@@ -194,13 +194,13 @@ is_switch(const struct sbrec_datapath_binding *ldp)
}
-/* Adds the logical flows from the Logical_Flow table to 'flow_table'. */
+/* Adds the logical flows from the Logical_Flow table to flow tables. */
static void
add_logical_flows(struct controller_ctx *ctx, const struct lport_index *lports,
const struct mcgroup_index *mcgroups,
const struct hmap *local_datapaths,
const struct hmap *patched_datapaths,
- const struct simap *ct_zones, struct hmap *flow_table)
+ const struct simap *ct_zones)
{
uint32_t conj_id_ofs = 1;
@@ -339,8 +339,8 @@ add_logical_flows(struct controller_ctx *ctx, const struct lport_index *lports,
m->match.flow.conj_id += conj_id_ofs;
}
if (!m->n) {
- ofctrl_add_flow(flow_table, ptable, lflow->priority,
- &m->match, &ofpacts);
+ ofctrl_add_flow(ptable, lflow->priority, &m->match, &ofpacts,
+ &lflow->header_.uuid, true);
} else {
uint64_t conj_stubs[64 / 8];
struct ofpbuf conj;
@@ -355,8 +355,8 @@ add_logical_flows(struct controller_ctx *ctx, const struct lport_index *lports,
dst->clause = src->clause;
dst->n_clauses = src->n_clauses;
}
- ofctrl_add_flow(flow_table, ptable, lflow->priority,
- &m->match, &conj);
+ ofctrl_add_flow(ptable, lflow->priority, &m->match, &conj,
+ &lflow->header_.uuid, true);
ofpbuf_uninit(&conj);
}
}
@@ -383,12 +383,12 @@ put_load(const uint8_t *data, size_t len,
bitwise_one(&sf->mask, sf->field->n_bytes, ofs, n_bits);
}
-/* Adds an OpenFlow flow to 'flow_table' for each MAC binding in the OVN
+/* Adds an OpenFlow flow to flow tables for each MAC binding in the OVN
* southbound database, using 'lports' to resolve logical port names to
* numbers. */
static void
add_neighbor_flows(struct controller_ctx *ctx,
- const struct lport_index *lports, struct hmap *flow_table)
+ const struct lport_index *lports)
{
struct ofpbuf ofpacts;
struct match match;
@@ -424,8 +424,8 @@ add_neighbor_flows(struct controller_ctx *ctx,
ofpbuf_clear(&ofpacts);
put_load(mac.ea, sizeof mac.ea, MFF_ETH_DST, 0, 48, &ofpacts);
- ofctrl_add_flow(flow_table, OFTABLE_MAC_BINDING, 100,
- &match, &ofpacts);
+ ofctrl_add_flow(OFTABLE_MAC_BINDING, 100, &match, &ofpacts,
+ &b->header_.uuid, true);
}
ofpbuf_uninit(&ofpacts);
}
@@ -437,11 +437,11 @@ lflow_run(struct controller_ctx *ctx, const struct lport_index *lports,
const struct mcgroup_index *mcgroups,
const struct hmap *local_datapaths,
const struct hmap *patched_datapaths,
- const struct simap *ct_zones, struct hmap *flow_table)
+ const struct simap *ct_zones)
{
add_logical_flows(ctx, lports, mcgroups, local_datapaths,
- patched_datapaths, ct_zones, flow_table);
- add_neighbor_flows(ctx, lports, flow_table);
+ patched_datapaths, ct_zones);
+ add_neighbor_flows(ctx, lports);
}
void
@@ -63,8 +63,7 @@ void lflow_run(struct controller_ctx *, const struct lport_index *,
const struct mcgroup_index *,
const struct hmap *local_datapaths,
const struct hmap *patched_datapaths,
- const struct simap *ct_zones,
- struct hmap *flow_table);
+ const struct simap *ct_zones);
void lflow_destroy(void);
#endif /* ovn/lflow.h */
@@ -16,7 +16,9 @@
#include <config.h>
#include "byte-order.h"
#include "dirs.h"
+#include "flow.h"
