------------------------------------------------------------
1048 * Functionality common to any port on the Hyper-V switch. This function is not
1049 * to be called for a port that is not on the Hyper-V switch.
1051 * Inserts the port into 'portIdHashArray' and caches the pointer in the
1052 * 'switchContext' if needed.
1054 * For external NIC, assigns the name for the NIC.
1055 * --------------------------------------------------------------------------
1058 InitHvVportCommon(POVS_SWITCH_CONTEXT switchContext,
1059 POVS_VPORT_ENTRY vport,
1064 switch (vport->portType) {
1065 case NdisSwitchPortTypeExternal:
1067 * Overwrite the 'portFriendlyName' of this external vport. The reason
1068 * for having this in common code is to be able to call it from the NDIS
1069 * Port callback as well as the NDIS NIC callback.
1071 AssignNicNameSpecial(vport);
1073 if (vport->nicIndex == 0) {
1074 switchContext->virtualExternalPortId = vport->portId;
1075 switchContext->virtualExternalVport = vport;
1077 switchContext->numPhysicalNics++;
1080 case NdisSwitchPortTypeInternal:
1081 ASSERT(vport->isBridgeInternal == FALSE);
1083 /* Overwrite the 'portFriendlyName' of the internal vport. */
1084 AssignNicNameSpecial(vport);
1085 switchContext->internalPortId = vport->portId;
1086 switchContext->internalVport = vport;
1088 case NdisSwitchPortTypeSynthetic:
1089 case NdisSwitchPortTypeEmulated:
1094 * It is important to not insert vport corresponding to virtual external
1095 * port into the 'portIdHashArray' since the port should not be exposed to
1098 if (vport->portType == NdisSwitchPortTypeExternal &&
1099 vport->nicIndex == 0) {
1100 return NDIS_STATUS_SUCCESS;
1104 * NOTE: OvsJhashWords has portId as "1" word. This should be ok, even
1105 * though sizeof(NDIS_SWITCH_PORT_ID) = 4, not 2, because the
1106 * hyper-v switch seems to use only 2 bytes out of 4.
1108 hash = OvsJhashWords(&vport->portId, 1, OVS_HASH_BASIS);
1109 InsertHeadList(&switchContext->portIdHashArray[hash & OVS_VPORT_MASK],
1110 &vport->portIdLink);
1112 switchContext->numHvVports++;
1114 return NDIS_STATUS_SUCCESS;
1118 * --------------------------------------------------------------------------
1119 * Functionality common to any port added from OVS userspace.
1121 * Inserts the port into 'portNoHashArray', 'ovsPortNameHashArray' and in
1122 * 'tunnelVportsArray' if appropriate.
1123 * --------------------------------------------------------------------------
1126 InitOvsVportCommon(POVS_SWITCH_CONTEXT switchContext,
1127 POVS_VPORT_ENTRY vport)
1131 switch(vport->ovsType) {
1132 case OVS_VPORT_TYPE_VXLAN:
1133 case OVS_VPORT_TYPE_STT:
1135 UINT16 dstPort = GetPortFromPriv(vport);
1136 hash = OvsJhashBytes(&dstPort,
1140 &gOvsSwitchContext->tunnelVportsArray[hash & OVS_VPORT_MASK],
1141 &vport->tunnelVportLink);
1142 switchContext->numNonHvVports++;
1145 case OVS_VPORT_TYPE_INTERNAL:
1146 if (vport->isBridgeInternal) {
1147 switchContext->numNonHvVports++;
1154 * Insert the port into the hash array of ports: by port number and ovs
1155 * and ovs (datapath) port name.
1156 * NOTE: OvsJhashWords has portNo as "1" word. This is ok, because the
1157 * portNo is stored in 2 bytes only (max port number = MAXUINT16).
1159 hash = OvsJhashWords(&vport->portNo, 1, OVS_HASH_BASIS);
1160 InsertHeadList(&gOvsSwitchContext->portNoHashArray[hash & OVS_VPORT_MASK],
1161 &vport->portNoLink);
1163 hash = OvsJhashBytes(vport->ovsName, strlen(vport->ovsName) + 1,
1166 &gOvsSwitchContext->ovsPortNameHashArray[hash & OVS_VPORT_MASK],
1167 &vport->ovsNameLink);
1169 return STATUS_SUCCESS;
1174 * --------------------------------------------------------------------------
1175 * Provides functionality that is partly complementatry to
1176 * InitOvsVportCommon()/InitHvVportCommon().
1178 * 'hvDelete' indicates if caller is removing the vport as a result of the
1179 * port being removed on the Hyper-V switch.
1180 * 'ovsDelete' indicates if caller is removing the vport as a result of the
1181 * port being removed from OVS userspace.
1182 * --------------------------------------------------------------------------
1185 OvsRemoveAndDeleteVport(PVOID usrParamsContext,
1186 POVS_SWITCH_CONTEXT switchContext,
1187 POVS_VPORT_ENTRY vport,
1191 POVS_USER_PARAMS_CONTEXT usrParamsCtx =
1192 (POVS_USER_PARAMS_CONTEXT)usrParamsContext;
1193 BOOLEAN hvSwitchPort = FALSE;
1194 BOOLEAN deletedOnOvs = FALSE;
1195 BOOLEAN deletedOnHv = FALSE;
1197 switch (vport->ovsType) {
1198 case OVS_VPORT_TYPE_INTERNAL:
1199 if (!vport->isBridgeInternal) {
1200 if (hvDelete && vport->isAbsentOnHv == FALSE) {
1201 switchContext->internalPortId = 0;
1202 switchContext->internalVport = NULL;
1203 OvsInternalAdapterDown();
1205 hvSwitchPort = TRUE;
1208 case OVS_VPORT_TYPE_VXLAN:
1211 status = OvsRemoveTunnelVport(usrParamsCtx, switchContext, vport,
1212 hvDelete, ovsDelete);
1213 if (status != STATUS_SUCCESS) {
1217 case OVS_VPORT_TYPE_STT:
1218 OvsCleanupSttTunnel(vport);
1220 case OVS_VPORT_TYPE_GRE:
1222 case OVS_VPORT_TYPE_NETDEV:
1223 if (vport->isExternal) {
1224 if (vport->nicIndex == 0) {
1225 /* Such a vport is not part of any of the hash tables, since it
1226 * is not exposed to userspace. See Vport.h for explanation. */
1227 ASSERT(hvDelete == TRUE);
1228 ASSERT(switchContext->numPhysicalNics == 0);
1229 switchContext->virtualExternalPortId = 0;
1230 switchContext->virtualExternalVport = NULL;
1231 OvsFreeMemoryWithTag(vport, OVS_VPORT_POOL_TAG);
1232 return STATUS_SUCCESS;
1235 hvSwitchPort = TRUE;
1241 * 'hvDelete' == TRUE indicates that the port should be removed from the
1242 * 'portIdHashArray', while 'ovsDelete' == TRUE indicates that the port
1243 * should be removed from 'portNoHashArray' and the 'ovsPortNameHashArray'.
1245 * Both 'hvDelete' and 'ovsDelete' can be set to TRUE by the caller.
