[ovs-dev] [PATCH 06/26] ofproto-dpif-xlate: Make xlate_actions() caller supply action buffer.

Jarno Rajahalme jrajahalme at nicira.com
Fri Jul 31 20:40:31 UTC 2015


Acked-by: Jarno Rajahalme <jrajahalme at nicira.com>

> On Jul 29, 2015, at 11:42 PM, Ben Pfaff <blp at nicira.com> wrote:
> 
> Until now, struct xlate_out has embedded an ofpbuf for actions and a large
> stub for it, which xlate_actions() filled in during the flow translation
> process This commit removes the embedded ofpbuf and stub, instead putting a
> pointer to an ofpbuf into struct xlate_in, for a caller to fill in with a
> pointer to its own structure if desired.  (If none is supplied,
> xlate_actions() uses an internal scratch buffer and destroys it before
> returning.)
> 
> This commit eliminates the last large data structure from
> struct xlate_out, making the initialization of an entire xlate_out at
> the beginning of xlate_actions() now reasonable.  More members will be
> eliminated in upcoming commits, but this is no longer essential.
> 
> Signed-off-by: Ben Pfaff <blp at nicira.com>
> ---
> ofproto/ofproto-dpif-upcall.c |  44 +++++++++---------
> ofproto/ofproto-dpif-xlate.c  | 101 +++++++++++++++++++++---------------------
> ofproto/ofproto-dpif-xlate.h  |  11 ++---
> ofproto/ofproto-dpif.c        |  20 ++++++---
> 4 files changed, 91 insertions(+), 85 deletions(-)
> 
> diff --git a/ofproto/ofproto-dpif-upcall.c b/ofproto/ofproto-dpif-upcall.c
> index 6a02d60..59010c2 100644
> --- a/ofproto/ofproto-dpif-upcall.c
> +++ b/ofproto/ofproto-dpif-upcall.c
> @@ -170,6 +170,7 @@ struct upcall {
> 
>     bool xout_initialized;         /* True if 'xout' must be uninitialized. */
>     struct xlate_out xout;         /* Result of xlate_actions(). */
> +    struct ofpbuf odp_actions;     /* Datapath actions from xlate_actions(). */
>     struct flow_wildcards wc;      /* Dependencies that megaflow must match. */
>     struct ofpbuf put_actions;     /* Actions 'put' in the fastpath. */
> 
> @@ -190,6 +191,8 @@ struct upcall {
>     const struct nlattr *key;      /* Datapath flow key. */
>     size_t key_len;                /* Datapath flow key length. */
>     const struct nlattr *out_tun_key;  /* Datapath output tunnel key. */
> +
> +    uint64_t odp_actions_stub[1024 / 8]; /* Stub for odp_actions. */
> };
> 
> /* 'udpif_key's are responsible for tracking the little bit of state udpif
> @@ -706,7 +709,8 @@ recv_upcalls(struct handler *handler)
>         pkt_metadata_from_flow(&dupcall->packet.md, flow);
>         flow_extract(&dupcall->packet, flow);
> 
> -        error = process_upcall(udpif, upcall, NULL, &upcall->wc);
> +        error = process_upcall(udpif, upcall,
> +                               &upcall->odp_actions, &upcall->wc);
>         if (error) {
>             goto cleanup;
>         }
> @@ -927,6 +931,8 @@ upcall_receive(struct upcall *upcall, const struct dpif_backer *backer,
>     upcall->pmd_id = pmd_id;
>     upcall->type = type;
>     upcall->userdata = userdata;
> +    ofpbuf_use_stub(&upcall->odp_actions, upcall->odp_actions_stub,
> +                    sizeof upcall->odp_actions_stub);
>     ofpbuf_init(&upcall->put_actions, 0);
> 
>     upcall->xout_initialized = false;
> @@ -956,8 +962,7 @@ upcall_xlate(struct udpif *udpif, struct upcall *upcall,
>     stats.tcp_flags = ntohs(upcall->flow->tcp_flags);
> 
>     xlate_in_init(&xin, upcall->ofproto, upcall->flow, upcall->in_port, NULL,
> -                  stats.tcp_flags, upcall->packet, wc);
> -    xin.odp_actions = odp_actions;
> +                  stats.tcp_flags, upcall->packet, wc, odp_actions);
> 
>     if (upcall->type == DPIF_UC_MISS) {
>         xin.resubmit_stats = &stats;
> @@ -1011,8 +1016,7 @@ upcall_xlate(struct udpif *udpif, struct upcall *upcall,
> 
>     if (!upcall->xout.slow) {
>         ofpbuf_use_const(&upcall->put_actions,
> -                         upcall->xout.odp_actions->data,