#include "hash.h"
+#include "hindex.h"
#include "hmap.h"
#include "ofctrl.h"
#include "openflow/openflow.h"
@@ -40,19 +42,23 @@ VLOG_DEFINE_THIS_MODULE(ofctrl);
/* An OpenFlow flow. */
struct ovn_flow {
/* Key. */
- struct hmap_node hmap_node;
+ struct hmap_node match_hmap_node; /* For match based hashing. */
+ struct hindex_node uuid_hmap_node; /* For uuid based hashing. */
uint8_t table_id;
uint16_t priority;
- struct match match;
+ struct uuid uuid;
/* Data. */
+ struct match match;
struct ofpact *ofpacts;
size_t ofpacts_len;
};
-static uint32_t ovn_flow_hash(const struct ovn_flow *);
-static struct ovn_flow *ovn_flow_lookup(struct hmap *flow_table,
- const struct ovn_flow *target);
+static uint32_t ovn_flow_match_hash(const struct ovn_flow *);
+static struct ovn_flow *ovn_flow_lookup_by_uuid(struct hindex *,
+ const struct ovn_flow *target);
+static struct ovn_flow *ovn_flow_lookup_by_match(struct hmap *,
+ const struct ovn_flow *target);
static char *ovn_flow_to_string(const struct ovn_flow *);
static void ovn_flow_log(const struct ovn_flow *, const char *action);
static void ovn_flow_destroy(struct ovn_flow *);
@@ -100,11 +106,13 @@ static struct hmap installed_flows;
* S_CLEAR_FLOWS or S_UPDATE_FLOWS, this is really the option we have. */
static enum mf_field_id mff_ovn_geneve;
-static void ovn_flow_table_clear(struct hmap *flow_table);
-static void ovn_flow_table_destroy(struct hmap *flow_table);
+static void ovn_flow_table_destroy(void);
static void ofctrl_recv(const struct ofp_header *, enum ofptype);
+static struct hmap match_flow_table = HMAP_INITIALIZER(&match_flow_table);
+static struct hindex uuid_flow_table = HINDEX_INITIALIZER(&uuid_flow_table);
+
void
ofctrl_init(void)
{
@@ -313,7 +321,7 @@ run_S_CLEAR_FLOWS(void)
VLOG_DBG("clearing all flows");
/* Clear installed_flows, to match the state of the switch. */
- ovn_flow_table_clear(&installed_flows);
+ ovn_flow_table_clear();
state = S_UPDATE_FLOWS;
}
@@ -431,7 +439,7 @@ void
ofctrl_destroy(void)
{
rconn_destroy(swconn);
- ovn_flow_table_destroy(&installed_flows);
+ ovn_flow_table_destroy();
rconn_packet_counter_destroy(tx_counter);
}
@@ -464,63 +472,132 @@ ofctrl_recv(const struct ofp_header *oh, enum ofptype type)
}
}
-/* Flow table interface to the rest of ovn-controller. */
+/* Flow table interfaces to the rest of ovn-controller. */
-/* Adds a flow to 'desired_flows' with the specified 'match' and 'actions' to
+/* Adds a flow to flow tables with the specified 'match' and 'actions' to
* the OpenFlow table numbered 'table_id' with the given 'priority'. The
* caller retains ownership of 'match' and 'actions'.
*
- * This just assembles the desired flow table in memory. Nothing is actually
+ * Because it is possible for both actions and matches to change on a rule,
+ * and because the hmap struct only supports a single hash, this method
+ * uses two hashing mechanisms - a map that uses table_id+priority+matches
+ * for its hash and an index that uses the appropriate ovsdb row UUID
+ * alone.
+ *
+ * This just assembles the desired flow tables in memory. Nothing is actually
* sent to the switch until a later call to ofctrl_run().
