[ovs-dev] [PATCH 06/26] ofproto-dpif-xlate: Make xlate_actions() caller supply action buffer.
Ben Pfaff
blp at nicira.com
Fri Jul 31 20:44:44 UTC 2015
Thanks, I've fixed that now.
On Fri, Jul 31, 2015 at 01:41:42PM -0700, Jarno Rajahalme wrote:
> There was a missing dot in the commit message
>
> > On Jul 31, 2015, at 1:40 PM, Jarno Rajahalme <jrajahalme at nicira.com> wrote:
> >
> > Acked-by: Jarno Rajahalme <jrajahalme at nicira.com>
> >
> >> On Jul 29, 2015, at 11:42 PM, Ben Pfaff <blp at nicira.com> wrote:
> >>
> >> Until now, struct xlate_out has embedded an ofpbuf for actions and a large
> >> stub for it, which xlate_actions() filled in during the flow translation
> >> process This commit removes the embedded ofpbuf and stub, instead putting a
> >> pointer to an ofpbuf into struct xlate_in, for a caller to fill in with a
> >> pointer to its own structure if desired. (If none is supplied,
> >> xlate_actions() uses an internal scratch buffer and destroys it before
> >> returning.)
> >>
> >> This commit eliminates the last large data structure from
> >> struct xlate_out, making the initialization of an entire xlate_out at
> >> the beginning of xlate_actions() now reasonable. More members will be
> >> eliminated in upcoming commits, but this is no longer essential.
> >>
> >> Signed-off-by: Ben Pfaff <blp at nicira.com>
> >> ---
> >> ofproto/ofproto-dpif-upcall.c | 44 +++++++++---------
> >> ofproto/ofproto-dpif-xlate.c | 101 +++++++++++++++++++++---------------------
> >> ofproto/ofproto-dpif-xlate.h | 11 ++---
> >> ofproto/ofproto-dpif.c | 20 ++++++---
> >> 4 files changed, 91 insertions(+), 85 deletions(-)
> >>
> >> diff --git a/ofproto/ofproto-dpif-upcall.c b/ofproto/ofproto-dpif-upcall.c
> >> index 6a02d60..59010c2 100644
> >> --- a/ofproto/ofproto-dpif-upcall.c
> >> +++ b/ofproto/ofproto-dpif-upcall.c
> >> @@ -170,6 +170,7 @@ struct upcall {
> >>
> >> bool xout_initialized; /* True if 'xout' must be uninitialized. */
> >> struct xlate_out xout; /* Result of xlate_actions(). */
> >> + struct ofpbuf odp_actions; /* Datapath actions from xlate_actions(). */
> >> struct flow_wildcards wc; /* Dependencies that megaflow must match. */
> >> struct ofpbuf put_actions; /* Actions 'put' in the fastpath. */
> >>
> >> @@ -190,6 +191,8 @@ struct upcall {
> >> const struct nlattr *key; /* Datapath flow key. */
> >> size_t key_len; /* Datapath flow key length. */
> >> const struct nlattr *out_tun_key; /* Datapath output tunnel key. */
> >> +
> >> + uint64_t odp_actions_stub[1024 / 8]; /* Stub for odp_actions. */
> >> };
> >>
> >> /* 'udpif_key's are responsible for tracking the little bit of state udpif
> >> @@ -706,7 +709,8 @@ recv_upcalls(struct handler *handler)
> >> pkt_metadata_from_flow(&dupcall->packet.md, flow);
> >> flow_extract(&dupcall->packet, flow);
> >>
> >> - error = process_upcall(udpif, upcall, NULL, &upcall->wc);
> >> + error = process_upcall(udpif, upcall,
> >> + &upcall->odp_actions, &upcall->wc);
> >> if (error) {
> >> goto cleanup;
> >> }
> >> @@ -927,6 +931,8 @@ upcall_receive(struct upcall *upcall, const struct dpif_backer *backer,
> >> upcall->pmd_id = pmd_id;
> >> upcall->type = type;
> >> upcall->userdata = userdata;
> >> + ofpbuf_use_stub(&upcall->odp_actions, upcall->odp_actions_stub,
> >> + sizeof upcall->odp_actions_stub);
> >> ofpbuf_init(&upcall->put_actions, 0);
> >>
> >> upcall->xout_initialized = false;
> >> @@ -956,8 +962,7 @@ upcall_xlate(struct udpif *udpif, struct upcall *upcall,
> >> stats.tcp_flags = ntohs(upcall->flow->tcp_flags);