> -                         upcall->xout.odp_actions->size);
> +                         odp_actions->data, odp_actions->size);
>     } else {
>         ofpbuf_init(&upcall->put_actions, 0);
>         compose_slow_path(udpif, &upcall->xout, upcall->flow,
> @@ -1035,6 +1039,7 @@ upcall_uninit(struct upcall *upcall)
>         if (upcall->xout_initialized) {
>             xlate_out_uninit(&upcall->xout);
>         }
> +        ofpbuf_uninit(&upcall->odp_actions);
>         ofpbuf_uninit(&upcall->put_actions);
>         if (upcall->ukey) {
>             if (!upcall->ukey_persists) {
> @@ -1234,7 +1239,7 @@ handle_upcalls(struct udpif *udpif, struct upcall *upcalls,
>              * actions were composed assuming that the packet contained no
>              * VLAN.  So, we must remove the VLAN header from the packet before
>              * trying to execute the actions. */
> -            if (upcall->xout.odp_actions->size) {
> +            if (upcall->odp_actions.size) {
>                 eth_pop_vlan(CONST_CAST(struct dp_packet *, upcall->packet));
>             }
> 
> @@ -1272,15 +1277,15 @@ handle_upcalls(struct udpif *udpif, struct upcall *upcalls,
>             op->dop.u.flow_put.actions_len = ukey->actions->size;
>         }
> 
> -        if (upcall->xout.odp_actions->size) {
> +        if (upcall->odp_actions.size) {
>             op = &ops[n_ops++];
>             op->ukey = NULL;
>             op->dop.type = DPIF_OP_EXECUTE;
>             op->dop.u.execute.packet = CONST_CAST(struct dp_packet *, packet);
>             odp_key_to_pkt_metadata(upcall->key, upcall->key_len,
>                                     &op->dop.u.execute.packet->md);
> -            op->dop.u.execute.actions = upcall->xout.odp_actions->data;
> -            op->dop.u.execute.actions_len = upcall->xout.odp_actions->size;
> +            op->dop.u.execute.actions = upcall->odp_actions.data;
> +            op->dop.u.execute.actions_len = upcall->odp_actions.size;
>             op->dop.u.execute.needs_help = (upcall->xout.slow & SLOW_ACTION) != 0;
>             op->dop.u.execute.probe = false;
>         }
> @@ -1663,12 +1668,13 @@ revalidate_ukey(struct udpif *udpif, struct udpif_key *ukey,
>                 const struct dpif_flow_stats *stats, uint64_t reval_seq)
>     OVS_REQUIRES(ukey->mutex)
> {
> -    uint64_t slow_path_buf[128 / 8];
> +    uint64_t odp_actions_stub[1024 / 8];
> +    struct ofpbuf odp_actions = OFPBUF_STUB_INITIALIZER(odp_actions_stub);
> +
>     struct xlate_out xout, *xoutp;
>     struct netflow *netflow;
>     struct ofproto_dpif *ofproto;
>     struct dpif_flow_stats push;
> -    struct ofpbuf xout_actions;
>     struct flow flow, dp_mask;
>     struct flow_wildcards wc;
>     uint64_t *dp64, *xout64;
> @@ -1733,7 +1739,7 @@ revalidate_ukey(struct udpif *udpif, struct udpif_key *ukey,
>     }
> 
>     xlate_in_init(&xin, ofproto, &flow, ofp_in_port, NULL, push.tcp_flags,
> -                  NULL, need_revalidate ? &wc : NULL);
> +                  NULL, need_revalidate ? &wc : NULL, &odp_actions);
>     if (push.n_packets) {
>         xin.resubmit_stats = &push;
>         xin.may_learn = true;
> @@ -1747,16 +1753,13 @@ revalidate_ukey(struct udpif *udpif, struct udpif_key *ukey,
>         goto exit;
>     }
> 
> -    if (!xout.slow) {
> -        ofpbuf_use_const(&xout_actions, xout.odp_actions->data,
> -                         xout.odp_actions->size);
> -    } else {
> -        ofpbuf_use_stack(&xout_actions, slow_path_buf, sizeof slow_path_buf);
> +    if (xout.slow) {
> +        ofpbuf_clear(&odp_actions);
>         compose_slow_path(udpif, &xout, &flow, flow.in_port.odp_port,
> -                          &xout_actions);
> +                          &odp_actions);
>     }
> 
> -    if (!ofpbuf_equal(&xout_actions, ukey->actions)) {
> +    if (!ofpbuf_equal(&odp_actions, ukey->actions)) {