1247 if (vport->isAbsentOnHv == TRUE) {
1250 if (vport->portNo == OVS_DPPORT_NUMBER_INVALID) {
1251 deletedOnOvs = TRUE;
1254 if (hvDelete && !deletedOnHv) {
1255 vport->isAbsentOnHv = TRUE;
1257 if (vport->isExternal) {
1258 ASSERT(vport->nicIndex != 0);
1259 ASSERT(switchContext->numPhysicalNics);
1260 switchContext->numPhysicalNics--;
1263 /* Remove the port from the relevant lists. */
1264 RemoveEntryList(&vport->portIdLink);
1265 InitializeListHead(&vport->portIdLink);
1268 if (ovsDelete && !deletedOnOvs) {
1269 vport->portNo = OVS_DPPORT_NUMBER_INVALID;
1270 vport->ovsName[0] = '\0';
1272 /* Remove the port from the relevant lists. */
1273 RemoveEntryList(&vport->ovsNameLink);
1274 InitializeListHead(&vport->ovsNameLink);
1275 RemoveEntryList(&vport->portNoLink);
1276 InitializeListHead(&vport->portNoLink);
1277 if (OVS_VPORT_TYPE_VXLAN == vport->ovsType ||
1278 OVS_VPORT_TYPE_STT == vport->ovsType) {
1279 RemoveEntryList(&vport->tunnelVportLink);
1280 InitializeListHead(&vport->tunnelVportLink);
1283 deletedOnOvs = TRUE;
1287 * Deallocate the port if it has been deleted on the Hyper-V switch as well
1290 if (deletedOnHv && deletedOnOvs) {
1292 switchContext->numHvVports--;
1294 switchContext->numNonHvVports--;
1296 OvsFreeMemoryWithTag(vport, OVS_VPORT_POOL_TAG);
1299 return STATUS_SUCCESS;
1303 OvsRemoveTunnelVport(POVS_USER_PARAMS_CONTEXT usrParamsCtx,
1304 POVS_SWITCH_CONTEXT switchContext,
1305 POVS_VPORT_ENTRY vport,
1309 POVS_TUNFLT_INIT_CONTEXT tunnelContext = NULL;
1312 tunnelContext = OvsAllocateMemoryWithTag(sizeof(*tunnelContext),
1313 OVS_VPORT_POOL_TAG);
1314 if (tunnelContext == NULL) {
1315 return STATUS_INSUFFICIENT_RESOURCES;
1317 RtlZeroMemory(tunnelContext, sizeof(*tunnelContext));
1319 tunnelContext->switchContext = switchContext;
1320 tunnelContext->hvSwitchPort = FALSE;
1321 tunnelContext->hvDelete = hvDelete;
1322 tunnelContext->ovsDelete = ovsDelete;
1323 tunnelContext->vport = vport;
1326 tunnelContext->inputBuffer = usrParamsCtx->inputBuffer;
1327 tunnelContext->outputBuffer = usrParamsCtx->outputBuffer;
1328 tunnelContext->outputLength = usrParamsCtx->outputLength;
1329 irp = usrParamsCtx->irp;
1332 return OvsCleanupVxlanTunnel(irp, vport, OvsTunnelVportPendingRemove,
1339 OvsAddConfiguredSwitchPorts(POVS_SWITCH_CONTEXT switchContext)
1341 NDIS_STATUS status = NDIS_STATUS_SUCCESS;
1343 PNDIS_SWITCH_PORT_PARAMETERS portParam;
1344 PNDIS_SWITCH_PORT_ARRAY portArray = NULL;
1345 POVS_VPORT_ENTRY vport;
1347 OVS_LOG_TRACE("Enter: switchContext:%p", switchContext);
1349 status = OvsGetPortsOnSwitch(switchContext, &portArray);
1350 if (status != NDIS_STATUS_SUCCESS) {
1354 for (arrIndex = 0; arrIndex < portArray->NumElements; arrIndex++) {
1355 portParam = NDIS_SWITCH_PORT_AT_ARRAY_INDEX(portArray, arrIndex);
1357 if (portParam->IsValidationPort) {
1361 vport = (POVS_VPORT_ENTRY)OvsAllocateVport();
1362 if (vport == NULL) {
1363 status = NDIS_STATUS_RESOURCES;
1366 OvsInitVportWithPortParam(vport, portParam);
1367 status = InitHvVportCommon(switchContext, vport, TRUE);
1368 if (status != NDIS_STATUS_SUCCESS) {
1369 OvsFreeMemoryWithTag(vport, OVS_VPORT_POOL_TAG);
1375 if (status != NDIS_STATUS_SUCCESS) {
1376 OvsClearAllSwitchVports(switchContext);
1379 OvsFreeSwitchPortsArray(portArray);
1381 OVS_LOG_TRACE("Exit: status: %x", status);
1388 OvsInitConfiguredSwitchNics(POVS_SWITCH_CONTEXT switchContext)
1390 NDIS_STATUS status = NDIS_STATUS_SUCCESS;
1391 PNDIS_SWITCH_NIC_ARRAY nicArray = NULL;
1393 PNDIS_SWITCH_NIC_PARAMETERS nicParam;
1394 POVS_VPORT_ENTRY vport;
1396 OVS_LOG_TRACE("Enter: switchContext: %p", switchContext);
1398 * Now, get NIC list.
1400 status = OvsGetNicsOnSwitch(switchContext, &nicArray);
1401 if (status != NDIS_STATUS_SUCCESS) {
1404 for (arrIndex = 0; arrIndex < nicArray->NumElements; ++arrIndex) {
1406 nicParam = NDIS_SWITCH_NIC_AT_ARRAY_INDEX(nicArray, arrIndex);
1409 * XXX: Check if the port is configured with a VLAN. Disallow such a
1410 * configuration, since we don't support tag-in-tag.
1414 * XXX: Check if the port is connected to a VF. Disconnect the VF in
1418 if (nicParam->NicType == NdisSwitchNicTypeExternal &&
1419 nicParam->NicIndex != 0) {
1420 POVS_VPORT_ENTRY virtExtVport =
1421 (POVS_VPORT_ENTRY)switchContext->virtualExternalVport;
1423 vport = OvsAllocateVport();
1425 OvsInitPhysNicVport(vport, virtExtVport,
1426 nicParam->NicIndex);
1427 OvsInitVportWithNicParam(switchContext, vport, nicParam);
1428 status = InitHvVportCommon(switchContext, vport, TRUE);
1429 if (status != NDIS_STATUS_SUCCESS) {
1430 OvsFreeMemoryWithTag(vport, OVS_VPORT_POOL_TAG);
1434 OVS_LOG_ERROR("Fail to allocate vport.");
1438 vport = OvsFindVportByPortIdAndNicIndex(switchContext,
1440 nicParam->NicIndex);
1441 if (vport == NULL) {
1443 "Could not found vport with portId: %d and nicIndex: %d.",
1444 nicParam->PortId, nicParam->NicIndex);
1447 OvsInitVportWithNicParam(switchContext, vport, nicParam);
1450 if (nicParam->NicType == NdisSwitchNicTypeInternal) {
1452 * Overwrite the 'portFriendlyName' of the internal vport.
1454 * The call to AssignNicNameSpecial() is needed here, because the
1455 * necessary 'netCfgInstanceId' of the vport is available.
1456 * On port creation the latter information is missing and the
1457 * 'portFriendlyName' of the vport fails to be overwritten with the
1458 * correct information.
1460 AssignNicNameSpecial(vport);
1461 OvsInternalAdapterUp(vport->portNo, &nicParam->NetCfgInstanceId);
1466 OvsFreeSwitchNicsArray(nicArray);
1468 OVS_LOG_TRACE("Exit: status: %x", status);
1473 * --------------------------------------------------------------------------
1474 * Deletes ports added from the Hyper-V switch as well as OVS usersapce. The
1475 * function deletes ports in 'portIdHashArray'. This will delete most of the
1476 * ports that are in the 'portNoHashArray' as well. Any remaining ports
1477 * are deleted by walking the 'portNoHashArray'.
1478 * --------------------------------------------------------------------------
1481 OvsClearAllSwitchVports(POVS_SWITCH_CONTEXT switchContext)
1483 for (UINT hash = 0; hash < OVS_MAX_VPORT_ARRAY_SIZE; hash++) {
1484 PLIST_ENTRY head, link, next;
1486 head = &(switchContext->portIdHashArray[hash & OVS_VPORT_MASK]);
1487 LIST_FORALL_SAFE(head, link, next) {
1488 POVS_VPORT_ENTRY vport;
1489 vport = CONTAINING_RECORD(link, OVS_VPORT_ENTRY, portIdLink);
1490 OvsRemoveAndDeleteVport(NULL, switchContext, vport, TRUE, TRUE);
1495 * Remove 'virtualExternalVport' as well. This port is not part of the
1496 * 'portIdHashArray'.