> >>
> >> xlate_in_init(&xin, upcall->ofproto, upcall->flow, upcall->in_port, NULL,
> >> - stats.tcp_flags, upcall->packet, wc);
> >> - xin.odp_actions = odp_actions;
> >> + stats.tcp_flags, upcall->packet, wc, odp_actions);
> >>
> >> if (upcall->type == DPIF_UC_MISS) {
> >> xin.resubmit_stats = &stats;
> >> @@ -1011,8 +1016,7 @@ upcall_xlate(struct udpif *udpif, struct upcall *upcall,
> >>
> >> if (!upcall->xout.slow) {
> >> ofpbuf_use_const(&upcall->put_actions,
> >> - upcall->xout.odp_actions->data,
> >> - upcall->xout.odp_actions->size);
> >> + odp_actions->data, odp_actions->size);
> >> } else {
> >> ofpbuf_init(&upcall->put_actions, 0);
> >> compose_slow_path(udpif, &upcall->xout, upcall->flow,
> >> @@ -1035,6 +1039,7 @@ upcall_uninit(struct upcall *upcall)
> >> if (upcall->xout_initialized) {
> >> xlate_out_uninit(&upcall->xout);
> >> }
> >> + ofpbuf_uninit(&upcall->odp_actions);
> >> ofpbuf_uninit(&upcall->put_actions);
> >> if (upcall->ukey) {
> >> if (!upcall->ukey_persists) {
> >> @@ -1234,7 +1239,7 @@ handle_upcalls(struct udpif *udpif, struct upcall *upcalls,
> >> * actions were composed assuming that the packet contained no
> >> * VLAN. So, we must remove the VLAN header from the packet before
> >> * trying to execute the actions. */
> >> - if (upcall->xout.odp_actions->size) {
> >> + if (upcall->odp_actions.size) {
> >> eth_pop_vlan(CONST_CAST(struct dp_packet *, upcall->packet));
> >> }
> >>
> >> @@ -1272,15 +1277,15 @@ handle_upcalls(struct udpif *udpif, struct upcall *upcalls,
> >> op->dop.u.flow_put.actions_len = ukey->actions->size;
> >> }
> >>
> >> - if (upcall->xout.odp_actions->size) {
> >> + if (upcall->odp_actions.size) {
> >> op = &ops[n_ops++];
> >> op->ukey = NULL;
> >> op->dop.type = DPIF_OP_EXECUTE;
> >> op->dop.u.execute.packet = CONST_CAST(struct dp_packet *, packet);
> >> odp_key_to_pkt_metadata(upcall->key, upcall->key_len,
> >> &op->dop.u.execute.packet->md);
> >> - op->dop.u.execute.actions = upcall->xout.odp_actions->data;
> >> - op->dop.u.execute.actions_len = upcall->xout.odp_actions->size;
> >> + op->dop.u.execute.actions = upcall->odp_actions.data;
> >> + op->dop.u.execute.actions_len = upcall->odp_actions.size;
> >> op->dop.u.execute.needs_help = (upcall->xout.slow & SLOW_ACTION) != 0;
> >> op->dop.u.execute.probe = false;
> >> }
> >> @@ -1663,12 +1668,13 @@ revalidate_ukey(struct udpif *udpif, struct udpif_key *ukey,
> >> const struct dpif_flow_stats *stats, uint64_t reval_seq)
> >> OVS_REQUIRES(ukey->mutex)
> >> {
> >> - uint64_t slow_path_buf[128 / 8];
> >> + uint64_t odp_actions_stub[1024 / 8];
> >> + struct ofpbuf odp_actions = OFPBUF_STUB_INITIALIZER(odp_actions_stub);
> >> +
> >> struct xlate_out xout, *xoutp;
> >> struct netflow *netflow;
> >> struct ofproto_dpif *ofproto;
> >> struct dpif_flow_stats push;
> >> - struct ofpbuf xout_actions;
> >> struct flow flow, dp_mask;
> >> struct flow_wildcards wc;
> >> uint64_t *dp64, *xout64;
> >> @@ -1733,7 +1739,7 @@ revalidate_ukey(struct udpif *udpif, struct udpif_key *ukey,
> >> }
> >>
> >> xlate_in_init(&xin, ofproto, &flow, ofp_in_port, NULL, push.tcp_flags,
> >> - NULL, need_revalidate ? &wc : NULL);
> >> + NULL, need_revalidate ? &wc : NULL, &odp_actions);
> >> if (push.n_packets) {
> >> xin.resubmit_stats = &push;
> >> xin.may_learn = true;
> >> @@ -1747,16 +1753,13 @@ revalidate_ukey(struct udpif *udpif, struct udpif_key *ukey,
> >> goto exit;
> >> }
> >>
> >> - if (!xout.slow) {
> >> - ofpbuf_use_const(&xout_actions, xout.odp_actions->data,