>         goto exit;
>     }
> 
> @@ -1788,6 +1791,7 @@ exit:
>         netflow_flow_clear(netflow, &flow);
>     }
>     xlate_out_uninit(xoutp);
> +    ofpbuf_uninit(&odp_actions);
>     return ok;
> }
> 
> @@ -1880,7 +1884,7 @@ push_ukey_ops__(struct udpif *udpif, struct ukey_op *ops, size_t n_ops)
>                 struct xlate_in xin;
> 
>                 xlate_in_init(&xin, ofproto, &flow, ofp_in_port, NULL,
> -                              push->tcp_flags, NULL, NULL);
> +                              push->tcp_flags, NULL, NULL, NULL);
>                 xin.resubmit_stats = push->n_packets ? push : NULL;
>                 xin.may_learn = push->n_packets > 0;
>                 xlate_actions_for_side_effects(&xin);
> diff --git a/ofproto/ofproto-dpif-xlate.c b/ofproto/ofproto-dpif-xlate.c
> index a219936..eb1e17a 100644
> --- a/ofproto/ofproto-dpif-xlate.c
> +++ b/ofproto/ofproto-dpif-xlate.c
> @@ -187,6 +187,13 @@ struct xlate_ctx {
>      * caller really wants wildcards. */
>     struct flow_wildcards *wc;
> 
> +    /* Output buffer for datapath actions.  When 'xin->odp_actions' is nonnull,
> +     * this is the same pointer.  When 'xin->odp_actions' is null, this points
> +     * to a scratch ofpbuf.  This allows code to add actions to
> +     * 'ctx->odp_actions' without worrying about whether the caller really
> +     * wants actions. */
> +    struct ofpbuf *odp_actions;
> +
>     /* Resubmit statistics, via xlate_table_action(). */
>     int recurse;                /* Current resubmit nesting depth. */
>     int resubmits;              /* Total number of resubmits. */
> @@ -1548,7 +1555,7 @@ add_mirror_actions(struct xlate_ctx *ctx, const struct flow *orig_flow)
>                          "%s, which is reserved exclusively for mirroring",
>                          ctx->xbridge->name, in_xbundle->name);
>         }
> -        ofpbuf_clear(ctx->xout->odp_actions);
> +        ofpbuf_clear(ctx->odp_actions);
>         return;
>     }
> 
> @@ -2597,7 +2604,7 @@ static void
> add_sflow_action(struct xlate_ctx *ctx)
> {
>     ctx->user_cookie_offset = compose_sflow_action(ctx->xbridge,
> -                                                   ctx->xout->odp_actions,
> +                                                   ctx->odp_actions,
>                                                    &ctx->xin->flow, ODPP_NONE);
>     ctx->sflow_odp_port = 0;
>     ctx->sflow_n_outputs = 0;
> @@ -2608,14 +2615,14 @@ add_sflow_action(struct xlate_ctx *ctx)
> static void
> add_ipfix_action(struct xlate_ctx *ctx)
> {
> -    compose_ipfix_action(ctx->xbridge, ctx->xout->odp_actions,
> +    compose_ipfix_action(ctx->xbridge, ctx->odp_actions,
>                          &ctx->xin->flow, ODPP_NONE);
> }
> 
> static void
> add_ipfix_output_action(struct xlate_ctx *ctx, odp_port_t port)
> {
> -    compose_ipfix_action(ctx->xbridge, ctx->xout->odp_actions,
> +    compose_ipfix_action(ctx->xbridge, ctx->odp_actions,
>                          &ctx->xin->flow, port);
> }
> 
> @@ -2632,7 +2639,7 @@ fix_sflow_action(struct xlate_ctx *ctx)
>         return;
>     }
> 
> -    cookie = ofpbuf_at(ctx->xout->odp_actions, ctx->user_cookie_offset,
> +    cookie = ofpbuf_at(ctx->odp_actions, ctx->user_cookie_offset,
>                        sizeof cookie->sflow);
>     ovs_assert(cookie->type == USER_ACTION_COOKIE_SFLOW);
> 
> @@ -2817,7 +2824,7 @@ build_tunnel_send(struct xlate_ctx *ctx, const struct xport *xport,
>     }
>     tnl_push_data.tnl_port = odp_to_u32(tunnel_odp_port);
>     tnl_push_data.out_port = odp_to_u32(out_dev->odp_port);
> -    odp_put_tnl_push_action(ctx->xout->odp_actions, &tnl_push_data);
> +    odp_put_tnl_push_action(ctx->odp_actions, &tnl_push_data);
>     return 0;
> }
> 
> @@ -2924,13 +2931,13 @@ compose_output_action__(struct xlate_ctx *ctx, ofp_port_t ofp_port,
>                 /* Forwarding is disabled by STP and RSTP.  Let OFPP_NORMAL and