1498 if (switchContext->virtualExternalVport) {
1499 OvsRemoveAndDeleteVport(NULL, switchContext,
1500 (POVS_VPORT_ENTRY)switchContext->virtualExternalVport, TRUE, TRUE);
1504 for (UINT hash = 0; hash < OVS_MAX_VPORT_ARRAY_SIZE; hash++) {
1505 PLIST_ENTRY head, link, next;
1506 head = &(switchContext->portNoHashArray[hash & OVS_VPORT_MASK]);
1507 LIST_FORALL_SAFE(head, link, next) {
1508 POVS_VPORT_ENTRY vport;
1509 vport = CONTAINING_RECORD(link, OVS_VPORT_ENTRY, portNoLink);
1510 ASSERT(OvsIsTunnelVportType(vport->ovsType) ||
1511 (vport->ovsType == OVS_VPORT_TYPE_INTERNAL &&
1512 vport->isBridgeInternal) || vport->isAbsentOnHv == TRUE);
1513 OvsRemoveAndDeleteVport(NULL, switchContext, vport, TRUE, TRUE);
1517 ASSERT(switchContext->virtualExternalVport == NULL);
1518 ASSERT(switchContext->internalVport == NULL);
1523 OvsConvertIfCountedStrToAnsiStr(PIF_COUNTED_STRING wStr,
1528 UNICODE_STRING ustr;
1532 ustr.Buffer = wStr->String;
1533 ustr.Length = wStr->Length;
1534 ustr.MaximumLength = IF_MAX_STRING_SIZE;
1537 astr.MaximumLength = maxStrLen;
1540 size = RtlUnicodeStringToAnsiSize(&ustr);
1541 if (size > maxStrLen) {
1542 return STATUS_BUFFER_OVERFLOW;
1545 status = RtlUnicodeStringToAnsiString(&astr, &ustr, FALSE);
1547 ASSERT(status == STATUS_SUCCESS);
1548 if (status != STATUS_SUCCESS) {
1551 ASSERT(astr.Length <= maxStrLen);
1552 str[astr.Length] = 0;
1553 return STATUS_SUCCESS;
1557 * --------------------------------------------------------------------------
1558 * Utility function that populates a 'OVS_VPORT_EXT_INFO' structure for the
1560 * --------------------------------------------------------------------------
1563 OvsGetExtInfoIoctl(POVS_VPORT_GET vportGet,
1564 POVS_VPORT_EXT_INFO extInfo)
1566 POVS_VPORT_ENTRY vport;
1568 LOCK_STATE_EX lockState;
1569 NTSTATUS status = STATUS_SUCCESS;
1570 BOOLEAN doConvert = FALSE;
1572 RtlZeroMemory(extInfo, sizeof (POVS_VPORT_EXT_INFO));
1573 NdisAcquireRWLockRead(gOvsSwitchContext->dispatchLock, &lockState, 0);
1574 if (vportGet->portNo == 0) {
1575 StringCbLengthA(vportGet->name, OVS_MAX_PORT_NAME_LENGTH - 1, &len);
1576 vport = OvsFindVportByHvNameA(gOvsSwitchContext, vportGet->name);
1577 if (vport == NULL) {
1578 /* If the port is not a Hyper-V port and it has been added earlier,
1579 * we'll find it in 'ovsPortNameHashArray'. */
1580 vport = OvsFindVportByOvsName(gOvsSwitchContext, vportGet->name);
1583 vport = OvsFindVportByPortNo(gOvsSwitchContext, vportGet->portNo);
1585 if (vport == NULL || (vport->ovsState != OVS_STATE_CONNECTED &&
1586 vport->ovsState != OVS_STATE_NIC_CREATED)) {
1587 NdisReleaseRWLock(gOvsSwitchContext->dispatchLock, &lockState);
1588 if (vportGet->portNo) {
1589 OVS_LOG_WARN("vport %u does not exist any more", vportGet->portNo);
1591 OVS_LOG_WARN("vport %s does not exist any more", vportGet->name);
1593 status = STATUS_DEVICE_DOES_NOT_EXIST;
1596 extInfo->dpNo = vportGet->dpNo;
1597 extInfo->portNo = vport->portNo;
1598 RtlCopyMemory(extInfo->macAddress, vport->currMacAddress,
1599 sizeof (vport->currMacAddress));
1600 RtlCopyMemory(extInfo->permMACAddress, vport->permMacAddress,
1601 sizeof (vport->permMacAddress));
1602 if (vport->ovsType == OVS_VPORT_TYPE_NETDEV) {
1603 RtlCopyMemory(extInfo->vmMACAddress, vport->vmMacAddress,
1604 sizeof (vport->vmMacAddress));
1606 extInfo->nicIndex = vport->nicIndex;
1607 extInfo->portId = vport->portId;
1608 extInfo->type = vport->ovsType;
1609 extInfo->mtu = vport->mtu;
1613 if (vport->ovsState == OVS_STATE_NIC_CREATED) {
1614 extInfo->status = OVS_EVENT_CONNECT | OVS_EVENT_LINK_DOWN;
1615 } else if (vport->ovsState == OVS_STATE_CONNECTED) {
1616 extInfo->status = OVS_EVENT_CONNECT | OVS_EVENT_LINK_UP;
1618 extInfo->status = OVS_EVENT_DISCONNECT;
1620 if (extInfo->type == OVS_VPORT_TYPE_NETDEV &&
1621 (vport->ovsState == OVS_STATE_NIC_CREATED ||
1622 vport->ovsState == OVS_STATE_CONNECTED)) {
1625 extInfo->vmUUID[0] = 0;
1626 extInfo->vifUUID[0] = 0;
1628 NdisReleaseRWLock(gOvsSwitchContext->dispatchLock, &lockState);
1630 status = OvsConvertIfCountedStrToAnsiStr(&vport->portFriendlyName,
1632 OVS_MAX_PORT_NAME_LENGTH);
1633 if (status != STATUS_SUCCESS) {
1634 OVS_LOG_INFO("Fail to convert NIC name.");
1635 extInfo->vmUUID[0] = 0;
1638 status = OvsConvertIfCountedStrToAnsiStr(&vport->vmName,
1640 OVS_MAX_VM_UUID_LEN);
1641 if (status != STATUS_SUCCESS) {
1642 OVS_LOG_INFO("Fail to convert VM name.");
1643 extInfo->vmUUID[0] = 0;
1646 status = OvsConvertIfCountedStrToAnsiStr(&vport->nicName,
1648 OVS_MAX_VIF_UUID_LEN);
1649 if (status != STATUS_SUCCESS) {
1650 OVS_LOG_INFO("Fail to convert nic UUID");
1651 extInfo->vifUUID[0] = 0;
1654 * for now ignore status
1656 status = STATUS_SUCCESS;
1664 * --------------------------------------------------------------------------
1665 * Command Handler for 'OVS_WIN_NETDEV_CMD_GET'.
1666 * --------------------------------------------------------------------------
1669 OvsGetNetdevCmdHandler(POVS_USER_PARAMS_CONTEXT usrParamsCtx,
1672 NTSTATUS status = STATUS_SUCCESS;
1673 POVS_MESSAGE msgIn = (POVS_MESSAGE)usrParamsCtx->inputBuffer;
1674 POVS_MESSAGE msgOut = (POVS_MESSAGE)usrParamsCtx->outputBuffer;
1675 NL_ERROR nlError = NL_ERROR_SUCCESS;
1676 OVS_VPORT_GET vportGet;
1677 OVS_VPORT_EXT_INFO info;
1679 static const NL_POLICY ovsNetdevPolicy[] = {
1680 [OVS_WIN_NETDEV_ATTR_NAME] = { .type = NL_A_STRING,
1682 .maxLen = IFNAMSIZ },
1684 PNL_ATTR netdevAttrs[ARRAY_SIZE(ovsNetdevPolicy)];
1686 /* input buffer has been validated while validating transaction dev op. */
1687 ASSERT(usrParamsCtx->inputBuffer != NULL &&
1688 usrParamsCtx->inputLength > sizeof *msgIn);
1690 if (msgOut == NULL || usrParamsCtx->outputLength < sizeof *msgOut) {
1691 return STATUS_INVALID_BUFFER_SIZE;
1694 if (!NlAttrParse((PNL_MSG_HDR)msgIn,
1695 NLMSG_HDRLEN + GENL_HDRLEN + OVS_HDRLEN,
1696 NlMsgAttrsLen((PNL_MSG_HDR)msgIn),
1697 ovsNetdevPolicy, ARRAY_SIZE(ovsNetdevPolicy),
1698 netdevAttrs, ARRAY_SIZE(netdevAttrs))) {
1699 return STATUS_INVALID_PARAMETER;
1702 vportGet.portNo = 0;
1703 RtlCopyMemory(&vportGet.name, NlAttrGet(netdevAttrs[OVS_VPORT_ATTR_NAME]),
1704 NlAttrGetSize(netdevAttrs[OVS_VPORT_ATTR_NAME]));
1706 status = OvsGetExtInfoIoctl(&vportGet, &info);
1707 if (status == STATUS_DEVICE_DOES_NOT_EXIST) {
1708 nlError = NL_ERROR_NODEV;
1712 status = CreateNetlinkMesgForNetdev(&info, msgIn,
1713 usrParamsCtx->outputBuffer, usrParamsCtx->outputLength,
1714 gOvsSwitchContext->dpNo);
1715 if (status == STATUS_SUCCESS) {
1716 *replyLen = msgOut->nlMsg.nlmsgLen;
1720 if (nlError != NL_ERROR_SUCCESS) {
1721 POVS_MESSAGE_ERROR msgError = (POVS_MESSAGE_ERROR)
1722 usrParamsCtx->outputBuffer;
1724 NlBuildErrorMsg(msgIn, msgError, nlError);
1725 *replyLen = msgError->nlMsg.nlmsgLen;
1728 return STATUS_SUCCESS;
1733 * --------------------------------------------------------------------------
1734 * Utility function to construct an OVS_MESSAGE for the specified vport. The
1735 * OVS_MESSAGE contains the output of a netdev command.