> >> - xout.odp_actions->size);
> >> - } else {
> >> - ofpbuf_use_stack(&xout_actions, slow_path_buf, sizeof slow_path_buf);
> >> + if (xout.slow) {
> >> + ofpbuf_clear(&odp_actions);
> >> compose_slow_path(udpif, &xout, &flow, flow.in_port.odp_port,
> >> - &xout_actions);
> >> + &odp_actions);
> >> }
> >>
> >> - if (!ofpbuf_equal(&xout_actions, ukey->actions)) {
> >> + if (!ofpbuf_equal(&odp_actions, ukey->actions)) {
> >> goto exit;
> >> }
> >>
> >> @@ -1788,6 +1791,7 @@ exit:
> >> netflow_flow_clear(netflow, &flow);
> >> }
> >> xlate_out_uninit(xoutp);
> >> + ofpbuf_uninit(&odp_actions);
> >> return ok;
> >> }
> >>
> >> @@ -1880,7 +1884,7 @@ push_ukey_ops__(struct udpif *udpif, struct ukey_op *ops, size_t n_ops)
> >> struct xlate_in xin;
> >>
> >> xlate_in_init(&xin, ofproto, &flow, ofp_in_port, NULL,
> >> - push->tcp_flags, NULL, NULL);
> >> + push->tcp_flags, NULL, NULL, NULL);
> >> xin.resubmit_stats = push->n_packets ? push : NULL;
> >> xin.may_learn = push->n_packets > 0;
> >> xlate_actions_for_side_effects(&xin);
> >> diff --git a/ofproto/ofproto-dpif-xlate.c b/ofproto/ofproto-dpif-xlate.c
> >> index a219936..eb1e17a 100644
> >> --- a/ofproto/ofproto-dpif-xlate.c
> >> +++ b/ofproto/ofproto-dpif-xlate.c
> >> @@ -187,6 +187,13 @@ struct xlate_ctx {
> >> * caller really wants wildcards. */
> >> struct flow_wildcards *wc;
> >>
> >> + /* Output buffer for datapath actions. When 'xin->odp_actions' is nonnull,
> >> + * this is the same pointer. When 'xin->odp_actions' is null, this points
> >> + * to a scratch ofpbuf. This allows code to add actions to
> >> + * 'ctx->odp_actions' without worrying about whether the caller really
> >> + * wants actions. */
> >> + struct ofpbuf *odp_actions;
> >> +
> >> /* Resubmit statistics, via xlate_table_action(). */
> >> int recurse; /* Current resubmit nesting depth. */
> >> int resubmits; /* Total number of resubmits. */
> >> @@ -1548,7 +1555,7 @@ add_mirror_actions(struct xlate_ctx *ctx, const struct flow *orig_flow)
> >> "%s, which is reserved exclusively for mirroring",
> >> ctx->xbridge->name, in_xbundle->name);
> >> }
> >> - ofpbuf_clear(ctx->xout->odp_actions);
> >> + ofpbuf_clear(ctx->odp_actions);
> >> return;
> >> }
> >>
> >> @@ -2597,7 +2604,7 @@ static void
> >> add_sflow_action(struct xlate_ctx *ctx)
> >> {
> >> ctx->user_cookie_offset = compose_sflow_action(ctx->xbridge,
> >> - ctx->xout->odp_actions,
> >> + ctx->odp_actions,
> >> &ctx->xin->flow, ODPP_NONE);
> >> ctx->sflow_odp_port = 0;
> >> ctx->sflow_n_outputs = 0;
> >> @@ -2608,14 +2615,14 @@ add_sflow_action(struct xlate_ctx *ctx)
> >> static void
> >> add_ipfix_action(struct xlate_ctx *ctx)
> >> {
> >> - compose_ipfix_action(ctx->xbridge, ctx->xout->odp_actions,
> >> + compose_ipfix_action(ctx->xbridge, ctx->odp_actions,
> >> &ctx->xin->flow, ODPP_NONE);
> >> }
> >>
> >> static void
> >> add_ipfix_output_action(struct xlate_ctx *ctx, odp_port_t port)
> >> {
> >> - compose_ipfix_action(ctx->xbridge, ctx->xout->odp_actions,
> >> + compose_ipfix_action(ctx->xbridge, ctx->odp_actions,
> >> &ctx->xin->flow, port);
> >> }
> >>
> >> @@ -2632,7 +2639,7 @@ fix_sflow_action(struct xlate_ctx *ctx)
> >> return;
> >> }
> >>
> >> - cookie = ofpbuf_at(ctx->xout->odp_actions, ctx->user_cookie_offset,
> >> + cookie = ofpbuf_at(ctx->odp_actions, ctx->user_cookie_offset,
> >> sizeof cookie->sflow);
> >> ovs_assert(cookie->type == USER_ACTION_COOKIE_SFLOW);
> >>
> >> @@ -2817,7 +2824,7 @@ build_tunnel_send(struct xlate_ctx *ctx, const struct xport *xport,
> >> }
