X-Git-Url: http://git.cascardo.eti.br/?a=blobdiff_plain;f=ofproto%2Fnetflow.c;h=f1b6fbe2d1a2c4e3d2a186e228deff153aa6136b;hb=e4d3706cb9240abe9f39d60b835eef0f221d39ac;hp=a09374999f156d7082be2ac8f9aaec7230575736;hpb=8917f72cbb04fb32dc29f93475bcd2de3011d442;p=cascardo%2Fovs.git diff --git a/ofproto/netflow.c b/ofproto/netflow.c index a09374999..f1b6fbe2d 100644 --- a/ofproto/netflow.c +++ b/ofproto/netflow.c @@ -1,5 +1,5 @@ /* - * Copyright (c) 2008, 2009, 2010, 2011, 2013, 2014 Nicira, Inc. + * Copyright (c) 2008, 2009, 2010, 2011, 2013, 2014, 2015 Nicira, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -33,7 +33,7 @@ #include "socket-util.h" #include "timeval.h" #include "util.h" -#include "vlog.h" +#include "openvswitch/vlog.h" VLOG_DEFINE_THIS_MODULE(netflow); @@ -79,7 +79,7 @@ struct netflow_flow { }; static struct ovs_mutex mutex = OVS_MUTEX_INITIALIZER; -static atomic_uint netflow_count = ATOMIC_VAR_INIT(0); +static atomic_count netflow_count = ATOMIC_COUNT_INIT(0); static struct netflow_flow *netflow_flow_lookup(const struct netflow *, const struct flow *) @@ -90,7 +90,7 @@ static void netflow_expire__(struct netflow *, struct netflow_flow *) static void netflow_run__(struct netflow *) OVS_REQUIRES(mutex); void -netflow_mask_wc(struct flow *flow, struct flow_wildcards *wc) +netflow_mask_wc(const struct flow *flow, struct flow_wildcards *wc) { if (flow->dl_type != htons(ETH_TYPE_IP)) { return; @@ -121,7 +121,6 @@ gen_netflow_rec(struct netflow *nf, struct netflow_flow *nf_flow, nf_hdr->sysuptime = htonl(time_msec() - nf->boot_time); nf_hdr->unix_secs = htonl(now.tv_sec); nf_hdr->unix_nsecs = htonl(now.tv_nsec); - nf_hdr->flow_seq = htonl(nf->netflow_cnt++); nf_hdr->engine_type = nf->engine_type; nf_hdr->engine_id = nf->engine_id; nf_hdr->sampling_interval = htons(0); @@ -129,6 +128,7 @@ gen_netflow_rec(struct netflow *nf, struct netflow_flow *nf_flow, nf_hdr = nf->packet.data; nf_hdr->count = htons(ntohs(nf_hdr->count) + 1); + nf_hdr->flow_seq = htonl(nf->netflow_cnt++); nf_rec = ofpbuf_put_zeros(&nf->packet, sizeof *nf_rec); nf_rec->src_addr = nf_flow->nw_src; @@ -270,14 +270,14 @@ netflow_expire__(struct netflow *nf, struct netflow_flow *nf_flow) } /* Update flow tracking data. */ - nf_flow->created = 0; nf_flow->packet_count = 0; nf_flow->byte_count = 0; nf_flow->tcp_flags = 0; } void -netflow_expire(struct netflow *nf, struct flow *flow) OVS_EXCLUDED(mutex) +netflow_flow_clear(struct netflow *nf, const struct flow *flow) + OVS_EXCLUDED(mutex) { struct netflow_flow *nf_flow; @@ -285,20 +285,6 @@ netflow_expire(struct netflow *nf, struct flow *flow) OVS_EXCLUDED(mutex) nf_flow = netflow_flow_lookup(nf, flow); if (nf_flow) { netflow_expire__(nf, nf_flow); - } - ovs_mutex_unlock(&mutex); -} - -void -netflow_flow_clear(struct netflow *nf, struct flow *flow) OVS_EXCLUDED(mutex) -{ - struct netflow_flow *nf_flow; - - ovs_mutex_lock(&mutex); - nf_flow = netflow_flow_lookup(nf, flow); - if (nf_flow) { - ovs_assert(!nf_flow->packet_count); - ovs_assert(!nf_flow->byte_count); hmap_remove(&nf->flows, &nf_flow->hmap_node); free(nf_flow); } @@ -396,7 +382,6 @@ struct netflow * netflow_create(void) { struct netflow *nf = xzalloc(sizeof *nf); - int junk; nf->engine_type = 0; nf->engine_id = 0; @@ -407,7 +392,7 @@ netflow_create(void) hmap_init(&nf->flows); ovs_refcount_init(&nf->ref_cnt); ofpbuf_init(&nf->packet, 1500); - atomic_add(&netflow_count, 1, &junk); + atomic_count_inc(&netflow_count); return nf; } @@ -424,24 +409,22 @@ netflow_ref(const struct netflow *nf_) void netflow_unref(struct netflow *nf) { - if (nf && ovs_refcount_unref(&nf->ref_cnt) == 1) { - int orig; - - atomic_sub(&netflow_count, 1, &orig); + if (nf && ovs_refcount_unref_relaxed(&nf->ref_cnt) == 1) { + atomic_count_dec(&netflow_count); collectors_destroy(nf->collectors); ofpbuf_uninit(&nf->packet); free(nf); } } -/* Returns true if there exist any netflow objects, false otherwise. */ +/* Returns true if there exist any netflow objects, false otherwise. + * Callers must cope with transient false positives, i.e., there is no tight + * synchronization with the count and the actual existence of netflow objects. + */ bool netflow_exists(void) { - int n; - - atomic_read(&netflow_count, &n); - return n > 0; + return atomic_count_get(&netflow_count) > 0; } /* Helpers. */ @@ -473,13 +456,13 @@ netflow_flow_hash(const struct flow *flow) { uint32_t hash = 0; - hash = mhash_add(hash, (OVS_FORCE uint32_t) flow->in_port.ofp_port); - hash = mhash_add(hash, ntohl(flow->nw_src)); - hash = mhash_add(hash, ntohl(flow->nw_dst)); - hash = mhash_add(hash, flow->nw_tos); - hash = mhash_add(hash, flow->nw_proto); - hash = mhash_add(hash, ntohs(flow->tp_src)); - hash = mhash_add(hash, ntohs(flow->tp_dst)); + hash = hash_add(hash, (OVS_FORCE uint32_t) flow->in_port.ofp_port); + hash = hash_add(hash, ntohl(flow->nw_src)); + hash = hash_add(hash, ntohl(flow->nw_dst)); + hash = hash_add(hash, flow->nw_tos); + hash = hash_add(hash, flow->nw_proto); + hash = hash_add(hash, ntohs(flow->tp_src)); + hash = hash_add(hash, ntohs(flow->tp_dst)); - return mhash_finish(hash, 28); + return hash_finish(hash, 28); }