1736 * --------------------------------------------------------------------------
1739 CreateNetlinkMesgForNetdev(POVS_VPORT_EXT_INFO info,
1748 UINT32 netdevFlags = 0;
1750 NlBufInit(&nlBuffer, outBuffer, outBufLen);
1752 ok = NlFillOvsMsg(&nlBuffer, msgIn->nlMsg.nlmsgType, NLM_F_MULTI,
1753 msgIn->nlMsg.nlmsgSeq, msgIn->nlMsg.nlmsgPid,
1754 msgIn->genlMsg.cmd, msgIn->genlMsg.version,
1757 return STATUS_INVALID_BUFFER_SIZE;
1760 ok = NlMsgPutTailU32(&nlBuffer, OVS_WIN_NETDEV_ATTR_PORT_NO,
1763 return STATUS_INVALID_BUFFER_SIZE;
1766 ok = NlMsgPutTailU32(&nlBuffer, OVS_WIN_NETDEV_ATTR_TYPE, info->type);
1768 return STATUS_INVALID_BUFFER_SIZE;
1771 ok = NlMsgPutTailString(&nlBuffer, OVS_WIN_NETDEV_ATTR_NAME,
1774 return STATUS_INVALID_BUFFER_SIZE;
1777 ok = NlMsgPutTailUnspec(&nlBuffer, OVS_WIN_NETDEV_ATTR_MAC_ADDR,
1778 (PCHAR)info->macAddress, sizeof (info->macAddress));
1780 return STATUS_INVALID_BUFFER_SIZE;
1783 ok = NlMsgPutTailU32(&nlBuffer, OVS_WIN_NETDEV_ATTR_MTU, info->mtu);
1785 return STATUS_INVALID_BUFFER_SIZE;
1788 if (info->status != OVS_EVENT_CONNECT) {
1789 netdevFlags = OVS_WIN_NETDEV_IFF_UP;
1791 ok = NlMsgPutTailU32(&nlBuffer, OVS_WIN_NETDEV_ATTR_IF_FLAGS,
1794 return STATUS_INVALID_BUFFER_SIZE;
1798 * XXX: add netdev_stats when we have the definition available in the
1802 nlMsg = (PNL_MSG_HDR)NlBufAt(&nlBuffer, 0, 0);
1803 nlMsg->nlmsgLen = NlBufSize(&nlBuffer);
1805 return STATUS_SUCCESS;
1808 static __inline VOID
1809 OvsWaitActivate(POVS_SWITCH_CONTEXT switchContext, ULONG sleepMicroSec)
1811 while ((!switchContext->isActivated) &&
1812 (!switchContext->isActivateFailed)) {
1813 /* Wait for the switch to be active and
1814 * the list of ports in OVS to be initialized. */
1815 NdisMSleep(sleepMicroSec);
1820 OvsCreateMsgFromVport(POVS_VPORT_ENTRY vport,
1827 OVS_VPORT_FULL_STATS vportStats;
1831 NlBufInit(&nlBuffer, outBuffer, outBufLen);
1833 ok = NlFillOvsMsg(&nlBuffer, msgIn->nlMsg.nlmsgType, NLM_F_MULTI,
1834 msgIn->nlMsg.nlmsgSeq, msgIn->nlMsg.nlmsgPid,
1835 msgIn->genlMsg.cmd, msgIn->genlMsg.version,
1838 return STATUS_INVALID_BUFFER_SIZE;
1841 ok = NlMsgPutTailU32(&nlBuffer, OVS_VPORT_ATTR_PORT_NO, vport->portNo);
1843 return STATUS_INVALID_BUFFER_SIZE;
1846 ok = NlMsgPutTailU32(&nlBuffer, OVS_VPORT_ATTR_TYPE, vport->ovsType);
1848 return STATUS_INVALID_BUFFER_SIZE;
1851 ok = NlMsgPutTailString(&nlBuffer, OVS_VPORT_ATTR_NAME, vport->ovsName);
1853 return STATUS_INVALID_BUFFER_SIZE;
1857 * XXX: when we implement OVS_DP_ATTR_USER_FEATURES in datapath,
1858 * we'll need to check the OVS_DP_F_VPORT_PIDS flag: if it is set,
1859 * it means we have an array of pids, instead of a single pid.
1860 * ATM we assume we have one pid only.
1863 ok = NlMsgPutTailU32(&nlBuffer, OVS_VPORT_ATTR_UPCALL_PID,
1866 return STATUS_INVALID_BUFFER_SIZE;
1870 vportStats.rxPackets = vport->stats.rxPackets;
1871 vportStats.rxBytes = vport->stats.rxBytes;
1872 vportStats.txPackets = vport->stats.txPackets;
1873 vportStats.txBytes = vport->stats.txBytes;
1874 vportStats.rxErrors = vport->errStats.rxErrors;
1875 vportStats.txErrors = vport->errStats.txErrors;
1876 vportStats.rxDropped = vport->errStats.rxDropped;
1877 vportStats.txDropped = vport->errStats.txDropped;
1879 ok = NlMsgPutTailUnspec(&nlBuffer, OVS_VPORT_ATTR_STATS,
1881 sizeof(OVS_VPORT_FULL_STATS));
1883 return STATUS_INVALID_BUFFER_SIZE;
1887 * XXX: when vxlan udp dest port becomes configurable, we will also need
1888 * to add vport options
1891 nlMsg = (PNL_MSG_HDR)NlBufAt(&nlBuffer, 0, 0);
1892 nlMsg->nlmsgLen = NlBufSize(&nlBuffer);
1894 return STATUS_SUCCESS;
1898 OvsGetVportDumpNext(POVS_USER_PARAMS_CONTEXT usrParamsCtx,
1902 POVS_OPEN_INSTANCE instance =
1903 (POVS_OPEN_INSTANCE)usrParamsCtx->ovsInstance;
1904 LOCK_STATE_EX lockState;
1905 UINT32 i = OVS_MAX_VPORT_ARRAY_SIZE;
1908 * XXX: this function shares some code with other dump command(s).
1909 * In the future, we will need to refactor the dump functions
1912 ASSERT(usrParamsCtx->devOp == OVS_READ_DEV_OP);
1914 if (instance->dumpState.ovsMsg == NULL) {
1916 return STATUS_INVALID_DEVICE_STATE;
1919 /* Output buffer has been validated while validating read dev op. */
1920 ASSERT(usrParamsCtx->outputBuffer != NULL);
1922 msgIn = instance->dumpState.ovsMsg;
1925 * XXX: when we implement OVS_DP_ATTR_USER_FEATURES in datapath,
1926 * we'll need to check the OVS_DP_F_VPORT_PIDS flag: if it is set,
1927 * it means we have an array of pids, instead of a single pid.
1928 * ATM we assume we have one pid only.