> >> tnl_push_data.tnl_port = odp_to_u32(tunnel_odp_port);
> >> tnl_push_data.out_port = odp_to_u32(out_dev->odp_port);
> >> - odp_put_tnl_push_action(ctx->xout->odp_actions, &tnl_push_data);
> >> + odp_put_tnl_push_action(ctx->odp_actions, &tnl_push_data);
> >> return 0;
> >> }
> >>
> >> @@ -2924,13 +2931,13 @@ compose_output_action__(struct xlate_ctx *ctx, ofp_port_t ofp_port,
> >> /* Forwarding is disabled by STP and RSTP. Let OFPP_NORMAL and
> >> * the learning action look at the packet, then drop it. */
> >> struct flow old_base_flow = ctx->base_flow;
> >> - size_t old_size = ctx->xout->odp_actions->size;
> >> + size_t old_size = ctx->odp_actions->size;
> >> mirror_mask_t old_mirrors = ctx->xout->mirrors;
> >>
> >> xlate_table_action(ctx, flow->in_port.ofp_port, 0, true, true);
> >> ctx->xout->mirrors = old_mirrors;
> >> ctx->base_flow = old_base_flow;
> >> - ctx->xout->odp_actions->size = old_size;
> >> + ctx->odp_actions->size = old_size;
> >>
> >> /* Undo changes that may have been done for recirculation. */
> >> if (exit_recirculates(ctx)) {
> >> @@ -3023,8 +3030,7 @@ compose_output_action__(struct xlate_ctx *ctx, ofp_port_t ofp_port,
> >> tnl_push_pop_send = true;
> >> } else {
> >> xlate_report(ctx, "output to kernel tunnel");
> >> - commit_odp_tunnel_action(flow, &ctx->base_flow,
> >> - ctx->xout->odp_actions);
> >> + commit_odp_tunnel_action(flow, &ctx->base_flow, ctx->odp_actions);
> >> flow->tunnel = flow_tnl; /* Restore tunnel metadata */
> >> }
> >> } else {
> >> @@ -3047,21 +3053,21 @@ compose_output_action__(struct xlate_ctx *ctx, ofp_port_t ofp_port,
> >> bool use_masked = ctx->xbridge->support.masked_set_action;
> >>
> >> ctx->xout->slow |= commit_odp_actions(flow, &ctx->base_flow,
> >> - ctx->xout->odp_actions,
> >> + ctx->odp_actions,
> >> wc, use_masked);
> >>
> >> if (xr) {
> >> struct ovs_action_hash *act_hash;
> >>
> >> /* Hash action. */
> >> - act_hash = nl_msg_put_unspec_uninit(ctx->xout->odp_actions,
> >> + act_hash = nl_msg_put_unspec_uninit(ctx->odp_actions,
> >> OVS_ACTION_ATTR_HASH,
> >> sizeof *act_hash);
> >> act_hash->hash_alg = xr->hash_alg;
> >> act_hash->hash_basis = xr->hash_basis;
> >>
> >> /* Recirc action. */
> >> - nl_msg_put_u32(ctx->xout->odp_actions, OVS_ACTION_ATTR_RECIRC,
> >> + nl_msg_put_u32(ctx->odp_actions, OVS_ACTION_ATTR_RECIRC,
> >> xr->recirc_id);
> >> } else {
> >>
> >> @@ -3080,14 +3086,14 @@ compose_output_action__(struct xlate_ctx *ctx, ofp_port_t ofp_port,
> >> }
> >>
> >> if (odp_tnl_port != ODPP_NONE) {
> >> - nl_msg_put_odp_port(ctx->xout->odp_actions,
> >> + nl_msg_put_odp_port(ctx->odp_actions,
> >> OVS_ACTION_ATTR_TUNNEL_POP,
> >> odp_tnl_port);
> >> } else {
> >> /* Tunnel push-pop action is not compatible with
> >> * IPFIX action. */
> >> add_ipfix_output_action(ctx, out_port);
> >> - nl_msg_put_odp_port(ctx->xout->odp_actions,
> >> + nl_msg_put_odp_port(ctx->odp_actions,
> >> OVS_ACTION_ATTR_OUTPUT,
> >> out_port);
> >> }
> >> @@ -3145,7 +3151,7 @@ xlate_resubmit_resource_check(struct xlate_ctx *ctx)
> >> MAX_RESUBMIT_RECURSION);
> >> } else if (ctx->resubmits >= MAX_RESUBMITS + MAX_INTERNAL_RESUBMITS) {
> >> VLOG_ERR_RL(&rl, "over %d resubmit actions", MAX_RESUBMITS);
> >> - } else if (ctx->xout->odp_actions->size > UINT16_MAX) {
> >> + } else if (ctx->odp_actions->size > UINT16_MAX) {
> >> VLOG_ERR_RL(&rl, "resubmits yielded over 64 kB of actions");
> >> } else if (ctx->stack.size >= 65536) {
> >> VLOG_ERR_RL(&rl, "resubmits yielded over 64 kB of stack");