>                  * the learning action look at the packet, then drop it. */
>                 struct flow old_base_flow = ctx->base_flow;
> -                size_t old_size = ctx->xout->odp_actions->size;
> +                size_t old_size = ctx->odp_actions->size;
>                 mirror_mask_t old_mirrors = ctx->xout->mirrors;
> 
>                 xlate_table_action(ctx, flow->in_port.ofp_port, 0, true, true);
>                 ctx->xout->mirrors = old_mirrors;
>                 ctx->base_flow = old_base_flow;
> -                ctx->xout->odp_actions->size = old_size;
> +                ctx->odp_actions->size = old_size;
> 
>                 /* Undo changes that may have been done for recirculation. */
>                 if (exit_recirculates(ctx)) {
> @@ -3023,8 +3030,7 @@ compose_output_action__(struct xlate_ctx *ctx, ofp_port_t ofp_port,
>             tnl_push_pop_send = true;
>         } else {
>             xlate_report(ctx, "output to kernel tunnel");
> -            commit_odp_tunnel_action(flow, &ctx->base_flow,
> -                                     ctx->xout->odp_actions);
> +            commit_odp_tunnel_action(flow, &ctx->base_flow, ctx->odp_actions);
>             flow->tunnel = flow_tnl; /* Restore tunnel metadata */
>         }
>     } else {
> @@ -3047,21 +3053,21 @@ compose_output_action__(struct xlate_ctx *ctx, ofp_port_t ofp_port,
>         bool use_masked = ctx->xbridge->support.masked_set_action;
> 
>         ctx->xout->slow |= commit_odp_actions(flow, &ctx->base_flow,
> -                                              ctx->xout->odp_actions,
> +                                              ctx->odp_actions,
>                                               wc, use_masked);
> 
>         if (xr) {
>             struct ovs_action_hash *act_hash;
> 
>             /* Hash action. */
> -            act_hash = nl_msg_put_unspec_uninit(ctx->xout->odp_actions,
> +            act_hash = nl_msg_put_unspec_uninit(ctx->odp_actions,
>                                                 OVS_ACTION_ATTR_HASH,
>                                                 sizeof *act_hash);
>             act_hash->hash_alg = xr->hash_alg;
>             act_hash->hash_basis = xr->hash_basis;
> 
>             /* Recirc action. */
> -            nl_msg_put_u32(ctx->xout->odp_actions, OVS_ACTION_ATTR_RECIRC,
> +            nl_msg_put_u32(ctx->odp_actions, OVS_ACTION_ATTR_RECIRC,
>                            xr->recirc_id);
>         } else {
> 
> @@ -3080,14 +3086,14 @@ compose_output_action__(struct xlate_ctx *ctx, ofp_port_t ofp_port,
>                 }
> 
>                 if (odp_tnl_port != ODPP_NONE) {
> -                    nl_msg_put_odp_port(ctx->xout->odp_actions,
> +                    nl_msg_put_odp_port(ctx->odp_actions,
>                                         OVS_ACTION_ATTR_TUNNEL_POP,
>                                         odp_tnl_port);
>                 } else {
>                     /* Tunnel push-pop action is not compatible with
>                      * IPFIX action. */
>                     add_ipfix_output_action(ctx, out_port);
> -                    nl_msg_put_odp_port(ctx->xout->odp_actions,
> +                    nl_msg_put_odp_port(ctx->odp_actions,
>                                         OVS_ACTION_ATTR_OUTPUT,
>                                         out_port);
>                }
> @@ -3145,7 +3151,7 @@ xlate_resubmit_resource_check(struct xlate_ctx *ctx)
>                     MAX_RESUBMIT_RECURSION);
>     } else if (ctx->resubmits >= MAX_RESUBMITS + MAX_INTERNAL_RESUBMITS) {
>         VLOG_ERR_RL(&rl, "over %d resubmit actions", MAX_RESUBMITS);
> -    } else if (ctx->xout->odp_actions->size > UINT16_MAX) {
> +    } else if (ctx->odp_actions->size > UINT16_MAX) {
>         VLOG_ERR_RL(&rl, "resubmits yielded over 64 kB of actions");
>     } else if (ctx->stack.size >= 65536) {