1930 NdisAcquireRWLockRead(gOvsSwitchContext->dispatchLock, &lockState, 0);
1932 if (gOvsSwitchContext->numHvVports > 0 ||
1933 gOvsSwitchContext->numNonHvVports > 0) {
1934 /* inBucket: the bucket, used for lookup */
1935 UINT32 inBucket = instance->dumpState.index[0];
1936 /* inIndex: index within the given bucket, used for lookup */
1937 UINT32 inIndex = instance->dumpState.index[1];
1938 /* the bucket to be used for the next dump operation */
1939 UINT32 outBucket = 0;
1940 /* the index within the outBucket to be used for the next dump */
1941 UINT32 outIndex = 0;
1943 for (i = inBucket; i < OVS_MAX_VPORT_ARRAY_SIZE; i++) {
1944 PLIST_ENTRY head, link;
1945 head = &(gOvsSwitchContext->portNoHashArray[i]);
1946 POVS_VPORT_ENTRY vport = NULL;
1949 LIST_FORALL(head, link) {
1952 * if one or more dumps were previously done on this same bucket,
1953 * inIndex will be > 0, so we'll need to reply with the
1954 * inIndex + 1 vport from the bucket.
1956 if (outIndex >= inIndex) {
1957 vport = CONTAINING_RECORD(link, OVS_VPORT_ENTRY, portNoLink);
1959 ASSERT(vport->portNo != OVS_DPPORT_NUMBER_INVALID);
1960 OvsCreateMsgFromVport(vport, msgIn,
1961 usrParamsCtx->outputBuffer,
1962 usrParamsCtx->outputLength,
1963 gOvsSwitchContext->dpNo);
1976 * if no vport was found above, check the next bucket, beginning
1977 * with the first (i.e. index 0) elem from within that bucket
1984 /* XXX: what about NLMSG_DONE (as msg type)? */
1985 instance->dumpState.index[0] = outBucket;
1986 instance->dumpState.index[1] = outIndex;
1989 NdisReleaseRWLock(gOvsSwitchContext->dispatchLock, &lockState);
1991 /* if i < OVS_MAX_VPORT_ARRAY_SIZE => vport was found */
1992 if (i < OVS_MAX_VPORT_ARRAY_SIZE) {
1993 POVS_MESSAGE msgOut = (POVS_MESSAGE)usrParamsCtx->outputBuffer;
1994 *replyLen = msgOut->nlMsg.nlmsgLen;
1997 * if i >= OVS_MAX_VPORT_ARRAY_SIZE => vport was not found =>
2001 /* Free up the dump state, since there's no more data to continue. */
2002 FreeUserDumpState(instance);
2005 return STATUS_SUCCESS;
2009 OvsGetVport(POVS_USER_PARAMS_CONTEXT usrParamsCtx,
2012 NTSTATUS status = STATUS_SUCCESS;
2013 LOCK_STATE_EX lockState;
2015 POVS_MESSAGE msgIn = (POVS_MESSAGE)usrParamsCtx->inputBuffer;
2016 POVS_MESSAGE msgOut = (POVS_MESSAGE)usrParamsCtx->outputBuffer;
2017 POVS_VPORT_ENTRY vport = NULL;
2018 NL_ERROR nlError = NL_ERROR_SUCCESS;
2019 PCHAR portName = NULL;
2020 UINT32 portNameLen = 0;
2021 UINT32 portNumber = OVS_DPPORT_NUMBER_INVALID;
2023 static const NL_POLICY ovsVportPolicy[] = {
2024 [OVS_VPORT_ATTR_PORT_NO] = { .type = NL_A_U32, .optional = TRUE },
2025 [OVS_VPORT_ATTR_NAME] = { .type = NL_A_STRING,
2030 PNL_ATTR vportAttrs[ARRAY_SIZE(ovsVportPolicy)];
2032 /* input buffer has been validated while validating write dev op. */
2033 ASSERT(usrParamsCtx->inputBuffer != NULL);
2035 if (!NlAttrParse((PNL_MSG_HDR)msgIn,
2036 NLMSG_HDRLEN + GENL_HDRLEN + OVS_HDRLEN,
2037 NlMsgAttrsLen((PNL_MSG_HDR)msgIn),
2038 ovsVportPolicy, ARRAY_SIZE(ovsVportPolicy),
2039 vportAttrs, ARRAY_SIZE(vportAttrs))) {
2040 return STATUS_INVALID_PARAMETER;
2043 /* Output buffer has been validated while validating transact dev op. */
2044 ASSERT(msgOut != NULL && usrParamsCtx->outputLength >= sizeof *msgOut);
2046 NdisAcquireRWLockRead(gOvsSwitchContext->dispatchLock, &lockState, 0);
2047 if (vportAttrs[OVS_VPORT_ATTR_NAME] != NULL) {
2048 portName = NlAttrGet(vportAttrs[OVS_VPORT_ATTR_NAME]);
2049 portNameLen = NlAttrGetSize(vportAttrs[OVS_VPORT_ATTR_NAME]);
2051 /* the port name is expected to be null-terminated */
2052 ASSERT(portName[portNameLen - 1] == '\0');
2054 vport = OvsFindVportByOvsName(gOvsSwitchContext, portName);
2055 } else if (vportAttrs[OVS_VPORT_ATTR_PORT_NO] != NULL) {
2056 portNumber = NlAttrGetU32(vportAttrs[OVS_VPORT_ATTR_PORT_NO]);
2058 vport = OvsFindVportByPortNo(gOvsSwitchContext, portNumber);
2060 nlError = NL_ERROR_INVAL;
2061 NdisReleaseRWLock(gOvsSwitchContext->dispatchLock, &lockState);
2066 nlError = NL_ERROR_NODEV;
2067 NdisReleaseRWLock(gOvsSwitchContext->dispatchLock, &lockState);
2071 status = OvsCreateMsgFromVport(vport, msgIn, usrParamsCtx->outputBuffer,
2072 usrParamsCtx->outputLength,
2073 gOvsSwitchContext->dpNo);
2074 NdisReleaseRWLock(gOvsSwitchContext->dispatchLock, &lockState);
2076 *replyLen = msgOut->nlMsg.nlmsgLen;
2079 if (nlError != NL_ERROR_SUCCESS) {
2080 POVS_MESSAGE_ERROR msgError = (POVS_MESSAGE_ERROR)
2081 usrParamsCtx->outputBuffer;
2083 NlBuildErrorMsg(msgIn, msgError, nlError);
2084 *replyLen = msgError->nlMsg.nlmsgLen;
2087 return STATUS_SUCCESS;
2091 * --------------------------------------------------------------------------
2092 * Command Handler for 'OVS_VPORT_CMD_GET'.
2094 * The function handles the initial call to setup the dump state, as well as
2095 * subsequent calls to continue dumping data.
2096 * --------------------------------------------------------------------------
2099 OvsGetVportCmdHandler(POVS_USER_PARAMS_CONTEXT usrParamsCtx,
2104 switch (usrParamsCtx->devOp) {
2105 case OVS_WRITE_DEV_OP:
2106 return OvsSetupDumpStart(usrParamsCtx);
2108 case OVS_READ_DEV_OP:
2109 return OvsGetVportDumpNext(usrParamsCtx, replyLen);
2111 case OVS_TRANSACTION_DEV_OP:
2112 return OvsGetVport(usrParamsCtx, replyLen);
2115 return STATUS_INVALID_DEVICE_REQUEST;
2121 OvsComputeVportNo(POVS_SWITCH_CONTEXT switchContext)
2123 /* we are not allowed to create the port OVS_DPPORT_NUMBER_LOCAL */
2124 for (ULONG i = OVS_DPPORT_NUMBER_LOCAL + 1; i < MAXUINT16; ++i) {
2125 POVS_VPORT_ENTRY vport;
2127 vport = OvsFindVportByPortNo(switchContext, i);
2133 return OVS_DPPORT_NUMBER_INVALID;
2137 * --------------------------------------------------------------------------
2138 * Command Handler for 'OVS_VPORT_CMD_NEW'.