> >> @@ -3504,12 +3510,11 @@ execute_controller_action(struct xlate_ctx *ctx, int len,
> >>
> >> use_masked = ctx->xbridge->support.masked_set_action;
> >> ctx->xout->slow |= commit_odp_actions(&ctx->xin->flow, &ctx->base_flow,
> >> - ctx->xout->odp_actions,
> >> + ctx->odp_actions,
> >> ctx->wc, use_masked);
> >>
> >> odp_execute_actions(NULL, &packet, 1, false,
> >> - ctx->xout->odp_actions->data,
> >> - ctx->xout->odp_actions->size, NULL);
> >> + ctx->odp_actions->data, ctx->odp_actions->size, NULL);
> >>
> >> pin = xmalloc(sizeof *pin);
> >> pin->up.packet_len = dp_packet_size(packet);
> >> @@ -3552,7 +3557,7 @@ compose_recirculate_action(struct xlate_ctx *ctx)
> >>
> >> use_masked = ctx->xbridge->support.masked_set_action;
> >> ctx->xout->slow |= commit_odp_actions(&ctx->xin->flow, &ctx->base_flow,
> >> - ctx->xout->odp_actions,
> >> + ctx->odp_actions,
> >> ctx->wc, use_masked);
> >>
> >> recirc_metadata_from_flow(&md, &ctx->xin->flow);
> >> @@ -3584,7 +3589,7 @@ compose_recirculate_action(struct xlate_ctx *ctx)
> >> * fail all revalidations as zero is not a valid recirculation ID. */
> >> }
> >>
> >> - nl_msg_put_u32(ctx->xout->odp_actions, OVS_ACTION_ATTR_RECIRC, id);
> >> + nl_msg_put_u32(ctx->odp_actions, OVS_ACTION_ATTR_RECIRC, id);
> >>
> >> /* Undo changes done by recirculation. */
> >> ctx->action_set.size = ctx->recirc_action_offset;
> >> @@ -3605,7 +3610,7 @@ compose_mpls_push_action(struct xlate_ctx *ctx, struct ofpact_push_mpls *mpls)
> >> bool use_masked = ctx->xbridge->support.masked_set_action;
> >>
> >> ctx->xout->slow |= commit_odp_actions(flow, &ctx->base_flow,
> >> - ctx->xout->odp_actions,
> >> + ctx->odp_actions,
> >> ctx->wc, use_masked);
> >> } else if (n >= FLOW_MAX_MPLS_LABELS) {
> >> if (ctx->xin->packet != NULL) {
> >> @@ -3641,7 +3646,7 @@ compose_mpls_pop_action(struct xlate_ctx *ctx, ovs_be16 eth_type)
> >> ctx->xbridge->name, FLOW_MAX_MPLS_LABELS);
> >> }
> >> ctx->exit = true;
> >> - ofpbuf_clear(ctx->xout->odp_actions);
> >> + ofpbuf_clear(ctx->odp_actions);
> >> }
> >> }
> >>
> >> @@ -3963,12 +3968,12 @@ xlate_sample_action(struct xlate_ctx *ctx,
> >>
> >> use_masked = ctx->xbridge->support.masked_set_action;
> >> ctx->xout->slow |= commit_odp_actions(&ctx->xin->flow, &ctx->base_flow,
> >> - ctx->xout->odp_actions,
> >> + ctx->odp_actions,
> >> ctx->wc, use_masked);
> >>
> >> compose_flow_sample_cookie(os->probability, os->collector_set_id,
> >> os->obs_domain_id, os->obs_point_id, &cookie);
> >> - compose_sample_action(ctx->xbridge, ctx->xout->odp_actions,
> >> + compose_sample_action(ctx->xbridge, ctx->odp_actions,
> >> &ctx->xin->flow, probability, &cookie,
> >> sizeof cookie.flow_sample, ODPP_NONE,
> >> false);
> >> @@ -4533,7 +4538,8 @@ void
> >> xlate_in_init(struct xlate_in *xin, struct ofproto_dpif *ofproto,
> >> const struct flow *flow, ofp_port_t in_port,
> >> struct rule_dpif *rule, uint16_t tcp_flags,
> >> - const struct dp_packet *packet, struct flow_wildcards *wc)
> >> + const struct dp_packet *packet, struct flow_wildcards *wc,
> >> + struct ofpbuf *odp_actions)
> >> {
> >> xin->ofproto = ofproto;
> >> xin->flow = *flow;
> >> @@ -4550,7 +4556,7 @@ xlate_in_init(struct xlate_in *xin, struct ofproto_dpif *ofproto,
> >> xin->report_hook = NULL;
> >> xin->resubmit_stats = NULL;
> >> xin->wc = wc;
> >> - xin->odp_actions = NULL;
> >> + xin->odp_actions = odp_actions;
> >>
> >> /* Do recirc lookup. */
> >> xin->recirc = flow->recirc_id
> >> @@ -4562,9 +4568,6 @@ void
> >> xlate_out_uninit(struct xlate_out *xout)
> >> {
> >> if (xout) {