>         VLOG_ERR_RL(&rl, "resubmits yielded over 64 kB of stack");
> @@ -3504,12 +3510,11 @@ execute_controller_action(struct xlate_ctx *ctx, int len,
> 
>     use_masked = ctx->xbridge->support.masked_set_action;
>     ctx->xout->slow |= commit_odp_actions(&ctx->xin->flow, &ctx->base_flow,
> -                                          ctx->xout->odp_actions,
> +                                          ctx->odp_actions,
>                                           ctx->wc, use_masked);
> 
>     odp_execute_actions(NULL, &packet, 1, false,
> -                        ctx->xout->odp_actions->data,
> -                        ctx->xout->odp_actions->size, NULL);
> +                        ctx->odp_actions->data, ctx->odp_actions->size, NULL);
> 
>     pin = xmalloc(sizeof *pin);
>     pin->up.packet_len = dp_packet_size(packet);
> @@ -3552,7 +3557,7 @@ compose_recirculate_action(struct xlate_ctx *ctx)
> 
>     use_masked = ctx->xbridge->support.masked_set_action;
>     ctx->xout->slow |= commit_odp_actions(&ctx->xin->flow, &ctx->base_flow,
> -                                          ctx->xout->odp_actions,
> +                                          ctx->odp_actions,
>                                           ctx->wc, use_masked);
> 
>     recirc_metadata_from_flow(&md, &ctx->xin->flow);
> @@ -3584,7 +3589,7 @@ compose_recirculate_action(struct xlate_ctx *ctx)
>          * fail all revalidations as zero is not a valid recirculation ID. */
>     }
> 
> -    nl_msg_put_u32(ctx->xout->odp_actions, OVS_ACTION_ATTR_RECIRC, id);
> +    nl_msg_put_u32(ctx->odp_actions, OVS_ACTION_ATTR_RECIRC, id);
> 
>     /* Undo changes done by recirculation. */
>     ctx->action_set.size = ctx->recirc_action_offset;
> @@ -3605,7 +3610,7 @@ compose_mpls_push_action(struct xlate_ctx *ctx, struct ofpact_push_mpls *mpls)
>         bool use_masked = ctx->xbridge->support.masked_set_action;
> 
>         ctx->xout->slow |= commit_odp_actions(flow, &ctx->base_flow,
> -                                              ctx->xout->odp_actions,
> +                                              ctx->odp_actions,
>                                               ctx->wc, use_masked);
>     } else if (n >= FLOW_MAX_MPLS_LABELS) {
>         if (ctx->xin->packet != NULL) {
> @@ -3641,7 +3646,7 @@ compose_mpls_pop_action(struct xlate_ctx *ctx, ovs_be16 eth_type)
>                          ctx->xbridge->name, FLOW_MAX_MPLS_LABELS);
>         }
>         ctx->exit = true;
> -        ofpbuf_clear(ctx->xout->odp_actions);
> +        ofpbuf_clear(ctx->odp_actions);
>     }
> }
> 
> @@ -3963,12 +3968,12 @@ xlate_sample_action(struct xlate_ctx *ctx,
> 
>     use_masked = ctx->xbridge->support.masked_set_action;
>     ctx->xout->slow |= commit_odp_actions(&ctx->xin->flow, &ctx->base_flow,
> -                                          ctx->xout->odp_actions,
> +                                          ctx->odp_actions,
>                                           ctx->wc, use_masked);
> 
>     compose_flow_sample_cookie(os->probability, os->collector_set_id,
>                                os->obs_domain_id, os->obs_point_id, &cookie);
> -    compose_sample_action(ctx->xbridge, ctx->xout->odp_actions,
> +    compose_sample_action(ctx->xbridge, ctx->odp_actions,
>                           &ctx->xin->flow, probability, &cookie,
>                           sizeof cookie.flow_sample, ODPP_NONE,
>                           false);
> @@ -4533,7 +4538,8 @@ void
> xlate_in_init(struct xlate_in *xin, struct ofproto_dpif *ofproto,
>               const struct flow *flow, ofp_port_t in_port,
>               struct rule_dpif *rule, uint16_t tcp_flags,
> -              const struct dp_packet *packet, struct flow_wildcards *wc)
> +              const struct dp_packet *packet, struct flow_wildcards *wc,
> +              struct ofpbuf *odp_actions)
> {
