X-Git-Url: http://git.cascardo.eti.br/?a=blobdiff_plain;f=ofproto%2Ffail-open.c;h=a28acefdc9d0feaf4009a3dd7ac178db608cd8af;hb=250bd94d1e500a89c76cac944e660bd9c07ac364;hp=99bbccd3178f88a1b66fb5bf1043b4bd9bb9b190;hpb=e0edde6fee279cdbbf3c179f5f50adaf0c7c7f1e;p=cascardo%2Fovs.git diff --git a/ofproto/fail-open.c b/ofproto/fail-open.c index 99bbccd31..a28acefdc 100644 --- a/ofproto/fail-open.c +++ b/ofproto/fail-open.c @@ -1,5 +1,5 @@ /* - * Copyright (c) 2008, 2009, 2010, 2011, 2012 Nicira, Inc. + * Copyright (c) 2008, 2009, 2010, 2011, 2012, 2013, 2015, 2016 Nicira, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -23,16 +23,18 @@ #include "flow.h" #include "mac-learning.h" #include "odp-util.h" -#include "ofp-util.h" #include "ofpbuf.h" +#include "ofp-actions.h" +#include "ofp-util.h" #include "ofproto.h" #include "ofproto-provider.h" #include "pktbuf.h" +#include "dp-packet.h" #include "poll-loop.h" #include "rconn.h" #include "timeval.h" -#include "vconn.h" -#include "vlog.h" +#include "openvswitch/vconn.h" +#include "openvswitch/vlog.h" VLOG_DEFINE_THIS_MODULE(fail_open); @@ -75,6 +77,7 @@ struct fail_open { int last_disconn_secs; long long int next_bogus_packet_in; struct rconn_packet_counter *bogus_packet_counter; + bool fail_open_active; }; static void fail_open_recover(struct fail_open *); @@ -115,23 +118,32 @@ fail_open_is_active(const struct fail_open *fo) static void send_bogus_packet_ins(struct fail_open *fo) { - struct ofputil_packet_in pin; - uint8_t mac[ETH_ADDR_LEN]; - struct ofpbuf b; + struct eth_addr mac; + struct dp_packet b; - ofpbuf_init(&b, 128); - eth_addr_nicira_random(mac); - compose_benign_packet(&b, "Open vSwitch Controller Probe", 0xa033, mac); + dp_packet_init(&b, 128); + eth_addr_nicira_random(&mac); + compose_rarp(&b, mac); - memset(&pin, 0, sizeof pin); - pin.packet = b.data; - pin.packet_len = b.size; - pin.reason = OFPR_NO_MATCH; - pin.send_len = b.size; - pin.fmd.in_port = OFPP_LOCAL; - connmgr_send_packet_in(fo->connmgr, &pin); + struct ofproto_async_msg am = { + .oam = OAM_PACKET_IN, + .pin = { + .up = { + .packet = dp_packet_data(&b), + .len = dp_packet_size(&b), + .flow_metadata = MATCH_CATCHALL_INITIALIZER, + .flow_metadata.flow.in_port.ofp_port = OFPP_LOCAL, + .flow_metadata.wc.masks.in_port.ofp_port + = u16_to_ofp(UINT16_MAX), + .reason = OFPR_NO_MATCH, + .cookie = OVS_BE64_MAX, + }, + .max_len = UINT16_MAX, + } + }; + connmgr_send_async_msg(fo->connmgr, &am); - ofpbuf_uninit(&b); + dp_packet_uninit(&b); } /* Enter fail-open mode if we should be in it. */ @@ -180,6 +192,7 @@ fail_open_run(struct fail_open *fo) * controller, exits fail open mode. */ void fail_open_maybe_recover(struct fail_open *fo) + OVS_EXCLUDED(ofproto_mutex) { if (fail_open_is_active(fo) && connmgr_is_any_controller_admitted(fo->connmgr)) { @@ -189,15 +202,16 @@ fail_open_maybe_recover(struct fail_open *fo) static void fail_open_recover(struct fail_open *fo) + OVS_EXCLUDED(ofproto_mutex) { - struct cls_rule rule; + struct match match; VLOG_WARN("No longer in fail-open mode"); fo->last_disconn_secs = 0; fo->next_bogus_packet_in = LLONG_MAX; - cls_rule_init_catchall(&rule, FAIL_OPEN_PRIORITY); - ofproto_delete_flow(fo->ofproto, &rule); + match_init_catchall(&match); + ofproto_delete_flow(fo->ofproto, &match, FAIL_OPEN_PRIORITY); } void @@ -210,23 +224,34 @@ fail_open_wait(struct fail_open *fo) void fail_open_flushed(struct fail_open *fo) + OVS_EXCLUDED(ofproto_mutex) { int disconn_secs = connmgr_failure_duration(fo->connmgr); bool open = disconn_secs >= trigger_duration(fo); if (open) { - union ofp_action action; - struct cls_rule rule; + struct ofpbuf ofpacts; + struct match match; /* Set up a flow that matches every packet and directs them to * OFPP_NORMAL. */ - memset(&action, 0, sizeof action); - action.type = htons(OFPAT10_OUTPUT); - action.output.len = htons(sizeof action); - action.output.port = htons(OFPP_NORMAL); + ofpbuf_init(&ofpacts, OFPACT_OUTPUT_SIZE); + ofpact_put_OUTPUT(&ofpacts)->port = OFPP_NORMAL; + + match_init_catchall(&match); + ofproto_add_flow(fo->ofproto, &match, FAIL_OPEN_PRIORITY, + ofpacts.data, ofpacts.size); - cls_rule_init_catchall(&rule, FAIL_OPEN_PRIORITY); - ofproto_add_flow(fo->ofproto, &rule, &action, 1); + ofpbuf_uninit(&ofpacts); } + fo->fail_open_active = open; +} + +/* Returns the number of fail-open rules currently installed in the flow + * table. */ +int +fail_open_count_rules(const struct fail_open *fo) +{ + return fo->fail_open_active != 0; } /* Creates and returns a new struct fail_open for 'ofproto' and 'mgr'. */ @@ -239,12 +264,14 @@ fail_open_create(struct ofproto *ofproto, struct connmgr *mgr) fo->last_disconn_secs = 0; fo->next_bogus_packet_in = LLONG_MAX; fo->bogus_packet_counter = rconn_packet_counter_create(); + fo->fail_open_active = false; return fo; } /* Destroys 'fo'. */ void fail_open_destroy(struct fail_open *fo) + OVS_EXCLUDED(ofproto_mutex) { if (fo) { if (fail_open_is_active(fo)) {