> >> - if (xout->odp_actions == &xout->odp_actions_buf) {
> >> - ofpbuf_uninit(xout->odp_actions);
> >> - }
> >> xlate_out_free_recircs(xout);
> >> }
> >> }
> >> @@ -4628,8 +4631,8 @@ actions_output_to_local_port(const struct xlate_ctx *ctx)
> >> const struct nlattr *a;
> >> unsigned int left;
> >>
> >> - NL_ATTR_FOR_EACH_UNSAFE (a, left, ctx->xout->odp_actions->data,
> >> - ctx->xout->odp_actions->size) {
> >> + NL_ATTR_FOR_EACH_UNSAFE (a, left, ctx->odp_actions->data,
> >> + ctx->odp_actions->size) {
> >> if (nl_attr_type(a) == OVS_ACTION_ATTR_OUTPUT
> >> && nl_attr_get_odp_port(a) == local_odp_port) {
> >> return true;
> >> @@ -4740,6 +4743,8 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
> >> union mf_subvalue stack_stub[1024 / sizeof(union mf_subvalue)];
> >> uint64_t action_set_stub[1024 / 8];
> >> struct flow_wildcards scratch_wc;
> >> + uint64_t actions_stub[256 / 8];
> >> + struct ofpbuf scratch_actions = OFPBUF_STUB_INITIALIZER(actions_stub);
> >> struct xlate_ctx ctx = {
> >> .xin = xin,
> >> .xout = xout,
> >> @@ -4749,6 +4754,7 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
> >> .stack = OFPBUF_STUB_INITIALIZER(stack_stub),
> >> .rule = xin->rule,
> >> .wc = xin->wc ? xin->wc : &scratch_wc,
> >> + .odp_actions = xin->odp_actions ? xin->odp_actions : &scratch_actions,
> >>
> >> .recurse = 0,
> >> .resubmits = 0,
> >> @@ -4772,6 +4778,7 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
> >> .action_set = OFPBUF_STUB_INITIALIZER(action_set_stub),
> >> };
> >> memset(&ctx.base_flow.tunnel, 0, sizeof ctx.base_flow.tunnel);
> >> + ofpbuf_reserve(ctx.odp_actions, NL_A_U32_SIZE);
> >>
> >> enum slow_path_reason special;
> >> const struct ofpact *ofpacts;
> >> @@ -4804,14 +4811,6 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
> >> * kernel does. If we wish to maintain the original values an action
> >> * needs to be generated. */
> >>
> >> - xout->odp_actions = xin->odp_actions;
> >> - if (!xout->odp_actions) {
> >> - xout->odp_actions = &xout->odp_actions_buf;
> >> - ofpbuf_use_stub(xout->odp_actions, xout->odp_actions_stub,
> >> - sizeof xout->odp_actions_stub);
> >> - }
> >> - ofpbuf_reserve(xout->odp_actions, NL_A_U32_SIZE);
> >> -
> >> if (xin->wc) {
> >> flow_wildcards_init_catchall(ctx.wc);
> >> memset(&ctx.wc->masks.in_port, 0xff, sizeof ctx.wc->masks.in_port);
> >> @@ -4845,7 +4844,7 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
> >> xin->ofpacts_len > 0
> >> ? "actions"
> >> : "rule");
> >> - return;
> >> + goto exit;
> >> }
> >>
> >> /* Set the bridge for post-recirculation processing if needed. */
> >> @@ -4858,7 +4857,7 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
> >> /* Drop the packet if the bridge cannot be found. */
> >> static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 1);
> >> VLOG_WARN_RL(&rl, "Recirculation bridge no longer exists.");
> >> - return;
> >> + goto exit;
> >> }
> >> ctx.xbridge = new_bridge;
> >> }
> >> @@ -4904,7 +4903,7 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
> >>
> >> VLOG_WARN_RL(&rl, "Recirculation context not found for ID %"PRIx32,
> >> flow->recirc_id);
> >> - return;
> >> + goto exit;
> >> }
> >> /* The bridge is now known so obtain its table version. */
> >> ctx.tables_version = ofproto_dpif_get_tables_version(ctx.xbridge->ofproto);
> >> @@ -4989,7 +4988,7 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
> >> if (!xin->recirc) {
> >> add_sflow_action(&ctx);
> >> add_ipfix_action(&ctx);
> >> - sample_actions_len = ctx.xout->odp_actions->size;