>     xin->ofproto = ofproto;
>     xin->flow = *flow;
> @@ -4550,7 +4556,7 @@ xlate_in_init(struct xlate_in *xin, struct ofproto_dpif *ofproto,
>     xin->report_hook = NULL;
>     xin->resubmit_stats = NULL;
>     xin->wc = wc;
> -    xin->odp_actions = NULL;
> +    xin->odp_actions = odp_actions;
> 
>     /* Do recirc lookup. */
>     xin->recirc = flow->recirc_id
> @@ -4562,9 +4568,6 @@ void
> xlate_out_uninit(struct xlate_out *xout)
> {
>     if (xout) {
> -        if (xout->odp_actions == &xout->odp_actions_buf) {
> -            ofpbuf_uninit(xout->odp_actions);
> -        }
>         xlate_out_free_recircs(xout);
>     }
> }
> @@ -4628,8 +4631,8 @@ actions_output_to_local_port(const struct xlate_ctx *ctx)
>     const struct nlattr *a;
>     unsigned int left;
> 
> -    NL_ATTR_FOR_EACH_UNSAFE (a, left, ctx->xout->odp_actions->data,
> -                             ctx->xout->odp_actions->size) {
> +    NL_ATTR_FOR_EACH_UNSAFE (a, left, ctx->odp_actions->data,
> +                             ctx->odp_actions->size) {
>         if (nl_attr_type(a) == OVS_ACTION_ATTR_OUTPUT
>             && nl_attr_get_odp_port(a) == local_odp_port) {
>             return true;
> @@ -4740,6 +4743,8 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
>     union mf_subvalue stack_stub[1024 / sizeof(union mf_subvalue)];
>     uint64_t action_set_stub[1024 / 8];
>     struct flow_wildcards scratch_wc;
> +    uint64_t actions_stub[256 / 8];
> +    struct ofpbuf scratch_actions = OFPBUF_STUB_INITIALIZER(actions_stub);
>     struct xlate_ctx ctx = {
>         .xin = xin,
>         .xout = xout,
> @@ -4749,6 +4754,7 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
>         .stack = OFPBUF_STUB_INITIALIZER(stack_stub),
>         .rule = xin->rule,
>         .wc = xin->wc ? xin->wc : &scratch_wc,
> +        .odp_actions = xin->odp_actions ? xin->odp_actions : &scratch_actions,
> 
>         .recurse = 0,
>         .resubmits = 0,
> @@ -4772,6 +4778,7 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
>         .action_set = OFPBUF_STUB_INITIALIZER(action_set_stub),
>     };
>     memset(&ctx.base_flow.tunnel, 0, sizeof ctx.base_flow.tunnel);
> +    ofpbuf_reserve(ctx.odp_actions, NL_A_U32_SIZE);
> 
>     enum slow_path_reason special;
>     const struct ofpact *ofpacts;
> @@ -4804,14 +4811,6 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
>      *   kernel does.  If we wish to maintain the original values an action
>      *   needs to be generated. */
> 
> -    xout->odp_actions = xin->odp_actions;
> -    if (!xout->odp_actions) {
> -        xout->odp_actions = &xout->odp_actions_buf;
> -        ofpbuf_use_stub(xout->odp_actions, xout->odp_actions_stub,
> -                        sizeof xout->odp_actions_stub);
> -    }
> -    ofpbuf_reserve(xout->odp_actions, NL_A_U32_SIZE);
> -
>     if (xin->wc) {
>         flow_wildcards_init_catchall(ctx.wc);
>         memset(&ctx.wc->masks.in_port, 0xff, sizeof ctx.wc->masks.in_port);
> @@ -4845,7 +4844,7 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
>                          xin->ofpacts_len > 0
>                          ? "actions"
>                          : "rule");
> -            return;
> +            goto exit;
>         }
> 
>         /* Set the bridge for post-recirculation processing if needed. */
> @@ -4858,7 +4857,7 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
>                 /* Drop the packet if the bridge cannot be found. */
>                 static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 1);
>                 VLOG_WARN_RL(&rl, "Recirculation bridge no longer exists.");
> -                return;
> +                goto exit;
>             }
>             ctx.xbridge = new_bridge;
>         }
> @@ -4904,7 +4903,7 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
> 
>         VLOG_WARN_RL(&rl, "Recirculation context not found for ID %"PRIx32,