*
- * The caller should initialize its own hmap to hold the flows. */
+ * The is_new boolean is used when tracking changes to indicate whether
+ * or not the logical flow driving the flow to be added is a new one or
+ * previously existed and has been modified. */
void
-ofctrl_add_flow(struct hmap *desired_flows,
- uint8_t table_id, uint16_t priority,
- const struct match *match, const struct ofpbuf *actions)
+ofctrl_add_flow(uint8_t table_id, uint16_t priority,
+ const struct match *match, const struct ofpbuf *actions,
+ const struct uuid *uuid, bool is_new)
{
+ /* Structure that uses table_id+priority+various things as hashes. */
struct ovn_flow *f = xmalloc(sizeof *f);
f->table_id = table_id;
f->priority = priority;
f->match = *match;
f->ofpacts = xmemdup(actions->data, actions->size);
f->ofpacts_len = actions->size;
- f->hmap_node.hash = ovn_flow_hash(f);
+ memcpy(&f->uuid, uuid, sizeof f->uuid);
+ f->match_hmap_node.hash = ovn_flow_match_hash(f);
+ f->uuid_hmap_node.hash = uuid_hash(&f->uuid);
- if (ovn_flow_lookup(desired_flows, f)) {
- static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(5, 5);
- if (!VLOG_DROP_INFO(&rl)) {
- char *s = ovn_flow_to_string(f);
- VLOG_INFO("dropping duplicate flow: %s", s);
- free(s);
+ if (!is_new) {
+ struct ovn_flow *d = ovn_flow_lookup_by_match(&match_flow_table, f);
+ if (!d) {
+ d = ovn_flow_lookup_by_uuid(&uuid_flow_table, f);
}
- ovn_flow_destroy(f);
- return;
+ if (d) {
+ hmap_remove(&match_flow_table, &d->match_hmap_node);
+ hindex_remove(&uuid_flow_table, &d->uuid_hmap_node);
+ ovn_flow_destroy(d);
+ }
+ } else {
+ /* This is an insert operation, so check to see if this
+ * is a duplicate via the match hash. If so, then
+ * check if the actions have changed. If it is a complete
+ * duplicate (i.e. the actions are the same) drop the new
+ * flow. If not, then drop the old flow as superseded.
+ * If the new rule is not a duplicate, check the action
+ * hash to see if this flow is superseding a previous
+ * flow and if so, drop the old flow and insert the
+ * new one. */
+
+ struct ovn_flow *d = ovn_flow_lookup_by_match(&match_flow_table, f);
+
+ if (d) {
+ if (ofpacts_equal(f->ofpacts, f->ofpacts_len,
+ d->ofpacts, d->ofpacts_len)) {
+ ovn_flow_destroy(f);
+ return;
+ }
+ hmap_remove(&match_flow_table, &d->match_hmap_node);
+ hindex_remove(&uuid_flow_table, &d->uuid_hmap_node);
+ ovn_flow_destroy(d);
+ }
}
+ hmap_insert(&match_flow_table, &f->match_hmap_node,
+ f->match_hmap_node.hash);
+ hindex_insert(&uuid_flow_table, &f->uuid_hmap_node,
+ f->uuid_hmap_node.hash);
+}
- hmap_insert(desired_flows, &f->hmap_node, f->hmap_node.hash);
+/* Removes a bundles of flows from the flow table. */
+
+void
+ofctrl_remove_flows(const struct uuid *uuid)
+{
+ struct ovn_flow *f, *next;
+ HMAP_FOR_EACH_SAFE (f, next, match_hmap_node, &match_flow_table) {
+ if (uuid_equals(&f->uuid, uuid)) {
+ hmap_remove(&match_flow_table, &f->match_hmap_node);
+ hindex_remove(&uuid_flow_table, &f->uuid_hmap_node);
+ ovn_flow_destroy(f);
+ }
+ }
}
+
/* ovn_flow. */
-/* Returns a hash of the key in 'f'. */
+/* Duplicate an ovn_flow structure. */
+struct ovn_flow *
+ofctrl_dup_flow(struct ovn_flow *source)
+{
+ struct ovn_flow *answer = xmalloc(sizeof *answer);
+ answer->table_id = source->table_id;
+ answer->priority = source->priority;
+ answer->match = source->match;
+ answer->ofpacts = xmemdup(source->ofpacts, source->ofpacts_len);
+ answer->ofpacts_len = source->ofpacts_len;
+ answer->uuid = source->uuid;
+ answer->match_hmap_node.hash = ovn_flow_match_hash(answer);