2139 * --------------------------------------------------------------------------
2142 OvsNewVportCmdHandler(POVS_USER_PARAMS_CONTEXT usrParamsCtx,
2145 NDIS_STATUS status = STATUS_SUCCESS;
2146 LOCK_STATE_EX lockState;
2148 NL_ERROR nlError = NL_ERROR_SUCCESS;
2149 POVS_MESSAGE msgIn = (POVS_MESSAGE)usrParamsCtx->inputBuffer;
2150 POVS_MESSAGE msgOut = (POVS_MESSAGE)usrParamsCtx->outputBuffer;
2151 POVS_VPORT_ENTRY vport = NULL;
2155 BOOLEAN vportAllocated = FALSE, vportInitialized = FALSE;
2157 static const NL_POLICY ovsVportPolicy[] = {
2158 [OVS_VPORT_ATTR_PORT_NO] = { .type = NL_A_U32, .optional = TRUE },
2159 [OVS_VPORT_ATTR_TYPE] = { .type = NL_A_U32, .optional = FALSE },
2160 [OVS_VPORT_ATTR_NAME] = { .type = NL_A_STRING, .maxLen = IFNAMSIZ,
2162 [OVS_VPORT_ATTR_UPCALL_PID] = { .type = NL_A_UNSPEC,
2163 .optional = FALSE },
2164 [OVS_VPORT_ATTR_OPTIONS] = { .type = NL_A_NESTED, .optional = TRUE },
2167 PNL_ATTR vportAttrs[ARRAY_SIZE(ovsVportPolicy)];
2169 /* input buffer has been validated while validating write dev op. */
2170 ASSERT(usrParamsCtx->inputBuffer != NULL);
2172 /* Output buffer has been validated while validating transact dev op. */
2173 ASSERT(msgOut != NULL && usrParamsCtx->outputLength >= sizeof *msgOut);
2175 if (!NlAttrParse((PNL_MSG_HDR)msgIn,
2176 NLMSG_HDRLEN + GENL_HDRLEN + OVS_HDRLEN,
2177 NlMsgAttrsLen((PNL_MSG_HDR)msgIn),
2178 ovsVportPolicy, ARRAY_SIZE(ovsVportPolicy),
2179 vportAttrs, ARRAY_SIZE(vportAttrs))) {
2180 return STATUS_INVALID_PARAMETER;
2183 portName = NlAttrGet(vportAttrs[OVS_VPORT_ATTR_NAME]);
2184 portNameLen = NlAttrGetSize(vportAttrs[OVS_VPORT_ATTR_NAME]);
2185 portType = NlAttrGetU32(vportAttrs[OVS_VPORT_ATTR_TYPE]);
2187 /* we are expecting null terminated strings to be passed */
2188 ASSERT(portName[portNameLen - 1] == '\0');
2190 NdisAcquireRWLockWrite(gOvsSwitchContext->dispatchLock, &lockState, 0);
2192 vport = OvsFindVportByOvsName(gOvsSwitchContext, portName);
2194 nlError = NL_ERROR_EXIST;
2198 if (portType == OVS_VPORT_TYPE_NETDEV) {
2199 /* External ports can also be looked up like VIF ports. */
2200 vport = OvsFindVportByHvNameA(gOvsSwitchContext, portName);
2202 ASSERT(OvsIsTunnelVportType(portType) ||
2203 portType == OVS_VPORT_TYPE_INTERNAL);
2205 vport = (POVS_VPORT_ENTRY)OvsAllocateVport();
2206 if (vport == NULL) {
2207 nlError = NL_ERROR_NOMEM;
2210 vportAllocated = TRUE;
2212 if (OvsIsTunnelVportType(portType)) {
2213 UINT16 transportPortDest = 0;
2216 case OVS_VPORT_TYPE_VXLAN:
2217 transportPortDest = VXLAN_UDP_PORT;
2219 case OVS_VPORT_TYPE_STT:
2220 transportPortDest = STT_TCP_PORT;
2226 if (vportAttrs[OVS_VPORT_ATTR_OPTIONS]) {
2227 PNL_ATTR attr = NlAttrFindNested(vportAttrs[OVS_VPORT_ATTR_OPTIONS],
2228 OVS_TUNNEL_ATTR_DST_PORT);
2230 transportPortDest = NlAttrGetU16(attr);
2234 status = OvsInitTunnelVport(usrParamsCtx,
2239 nlError = NlMapStatusToNlErr(status);
2241 OvsInitBridgeInternalVport(vport);
2244 vportInitialized = TRUE;
2246 if (nlError == NL_ERROR_SUCCESS) {
2247 vport->ovsState = OVS_STATE_CONNECTED;
2248 vport->nicState = NdisSwitchNicStateConnected;
2251 * Allow the vport to be deleted, because there is no
2252 * corresponding hyper-v switch part.
2254 vport->isAbsentOnHv = TRUE;
2261 nlError = NL_ERROR_INVAL;
2264 if (vport->portNo != OVS_DPPORT_NUMBER_INVALID) {
2265 nlError = NL_ERROR_EXIST;
2269 if (vportAttrs[OVS_VPORT_ATTR_PORT_NO] != NULL) {
2271 * XXX: when we implement the limit for ovs port number to be
2272 * MAXUINT16, we'll need to check the port number received from the
2275 vport->portNo = NlAttrGetU32(vportAttrs[OVS_VPORT_ATTR_PORT_NO]);
2277 vport->portNo = OvsComputeVportNo(gOvsSwitchContext);
2278 if (vport->portNo == OVS_DPPORT_NUMBER_INVALID) {
2279 nlError = NL_ERROR_NOMEM;
2284 /* The ovs port name must be uninitialized. */
2285 ASSERT(vport->ovsName[0] == '\0');
2286 ASSERT(portNameLen <= OVS_MAX_PORT_NAME_LENGTH);
2288 RtlCopyMemory(vport->ovsName, portName, portNameLen);
2289 /* if we don't have options, then vport->portOptions will be NULL */
2290 vport->portOptions = vportAttrs[OVS_VPORT_ATTR_OPTIONS];
2293 * XXX: when we implement OVS_DP_ATTR_USER_FEATURES in datapath,
2294 * we'll need to check the OVS_DP_F_VPORT_PIDS flag: if it is set,
2295 * it means we have an array of pids, instead of a single pid.
2296 * ATM we assume we have one pid only.
2298 vport->upcallPid = NlAttrGetU32(vportAttrs[OVS_VPORT_ATTR_UPCALL_PID]);
2300 status = InitOvsVportCommon(gOvsSwitchContext, vport);
2301 ASSERT(status == STATUS_SUCCESS);
2303 status = OvsCreateMsgFromVport(vport, msgIn, usrParamsCtx->outputBuffer,
2304 usrParamsCtx->outputLength,
2305 gOvsSwitchContext->dpNo);
2307 *replyLen = msgOut->nlMsg.nlmsgLen;
2310 NdisReleaseRWLock(gOvsSwitchContext->dispatchLock, &lockState);
2312 if ((nlError != NL_ERROR_SUCCESS) && (nlError != NL_ERROR_PENDING)) {
2313 POVS_MESSAGE_ERROR msgError = (POVS_MESSAGE_ERROR)
2314 usrParamsCtx->outputBuffer;
2316 if (vport && vportAllocated == TRUE) {
2317 if (vportInitialized == TRUE) {
2318 if (OvsIsTunnelVportType(portType)) {
2319 switch (vport->ovsType) {
2320 case OVS_VPORT_TYPE_VXLAN:
2321 OvsCleanupVxlanTunnel(NULL, vport, NULL, NULL);
2323 case OVS_VPORT_TYPE_STT:
2324 OvsCleanupSttTunnel(vport);
2327 ASSERT(!"Invalid tunnel port type");
2331 OvsFreeMemoryWithTag(vport, OVS_VPORT_POOL_TAG);
2334 NlBuildErrorMsg(msgIn, msgError, nlError);
2335 *replyLen = msgError->nlMsg.nlmsgLen;
2338 return (status == STATUS_PENDING) ? STATUS_PENDING : STATUS_SUCCESS;
2343 * --------------------------------------------------------------------------
2344 * Command Handler for 'OVS_VPORT_CMD_SET'.