> >> + sample_actions_len = ctx.odp_actions->size;
> >> } else {
> >> sample_actions_len = 0;
> >> }
> >> @@ -5002,7 +5001,7 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
> >> if (in_port && (!xport_stp_forward_state(in_port) ||
> >> !xport_rstp_forward_state(in_port))) {
> >> /* Drop all actions added by do_xlate_actions() above. */
> >> - ctx.xout->odp_actions->size = sample_actions_len;
> >> + ctx.odp_actions->size = sample_actions_len;
> >>
> >> /* Undo changes that may have been done for recirculation. */
> >> if (exit_recirculates(&ctx)) {
> >> @@ -5041,14 +5040,14 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
> >> }
> >> }
> >>
> >> - if (nl_attr_oversized(ctx.xout->odp_actions->size)) {
> >> + if (nl_attr_oversized(ctx.odp_actions->size)) {
> >> /* These datapath actions are too big for a Netlink attribute, so we
> >> * can't hand them to the kernel directly. dpif_execute() can execute
> >> * them one by one with help, so just mark the result as SLOW_ACTION to
> >> * prevent the flow from being installed. */
> >> COVERAGE_INC(xlate_actions_oversize);
> >> ctx.xout->slow |= SLOW_ACTION;
> >> - } else if (too_many_output_actions(ctx.xout->odp_actions)) {
> >> + } else if (too_many_output_actions(ctx.odp_actions)) {
> >> COVERAGE_INC(xlate_actions_too_many_output);
> >> ctx.xout->slow |= SLOW_ACTION;
> >> }
> >> @@ -5094,9 +5093,6 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
> >> }
> >> }
> >>
> >> - ofpbuf_uninit(&ctx.stack);
> >> - ofpbuf_uninit(&ctx.action_set);
> >> -
> >> if (xin->wc) {
> >> /* Clear the metadata and register wildcard masks, because we won't
> >> * use non-header fields as part of the cache. */
> >> @@ -5121,6 +5117,11 @@ xlate_actions(struct xlate_in *xin, struct xlate_out *xout)
> >> ctx.wc->masks.vlan_tci |= htons(VLAN_CFI);
> >> }
> >> }
> >> +
> >> +exit:
> >> + ofpbuf_uninit(&ctx.stack);
> >> + ofpbuf_uninit(&ctx.action_set);
> >> + ofpbuf_uninit(&scratch_actions);
> >> }
> >>
> >> /* Sends 'packet' out 'ofport'.
> >> diff --git a/ofproto/ofproto-dpif-xlate.h b/ofproto/ofproto-dpif-xlate.h
> >> index c5648d6..9c9d2f2 100644
> >> --- a/ofproto/ofproto-dpif-xlate.h
> >> +++ b/ofproto/ofproto-dpif-xlate.h
> >> @@ -52,10 +52,6 @@ struct xlate_out {
> >> uint32_t recirc[2]; /* When n_recircs == 1 or 2 */
> >> uint32_t *recircs; /* When 'n_recircs' > 2 */
> >> };
> >> -
> >> - uint64_t odp_actions_stub[256 / 8];
> >> - struct ofpbuf odp_actions_buf;
> >> - struct ofpbuf *odp_actions;
> >> };
> >>
> >> /* Helpers to abstract the recirculation union away. */
> >> @@ -181,9 +177,8 @@ struct xlate_in {
> >> * calling xlate_in_init(). */
> >> struct xlate_cache *xcache;
> >>
> >> - /* Allows callers to optionally supply their own buffer for the resulting
> >> - * odp_actions stored in xlate_out. If NULL, the default buffer will be
> >> - * used. */
> >> + /* If nonnull, flow translation puts the resulting datapath actions in this
> >> + * buffer. If null, flow translation will not produce datapath actions. */
> >> struct ofpbuf *odp_actions;
> >>
> >> /* If nonnull, flow translation populates this with wildcards relevant in
> >> @@ -239,7 +234,7 @@ void xlate_actions(struct xlate_in *, struct xlate_out *);
> >> void xlate_in_init(struct xlate_in *, struct ofproto_dpif *,
> >> const struct flow *, ofp_port_t in_port, struct rule_dpif *,
> >> uint16_t tcp_flags, const struct dp_packet *packet,
> >> - struct flow_wildcards *);
> >> + struct flow_wildcards *, struct ofpbuf *odp_actions);
> >> void xlate_out_uninit(struct xlate_out *);