>                      flow->recirc_id);
> -        return;
> +        goto exit;
>     }
>     /* The bridge is now known so obtain its table version. */
>     ctx.tables_version = ofproto_dpif_get_tables_version(ctx.xbridge->ofproto);
> @@ -4989,7 +4988,7 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
>         if (!xin->recirc) {
>             add_sflow_action(&ctx);
>             add_ipfix_action(&ctx);
> -            sample_actions_len = ctx.xout->odp_actions->size;
> +            sample_actions_len = ctx.odp_actions->size;
>         } else {
>             sample_actions_len = 0;
>         }
> @@ -5002,7 +5001,7 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
>             if (in_port && (!xport_stp_forward_state(in_port) ||
>                             !xport_rstp_forward_state(in_port))) {
>                 /* Drop all actions added by do_xlate_actions() above. */
> -                ctx.xout->odp_actions->size = sample_actions_len;
> +                ctx.odp_actions->size = sample_actions_len;
> 
>                 /* Undo changes that may have been done for recirculation. */
>                 if (exit_recirculates(&ctx)) {
> @@ -5041,14 +5040,14 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
>         }
>     }
> 
> -    if (nl_attr_oversized(ctx.xout->odp_actions->size)) {
> +    if (nl_attr_oversized(ctx.odp_actions->size)) {
>         /* These datapath actions are too big for a Netlink attribute, so we
>          * can't hand them to the kernel directly.  dpif_execute() can execute
>          * them one by one with help, so just mark the result as SLOW_ACTION to
>          * prevent the flow from being installed. */
>         COVERAGE_INC(xlate_actions_oversize);
>         ctx.xout->slow |= SLOW_ACTION;
> -    } else if (too_many_output_actions(ctx.xout->odp_actions)) {
> +    } else if (too_many_output_actions(ctx.odp_actions)) {
>         COVERAGE_INC(xlate_actions_too_many_output);
>         ctx.xout->slow |= SLOW_ACTION;
>     }
> @@ -5094,9 +5093,6 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
>         }
>     }
> 
> -    ofpbuf_uninit(&ctx.stack);
> -    ofpbuf_uninit(&ctx.action_set);
> -
>     if (xin->wc) {
>         /* Clear the metadata and register wildcard masks, because we won't
>          * use non-header fields as part of the cache. */
> @@ -5121,6 +5117,11 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
>             ctx.wc->masks.vlan_tci |= htons(VLAN_CFI);
>         }
>     }
> +
> +exit:
> +    ofpbuf_uninit(&ctx.stack);
> +    ofpbuf_uninit(&ctx.action_set);
> +    ofpbuf_uninit(&scratch_actions);
> }
> 
> /* Sends 'packet' out 'ofport'.
> diff --git a/ofproto/ofproto-dpif-xlate.h b/ofproto/ofproto-dpif-xlate.h
> index c5648d6..9c9d2f2 100644
> --- a/ofproto/ofproto-dpif-xlate.h
> +++ b/ofproto/ofproto-dpif-xlate.h
> @@ -52,10 +52,6 @@ struct xlate_out {
>         uint32_t recirc[2];   /* When n_recircs == 1 or 2 */
>         uint32_t *recircs;    /* When 'n_recircs' > 2 */
>     };
> -
> -    uint64_t odp_actions_stub[256 / 8];
> -    struct ofpbuf odp_actions_buf;
> -    struct ofpbuf *odp_actions;
> };
> 
> /* Helpers to abstract the recirculation union away. */
> @@ -181,9 +177,8 @@ struct xlate_in {
>      * calling xlate_in_init(). */
>     struct xlate_cache *xcache;
> 
> -    /* Allows callers to optionally supply their own buffer for the resulting
> -     * odp_actions stored in xlate_out.  If NULL, the default buffer will be
> -     * used. */
> +    /* If nonnull, flow translation puts the resulting datapath actions in this
> +     * buffer.  If null, flow translation will not produce datapath actions. */
>     struct ofpbuf *odp_actions;
> 
>     /* If nonnull, flow translation populates this with wildcards relevant in
> @@ -239,7 +234,7 @@ void xlate_actions(struct xlate_in *, struct xlate_out *);
> void xlate_in_init(struct xlate_in *, struct ofproto_dpif *,