2345 * --------------------------------------------------------------------------
2348 OvsSetVportCmdHandler(POVS_USER_PARAMS_CONTEXT usrParamsCtx,
2351 NDIS_STATUS status = STATUS_SUCCESS;
2352 LOCK_STATE_EX lockState;
2354 POVS_MESSAGE msgIn = (POVS_MESSAGE)usrParamsCtx->inputBuffer;
2355 POVS_MESSAGE msgOut = (POVS_MESSAGE)usrParamsCtx->outputBuffer;
2356 POVS_VPORT_ENTRY vport = NULL;
2357 NL_ERROR nlError = NL_ERROR_SUCCESS;
2359 static const NL_POLICY ovsVportPolicy[] = {
2360 [OVS_VPORT_ATTR_PORT_NO] = { .type = NL_A_U32, .optional = TRUE },
2361 [OVS_VPORT_ATTR_TYPE] = { .type = NL_A_U32, .optional = TRUE },
2362 [OVS_VPORT_ATTR_NAME] = { .type = NL_A_STRING, .maxLen = IFNAMSIZ,
2364 [OVS_VPORT_ATTR_UPCALL_PID] = { .type = NL_A_UNSPEC,
2366 [OVS_VPORT_ATTR_STATS] = { .type = NL_A_UNSPEC,
2367 .minLen = sizeof(OVS_VPORT_FULL_STATS),
2368 .maxLen = sizeof(OVS_VPORT_FULL_STATS),
2370 [OVS_VPORT_ATTR_OPTIONS] = { .type = NL_A_NESTED, .optional = TRUE },
2372 PNL_ATTR vportAttrs[ARRAY_SIZE(ovsVportPolicy)];
2374 ASSERT(usrParamsCtx->inputBuffer != NULL);
2376 if (!NlAttrParse((PNL_MSG_HDR)msgIn,
2377 NLMSG_HDRLEN + GENL_HDRLEN + OVS_HDRLEN,
2378 NlMsgAttrsLen((PNL_MSG_HDR)msgIn),
2379 ovsVportPolicy, ARRAY_SIZE(ovsVportPolicy),
2380 vportAttrs, ARRAY_SIZE(vportAttrs))) {
2381 return STATUS_INVALID_PARAMETER;
2384 /* Output buffer has been validated while validating transact dev op. */
2385 ASSERT(msgOut != NULL && usrParamsCtx->outputLength >= sizeof *msgOut);
2387 NdisAcquireRWLockWrite(gOvsSwitchContext->dispatchLock, &lockState, 0);
2388 if (vportAttrs[OVS_VPORT_ATTR_NAME] != NULL) {
2389 PSTR portName = NlAttrGet(vportAttrs[OVS_VPORT_ATTR_NAME]);
2391 UINT32 portNameLen = NlAttrGetSize(vportAttrs[OVS_VPORT_ATTR_NAME]);
2393 /* the port name is expected to be null-terminated */
2394 ASSERT(portName[portNameLen - 1] == '\0');
2396 vport = OvsFindVportByOvsName(gOvsSwitchContext, portName);
2397 } else if (vportAttrs[OVS_VPORT_ATTR_PORT_NO] != NULL) {
2398 vport = OvsFindVportByPortNo(gOvsSwitchContext,
2399 NlAttrGetU32(vportAttrs[OVS_VPORT_ATTR_PORT_NO]));
2403 nlError = NL_ERROR_NODEV;
2408 * XXX: when we implement OVS_DP_ATTR_USER_FEATURES in datapath,
2409 * we'll need to check the OVS_DP_F_VPORT_PIDS flag: if it is set,
2410 * it means we have an array of pids, instead of a single pid.
2411 * Currently, we support only one pid.
2413 if (vportAttrs[OVS_VPORT_ATTR_UPCALL_PID]) {
2414 vport->upcallPid = NlAttrGetU32(vportAttrs[OVS_VPORT_ATTR_UPCALL_PID]);
2417 if (vportAttrs[OVS_VPORT_ATTR_TYPE]) {
2418 OVS_VPORT_TYPE type = NlAttrGetU32(vportAttrs[OVS_VPORT_ATTR_TYPE]);
2419 if (type != vport->ovsType) {
2420 nlError = NL_ERROR_INVAL;
2425 if (vportAttrs[OVS_VPORT_ATTR_OPTIONS]) {
2426 OVS_LOG_ERROR("Vport options not supported");
2427 nlError = NL_ERROR_NOTSUPP;
2431 status = OvsCreateMsgFromVport(vport, msgIn, usrParamsCtx->outputBuffer,
2432 usrParamsCtx->outputLength,
2433 gOvsSwitchContext->dpNo);
2435 *replyLen = msgOut->nlMsg.nlmsgLen;
2438 NdisReleaseRWLock(gOvsSwitchContext->dispatchLock, &lockState);
2440 if (nlError != NL_ERROR_SUCCESS) {
2441 POVS_MESSAGE_ERROR msgError = (POVS_MESSAGE_ERROR)
2442 usrParamsCtx->outputBuffer;
2444 NlBuildErrorMsg(msgIn, msgError, nlError);
2445 *replyLen = msgError->nlMsg.nlmsgLen;
2448 return STATUS_SUCCESS;
2452 * --------------------------------------------------------------------------
2453 * Command Handler for 'OVS_VPORT_CMD_DEL'.
2454 * --------------------------------------------------------------------------
2457 OvsDeleteVportCmdHandler(POVS_USER_PARAMS_CONTEXT usrParamsCtx,
2460 NDIS_STATUS status = STATUS_SUCCESS;
2461 LOCK_STATE_EX lockState;
2463 POVS_MESSAGE msgIn = (POVS_MESSAGE)usrParamsCtx->inputBuffer;
2464 POVS_MESSAGE msgOut = (POVS_MESSAGE)usrParamsCtx->outputBuffer;
2465 POVS_VPORT_ENTRY vport = NULL;
2466 NL_ERROR nlError = NL_ERROR_SUCCESS;
2467 PSTR portName = NULL;
2468 UINT32 portNameLen = 0;
2470 static const NL_POLICY ovsVportPolicy[] = {
2471 [OVS_VPORT_ATTR_PORT_NO] = { .type = NL_A_U32, .optional = TRUE },
2472 [OVS_VPORT_ATTR_NAME] = { .type = NL_A_STRING, .maxLen = IFNAMSIZ,
2475 PNL_ATTR vportAttrs[ARRAY_SIZE(ovsVportPolicy)];
2477 ASSERT(usrParamsCtx->inputBuffer != NULL);
2479 if (!NlAttrParse((PNL_MSG_HDR)msgIn,
2480 NLMSG_HDRLEN + GENL_HDRLEN + OVS_HDRLEN,
2481 NlMsgAttrsLen((PNL_MSG_HDR)msgIn),
2482 ovsVportPolicy, ARRAY_SIZE(ovsVportPolicy),
2483 vportAttrs, ARRAY_SIZE(vportAttrs))) {
2484 return STATUS_INVALID_PARAMETER;
2487 /* Output buffer has been validated while validating transact dev op. */
2488 ASSERT(msgOut != NULL && usrParamsCtx->outputLength >= sizeof *msgOut);
2490 NdisAcquireRWLockWrite(gOvsSwitchContext->dispatchLock, &lockState, 0);
2491 if (vportAttrs[OVS_VPORT_ATTR_NAME] != NULL) {
2492 portName = NlAttrGet(vportAttrs[OVS_VPORT_ATTR_NAME]);
2493 portNameLen = NlAttrGetSize(vportAttrs[OVS_VPORT_ATTR_NAME]);
2495 /* the port name is expected to be null-terminated */
2496 ASSERT(portName[portNameLen - 1] == '\0');
2498 vport = OvsFindVportByOvsName(gOvsSwitchContext, portName);
2500 else if (vportAttrs[OVS_VPORT_ATTR_PORT_NO] != NULL) {
2501 vport = OvsFindVportByPortNo(gOvsSwitchContext,
2502 NlAttrGetU32(vportAttrs[OVS_VPORT_ATTR_PORT_NO]));
2506 nlError = NL_ERROR_NODEV;
2510 status = OvsCreateMsgFromVport(vport, msgIn, usrParamsCtx->outputBuffer,
2511 usrParamsCtx->outputLength,
2512 gOvsSwitchContext->dpNo);
2514 *replyLen = msgOut->nlMsg.nlmsgLen;
2517 * Mark the port as deleted from OVS userspace. If the port does not exist
2518 * on the Hyper-V switch, it gets deallocated. Otherwise, it stays.
