/*
- * Copyright (c) 2008, 2009, 2010, 2011, 2012, 2013, 2014 Nicira, Inc.
+ * Copyright (c) 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015 Nicira, Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
request.port_no = *port_nop;
upcall_pids = vport_socksp_to_pids(socksp, dpif->n_handlers);
- request.n_upcall_pids = dpif->n_handlers;
+ request.n_upcall_pids = socksp ? dpif->n_handlers : 1;
request.upcall_pids = upcall_pids;
error = dpif_linux_vport_transact(&request, &reply, &buf);
uint32_t port_idx = odp_to_u32(port_no);
uint32_t pid = 0;
- if (dpif->handlers) {
+ if (dpif->handlers && dpif->uc_array_size > 0) {
/* The ODPP_NONE "reserved" port number uses the "ovs-system"'s
* channel, since it is not heavily loaded. */
uint32_t idx = port_idx >= dpif->uc_array_size ? 0 : port_idx;
struct dpif_handler *h = &dpif->handlers[hash % dpif->n_handlers];
- pid = nl_sock_pid(h->channels[idx].sock);
+ /* Needs to check in case the socket pointer is changed in between
+ * the holding of upcall_lock. A known case happens when the main
+ * thread deletes the vport while the handler thread is handling
+ * the upcall from that port. */
+ if (h->channels[idx].sock) {
+ pid = nl_sock_pid(h->channels[idx].sock);
+ }
}
return pid;
static int
dpif_linux_flow_get(const struct dpif *dpif_,
const struct nlattr *key, size_t key_len,
- struct ofpbuf **actionsp, struct dpif_flow_stats *stats)
+ struct ofpbuf **bufp,
+ struct nlattr **maskp, size_t *mask_len,
+ struct nlattr **actionsp, size_t *actions_len,
+ struct dpif_flow_stats *stats)
{
const struct dpif_linux *dpif = dpif_linux_cast(dpif_);
struct dpif_linux_flow reply;
- struct ofpbuf *buf;
int error;
- error = dpif_linux_flow_get__(dpif, key, key_len, &reply, &buf);
+ error = dpif_linux_flow_get__(dpif, key, key_len, &reply, bufp);
if (!error) {
- if (stats) {
- dpif_linux_flow_get_stats(&reply, stats);
+ if (maskp) {
+ *maskp = CONST_CAST(struct nlattr *, reply.mask);
+ *mask_len = reply.mask_len;
}
if (actionsp) {
- ofpbuf_set_data(buf, CONST_CAST(struct nlattr *, reply.actions));
- ofpbuf_set_size(buf, reply.actions_len);
- *actionsp = buf;
- } else {
- ofpbuf_delete(buf);
+ *actionsp = CONST_CAST(struct nlattr *, reply.actions);
+ *actions_len = reply.actions_len;
+ }
+ if (stats) {
+ dpif_linux_flow_get_stats(&reply, stats);
}
}
return error;
}
if (actions && !state->flow.actions) {
+ struct dpif_linux_flow reply;
+
+ /* Keys are required to be allocated from 'state->buffer' so
+ * they're preserved across calls. Therefore we need a separate
+ * reply to prevent them from being overwritten. Actions, however,
+ * don't have this requirement, so it's that fine they're destroyed
+ * on the next call. */
error = dpif_linux_flow_get__(dpif, state->flow.key,
state->flow.key_len,
- &state->flow, &state->tmp);
+ &reply, &state->tmp);
+ state->flow.actions = reply.actions;
+ state->flow.actions_len = reply.actions_len;
+
if (error == ENOENT) {
VLOG_DBG("dumped flow disappeared on get");
} else if (error) {
dpif_linux_flow_dump_next_may_destroy_keys(void *state_)
{
struct dpif_linux_flow_state *state = state_;
+ struct dpif_linux_flow flow;
+ struct ofpbuf nlmsg;
- return ofpbuf_size(&state->buffer) ? false : true;
+ /* Check whether there's a flow remaining in the buffer that includes
+ * actions. (If it does not include actions, then we could end up
+ * destroying keys previously returned trying to retrieve its actions
+ * fails.) */
+ return (!nl_dump_peek(&nlmsg, &state->buffer)
+ || dpif_linux_flow_from_ofpbuf(&flow, &nlmsg)
+ || !flow.actions);
}
static int
return dpif_linux_execute__(dpif->dp_ifindex, execute);
}
-#define MAX_OPS 50
-
-static void
+/* Executes, against 'dpif', up to the first 'n_ops' operations in 'ops'.
+ * Returns the number actually executed (at least 1, if 'n_ops' is
+ * positive). */
+static size_t
dpif_linux_operate__(struct dpif_linux *dpif, struct dpif_op **ops, size_t n_ops)
{
+ enum { MAX_OPS = 50 };
struct op_auxdata {
struct nl_transaction txn;
struct nl_transaction *txnsp[MAX_OPS];
size_t i;
- ovs_assert(n_ops <= MAX_OPS);
+ n_ops = MIN(n_ops, MAX_OPS);
for (i = 0; i < n_ops; i++) {
struct op_auxdata *aux = &auxes[i];
struct dpif_op *op = ops[i];
struct dpif_flow_put *put;
struct dpif_flow_del *del;
- struct dpif_execute *execute;
struct dpif_linux_flow flow;
ofpbuf_use_stub(&aux->request,
break;
case DPIF_OP_EXECUTE:
- execute = &op->u.execute;
- dpif_linux_encode_execute(dpif->dp_ifindex, execute,
- &aux->request);
+ /* Can't execute a packet that won't fit in a Netlink attribute. */
+ if (OVS_UNLIKELY(nl_attr_oversized(
+ ofpbuf_size(op->u.execute.packet)))) {
+ /* Report an error immediately if this is the first operation.
+ * Otherwise the easiest thing to do is to postpone to the next
+ * call (when this will be the first operation). */
+ if (i == 0) {
+ VLOG_ERR_RL(&error_rl,
+ "dropping oversized %"PRIu32"-byte packet",
+ ofpbuf_size(op->u.execute.packet));
+ op->error = ENOBUFS;
+ return 1;
+ }
+ n_ops = i;
+ } else {
+ dpif_linux_encode_execute(dpif->dp_ifindex, &op->u.execute,
+ &aux->request);
+ }
+
break;
default:
ofpbuf_uninit(&aux->request);
ofpbuf_uninit(&aux->reply);
}
+
+ return n_ops;
}
static void
struct dpif_linux *dpif = dpif_linux_cast(dpif_);
while (n_ops > 0) {
- size_t chunk = MIN(n_ops, MAX_OPS);
- dpif_linux_operate__(dpif, ops, chunk);
+ size_t chunk = dpif_linux_operate__(dpif, ops, n_ops);
ops += chunk;
n_ops -= chunk;
}