> >> void xlate_actions_for_side_effects(struct xlate_in *);
> >>
> >> diff --git a/ofproto/ofproto-dpif.c b/ofproto/ofproto-dpif.c
> >> index ab0bf09..078eb90 100644
> >> --- a/ofproto/ofproto-dpif.c
> >> +++ b/ofproto/ofproto-dpif.c
> >> @@ -3660,15 +3660,17 @@ ofproto_dpif_execute_actions(struct ofproto_dpif *ofproto,
> >> rule_dpif_credit_stats(rule, &stats);
> >> }
> >>
> >> + uint64_t odp_actions_stub[1024 / 8];
> >> + struct ofpbuf odp_actions = OFPBUF_STUB_INITIALIZER(odp_actions_stub);
> >> xlate_in_init(&xin, ofproto, flow, flow->in_port.ofp_port, rule,
> >> - stats.tcp_flags, packet, NULL);
> >> + stats.tcp_flags, packet, NULL, &odp_actions);
> >> xin.ofpacts = ofpacts;
> >> xin.ofpacts_len = ofpacts_len;
> >> xin.resubmit_stats = &stats;
> >> xlate_actions(&xin, &xout);
> >>
> >> - execute.actions = xout.odp_actions->data;
> >> - execute.actions_len = xout.odp_actions->size;
> >> + execute.actions = odp_actions.data;
> >> + execute.actions_len = odp_actions.size;
> >>
> >> pkt_metadata_from_flow(&packet->md, flow);
> >> execute.packet = packet;
> >> @@ -3685,6 +3687,7 @@ ofproto_dpif_execute_actions(struct ofproto_dpif *ofproto,
> >> error = dpif_execute(ofproto->backer->dpif, &execute);
> >>
> >> xlate_out_uninit(&xout);
> >> + ofpbuf_uninit(&odp_actions);
> >>
> >> return error;
> >> }
> >> @@ -4466,6 +4469,7 @@ struct trace_ctx {
> >> struct flow flow;
> >> struct flow_wildcards wc;
> >> struct ds *result;
> >> + struct ofpbuf odp_actions;
> >> };
> >>
> >> static void
> >> @@ -4532,7 +4536,7 @@ static void
> >> trace_format_odp(struct ds *result, int level, const char *title,
> >> struct trace_ctx *trace)
> >> {
> >> - struct ofpbuf *odp_actions = trace->xout.odp_actions;
> >> + struct ofpbuf *odp_actions = &trace->odp_actions;
> >>
> >> ds_put_char_multiple(result, '\t', level);
> >> ds_put_format(result, "%s: ", title);
> >> @@ -4891,12 +4895,14 @@ ofproto_trace(struct ofproto_dpif *ofproto, struct flow *flow,
> >> ds_put_char(ds, '\n');
> >>
> >> flow_wildcards_init_catchall(&trace.wc);
> >> + ofpbuf_init(&trace.odp_actions, 0);
> >>
> >> trace.result = ds;
> >> trace.key = flow; /* Original flow key, used for megaflow. */
> >> trace.flow = *flow; /* May be modified by actions. */
> >> xlate_in_init(&trace.xin, ofproto, flow, flow->in_port.ofp_port, NULL,
> >> - ntohs(flow->tcp_flags), packet, &trace.wc);
> >> + ntohs(flow->tcp_flags), packet, &trace.wc,
> >> + &trace.odp_actions);
> >> trace.xin.ofpacts = ofpacts;
> >> trace.xin.ofpacts_len = ofpacts_len;
> >> trace.xin.resubmit_hook = trace_resubmit;
> >> @@ -4909,8 +4915,7 @@ ofproto_trace(struct ofproto_dpif *ofproto, struct flow *flow,
> >> trace_format_megaflow(ds, 0, "Megaflow", &trace);
> >>
> >> ds_put_cstr(ds, "Datapath actions: ");
> >> - format_odp_actions(ds, trace.xout.odp_actions->data,
> >> - trace.xout.odp_actions->size);
> >> + format_odp_actions(ds, trace.odp_actions.data, trace.odp_actions.size);
> >>
> >> if (trace.xout.slow) {
> >> enum slow_path_reason slow;
> >> @@ -4930,6 +4935,7 @@ ofproto_trace(struct ofproto_dpif *ofproto, struct flow *flow,
> >> }
> >>
> >> xlate_out_uninit(&trace.xout);
> >> + ofpbuf_uninit(&trace.odp_actions);
> >> }
> >>
> >> /* Store the current ofprotos in 'ofproto_shash'. Returns a sorted list
> >> --
> >> 2.1.3
> >>
> >> _______________________________________________
> >> dev mailing list
> >> dev at openvswitch.org
> >> http://openvswitch.org/mailman/listinfo/dev
> >
>
More information about the dev
mailing list