2520 status = OvsRemoveAndDeleteVport(usrParamsCtx,
2526 nlError = NlMapStatusToNlErr(status);
2530 NdisReleaseRWLock(gOvsSwitchContext->dispatchLock, &lockState);
2532 if ((nlError != NL_ERROR_SUCCESS) && (nlError != NL_ERROR_PENDING)) {
2533 POVS_MESSAGE_ERROR msgError = (POVS_MESSAGE_ERROR)
2534 usrParamsCtx->outputBuffer;
2536 NlBuildErrorMsg(msgIn, msgError, nlError);
2537 *replyLen = msgError->nlMsg.nlmsgLen;
2540 return (status == STATUS_PENDING) ? STATUS_PENDING : STATUS_SUCCESS;
2544 OvsTunnelVportPendingRemove(PVOID context,
2548 POVS_TUNFLT_INIT_CONTEXT tunnelContext =
2549 (POVS_TUNFLT_INIT_CONTEXT) context;
2550 POVS_SWITCH_CONTEXT switchContext = tunnelContext->switchContext;
2551 POVS_VPORT_ENTRY vport = tunnelContext->vport;
2552 POVS_MESSAGE msgIn = (POVS_MESSAGE)tunnelContext->inputBuffer;
2553 POVS_MESSAGE msgOut = (POVS_MESSAGE)tunnelContext->outputBuffer;
2554 NL_ERROR nlError = NlMapStatusToNlErr(status);
2555 LOCK_STATE_EX lockState;
2557 NdisAcquireRWLockWrite(switchContext->dispatchLock, &lockState, 0);
2559 if (msgIn && msgOut) {
2560 /* Check the received status to reply to the caller. */
2561 if (STATUS_SUCCESS == status) {
2562 OvsCreateMsgFromVport(vport,
2565 tunnelContext->outputLength,
2566 switchContext->dpNo);
2568 *replyLen = msgOut->nlMsg.nlmsgLen;
2570 POVS_MESSAGE_ERROR msgError = (POVS_MESSAGE_ERROR)msgOut;
2572 NlBuildErrorMsg(msgIn, msgError, nlError);
2573 *replyLen = msgError->nlMsg.nlmsgLen;
2577 ASSERT(vport->isAbsentOnHv == TRUE);
2578 ASSERT(vport->portNo != OVS_DPPORT_NUMBER_INVALID);
2580 /* Remove the port from the relevant lists. */
2581 switchContext->numNonHvVports--;
2582 RemoveEntryList(&vport->ovsNameLink);
2583 RemoveEntryList(&vport->portNoLink);
2584 RemoveEntryList(&vport->tunnelVportLink);
2587 OvsFreeMemoryWithTag(vport->priv, OVS_VXLAN_POOL_TAG);
2591 OvsFreeMemoryWithTag(vport, OVS_VPORT_POOL_TAG);
2593 NdisReleaseRWLock(switchContext->dispatchLock, &lockState);
2597 OvsTunnelVportPendingInit(PVOID context,
2601 POVS_TUNFLT_INIT_CONTEXT tunnelContext =
2602 (POVS_TUNFLT_INIT_CONTEXT) context;
2603 POVS_VPORT_ENTRY vport = tunnelContext->vport;
2604 POVS_MESSAGE msgIn = (POVS_MESSAGE)tunnelContext->inputBuffer;
2605 POVS_MESSAGE msgOut = (POVS_MESSAGE)tunnelContext->outputBuffer;
2607 ULONG portNameLen = 0;
2608 UINT32 portType = 0;
2609 NL_ERROR nlError = NL_ERROR_SUCCESS;
2610 BOOLEAN error = TRUE;
2613 if (!NT_SUCCESS(status)) {
2614 nlError = NlMapStatusToNlErr(status);
2618 static const NL_POLICY ovsVportPolicy[] = {
2619 [OVS_VPORT_ATTR_PORT_NO] = { .type = NL_A_U32, .optional = TRUE },
2620 [OVS_VPORT_ATTR_TYPE] = { .type = NL_A_U32, .optional = FALSE },
2621 [OVS_VPORT_ATTR_NAME] = { .type = NL_A_STRING, .maxLen = IFNAMSIZ,
2622 .optional = FALSE },
2623 [OVS_VPORT_ATTR_UPCALL_PID] = { .type = NL_A_UNSPEC,
2624 .optional = FALSE },
2625 [OVS_VPORT_ATTR_OPTIONS] = { .type = NL_A_NESTED, .optional = TRUE },
2628 PNL_ATTR vportAttrs[ARRAY_SIZE(ovsVportPolicy)];
2630 /* input buffer has been validated while validating write dev op. */
2631 ASSERT(msgIn != NULL);
2633 /* Output buffer has been validated while validating transact dev op. */
2634 ASSERT(msgOut != NULL && tunnelContext->outputLength >= sizeof *msgOut);
2636 if (!NlAttrParse((PNL_MSG_HDR)msgIn,
2637 NLMSG_HDRLEN + GENL_HDRLEN + OVS_HDRLEN,
2638 NlMsgAttrsLen((PNL_MSG_HDR)msgIn),
2639 ovsVportPolicy, ARRAY_SIZE(ovsVportPolicy),
2640 vportAttrs, ARRAY_SIZE(vportAttrs))) {
2641 nlError = NL_ERROR_INVAL;
2645 portName = NlAttrGet(vportAttrs[OVS_VPORT_ATTR_NAME]);
2646 portNameLen = NlAttrGetSize(vportAttrs[OVS_VPORT_ATTR_NAME]);
2647 portType = NlAttrGetU32(vportAttrs[OVS_VPORT_ATTR_TYPE]);
2649 if (vport->portNo != OVS_DPPORT_NUMBER_INVALID) {
2650 nlError = NL_ERROR_EXIST;
2654 vport->ovsState = OVS_STATE_CONNECTED;
2655 vport->nicState = NdisSwitchNicStateConnected;
2658 * Allow the vport to be deleted, because there is no
2659 * corresponding hyper-v switch part.
2661 vport->isAbsentOnHv = TRUE;
2663 if (vportAttrs[OVS_VPORT_ATTR_PORT_NO] != NULL) {
2665 * XXX: when we implement the limit for OVS port number to be
2666 * MAXUINT16, we'll need to check the port number received from the
2670 NlAttrGetU32(vportAttrs[OVS_VPORT_ATTR_PORT_NO]);
2673 OvsComputeVportNo(gOvsSwitchContext);
2674 if (vport->portNo == OVS_DPPORT_NUMBER_INVALID) {
2675 nlError = NL_ERROR_NOMEM;
2680 /* The ovs port name must be uninitialized. */
2681 ASSERT(vport->ovsName[0] == '\0');
2682 ASSERT(portNameLen <= OVS_MAX_PORT_NAME_LENGTH);
2684 RtlCopyMemory(vport->ovsName, portName, portNameLen);
2685 /* if we don't have options, then vport->portOptions will be NULL */
2686 vport->portOptions = vportAttrs[OVS_VPORT_ATTR_OPTIONS];
2689 * XXX: when we implement OVS_DP_ATTR_USER_FEATURES in datapath,
2690 * we'll need to check the OVS_DP_F_VPORT_PIDS flag: if it is set,
2691 * it means we have an array of pids, instead of a single pid.
2692 * ATM we assume we have one pid only.
2695 NlAttrGetU32(vportAttrs[OVS_VPORT_ATTR_UPCALL_PID]);
2697 status = InitOvsVportCommon(gOvsSwitchContext, vport);
2698 ASSERT(status == STATUS_SUCCESS);
2700 OvsCreateMsgFromVport(vport,
2703 tunnelContext->outputLength,
2704 gOvsSwitchContext->dpNo);
2706 *replyLen = msgOut->nlMsg.nlmsgLen;
2712 POVS_MESSAGE_ERROR msgError = (POVS_MESSAGE_ERROR) msgOut;
2714 OvsCleanupVxlanTunnel(NULL, vport, NULL, NULL);
2715 OvsFreeMemory(vport);
2717 NlBuildErrorMsg(msgIn, msgError, nlError);
2718 *replyLen = msgError->nlMsg.nlmsgLen;