>                    const struct flow *, ofp_port_t in_port, struct rule_dpif *,
>                    uint16_t tcp_flags, const struct dp_packet *packet,
> -                   struct flow_wildcards *);
> +                   struct flow_wildcards *, struct ofpbuf *odp_actions);
> void xlate_out_uninit(struct xlate_out *);
> void xlate_actions_for_side_effects(struct xlate_in *);
> 
> diff --git a/ofproto/ofproto-dpif.c b/ofproto/ofproto-dpif.c
> index ab0bf09..078eb90 100644
> --- a/ofproto/ofproto-dpif.c
> +++ b/ofproto/ofproto-dpif.c
> @@ -3660,15 +3660,17 @@ ofproto_dpif_execute_actions(struct ofproto_dpif *ofproto,
>         rule_dpif_credit_stats(rule, &stats);
>     }
> 
> +    uint64_t odp_actions_stub[1024 / 8];
> +    struct ofpbuf odp_actions = OFPBUF_STUB_INITIALIZER(odp_actions_stub);
>     xlate_in_init(&xin, ofproto, flow, flow->in_port.ofp_port, rule,
> -                  stats.tcp_flags, packet, NULL);
> +                  stats.tcp_flags, packet, NULL, &odp_actions);
>     xin.ofpacts = ofpacts;
>     xin.ofpacts_len = ofpacts_len;
>     xin.resubmit_stats = &stats;
>     xlate_actions(&xin, &xout);
> 
> -    execute.actions = xout.odp_actions->data;
> -    execute.actions_len = xout.odp_actions->size;
> +    execute.actions = odp_actions.data;
> +    execute.actions_len = odp_actions.size;
> 
>     pkt_metadata_from_flow(&packet->md, flow);
>     execute.packet = packet;
> @@ -3685,6 +3687,7 @@ ofproto_dpif_execute_actions(struct ofproto_dpif *ofproto,
>     error = dpif_execute(ofproto->backer->dpif, &execute);
> 
>     xlate_out_uninit(&xout);
> +    ofpbuf_uninit(&odp_actions);
> 
>     return error;
> }
> @@ -4466,6 +4469,7 @@ struct trace_ctx {
>     struct flow flow;
>     struct flow_wildcards wc;
>     struct ds *result;
> +    struct ofpbuf odp_actions;
> };
> 
> static void
> @@ -4532,7 +4536,7 @@ static void
> trace_format_odp(struct ds *result, int level, const char *title,
>                  struct trace_ctx *trace)
> {
> -    struct ofpbuf *odp_actions = trace->xout.odp_actions;
> +    struct ofpbuf *odp_actions = &trace->odp_actions;
> 
>     ds_put_char_multiple(result, '\t', level);
>     ds_put_format(result, "%s: ", title);
> @@ -4891,12 +4895,14 @@ ofproto_trace(struct ofproto_dpif *ofproto, struct flow *flow,
>     ds_put_char(ds, '\n');
> 
>     flow_wildcards_init_catchall(&trace.wc);
> +    ofpbuf_init(&trace.odp_actions, 0);
> 
>     trace.result = ds;
>     trace.key = flow; /* Original flow key, used for megaflow. */
>     trace.flow = *flow; /* May be modified by actions. */
>     xlate_in_init(&trace.xin, ofproto, flow, flow->in_port.ofp_port, NULL,
> -                  ntohs(flow->tcp_flags), packet, &trace.wc);
> +                  ntohs(flow->tcp_flags), packet, &trace.wc,
> +                  &trace.odp_actions);
>     trace.xin.ofpacts = ofpacts;
>     trace.xin.ofpacts_len = ofpacts_len;
>     trace.xin.resubmit_hook = trace_resubmit;
> @@ -4909,8 +4915,7 @@ ofproto_trace(struct ofproto_dpif *ofproto, struct flow *flow,
>     trace_format_megaflow(ds, 0, "Megaflow", &trace);
> 
>     ds_put_cstr(ds, "Datapath actions: ");
> -    format_odp_actions(ds, trace.xout.odp_actions->data,
> -                       trace.xout.odp_actions->size);
> +    format_odp_actions(ds, trace.odp_actions.data, trace.odp_actions.size);
> 
>     if (trace.xout.slow) {
>         enum slow_path_reason slow;
> @@ -4930,6 +4935,7 @@ ofproto_trace(struct ofproto_dpif *ofproto, struct flow *flow,
>     }
> 
>     xlate_out_uninit(&trace.xout);
> +    ofpbuf_uninit(&trace.odp_actions);
> }
> 
> /* Store the current ofprotos in 'ofproto_shash'.  Returns a sorted list
> -- 
> 2.1.3
> 
> _______________________________________________
> dev mailing list
> dev at openvswitch.org
> http://openvswitch.org/mailman/listinfo/dev




More information about the dev mailing list