+ answer->uuid_hmap_node.hash = uuid_hash(&source->uuid);
+ return answer;
+}
+
+/* Returns a hash of the match key in 'f'. */
static uint32_t
-ovn_flow_hash(const struct ovn_flow *f)
+ovn_flow_match_hash(const struct ovn_flow *f)
{
return hash_2words((f->table_id << 16) | f->priority,
match_hash(&f->match, 0));
-
}
/* Finds and returns an ovn_flow in 'flow_table' whose key is identical to
- * 'target''s key, or NULL if there is none. */
+ * 'target''s key, or NULL if there is none, using the match hashmap. */
static struct ovn_flow *
-ovn_flow_lookup(struct hmap *flow_table, const struct ovn_flow *target)
+ovn_flow_lookup_by_match(struct hmap* flow_table,
+ const struct ovn_flow *target)
{
struct ovn_flow *f;
- HMAP_FOR_EACH_WITH_HASH (f, hmap_node, target->hmap_node.hash,
+ HMAP_FOR_EACH_WITH_HASH (f, match_hmap_node, target->match_hmap_node.hash,
flow_table) {
if (f->table_id == target->table_id
&& f->priority == target->priority
@@ -531,6 +608,50 @@ ovn_flow_lookup(struct hmap *flow_table, const struct ovn_flow *target)
return NULL;
}
+/* Find the first flow that the target flow can replace. The target flow
+ * can replace a flow in the flow table that:
+ * 1) has the same uuid as the target flow (i.e. comes from the same
+ * ovsdb table row),
+ * 2) has the same table_id and priority as the target flow,
+ * 3) either has the same match criteria as the target flow, or
+ has a match criteria that is either a proper subset or proper
+ superset of the target flow.
+ *
+ * The reason for the proper set and proper subet part of condition 3
+ * is that adding/removing logical flow criteria will lead to flows
+ * being either more or less specific and we want to find and replace
+ * the right flow to maintain correct behavior. */
+static struct ovn_flow *
+ovn_flow_lookup_by_uuid(struct hindex* flow_table,
+ const struct ovn_flow *target)
+{
+ struct ovn_flow *f;
+
+ HINDEX_FOR_EACH_WITH_HASH (f, uuid_hmap_node,
+ target->uuid_hmap_node.hash, flow_table) {
+ if (f->table_id == target->table_id
+ && f->priority == target->priority
+ && (match_equal(&f->match, &target->match)
+ || ((flow_wildcards_has_extra(&f->match.wc,
+ &target->match.wc)
+ && flow_equal_except(&f->match.flow,
+ &target->match.flow,
+ &f->match.wc)
+ && !flow_wildcards_has_extra(&target->match.wc,
+ &f->match.wc))
+ || (flow_wildcards_has_extra(&target->match.wc,
+ &f->match.wc)
+ && flow_equal_except(&target->match.flow,
+ &f->match.flow,
+ &target->match.wc)
+ && !flow_wildcards_has_extra(&f->match.wc,
+ &target->match.wc))))) {
+ return f;
+ }
+ }
+ return NULL;
+}
+
static char *
ovn_flow_to_string(const struct ovn_flow *f)
{
@@ -558,26 +679,29 @@ ovn_flow_destroy(struct ovn_flow *f)
{
if (f) {
free(f->ofpacts);
- free(f);
}
+ free(f);
}
/* Flow tables of struct ovn_flow. */
-static void
-ovn_flow_table_clear(struct hmap *flow_table)
+void
+ovn_flow_table_clear(void)
{
- struct ovn_flow *f;
- HMAP_FOR_EACH_POP (f, hmap_node, flow_table) {
+ struct ovn_flow *f, *next;
+ HMAP_FOR_EACH_SAFE (f, next, match_hmap_node, &match_flow_table) {
+ hmap_remove(&match_flow_table, &f->match_hmap_node);
+ hindex_remove(&uuid_flow_table, &f->uuid_hmap_node);
ovn_flow_destroy(f);
}
}
static void
-ovn_flow_table_destroy(struct hmap *flow_table)
+ovn_flow_table_destroy(void)
{
- ovn_flow_table_clear(flow_table);
- hmap_destroy(flow_table);
+ ovn_flow_table_clear();
+ hmap_destroy(&match_flow_table);
+ hindex_destroy(&uuid_flow_table);
}
/* Flow table update. */
@@ -597,19 +721,16 @@ queue_flow_mod(struct ofputil_flow_mod *fm)
* flows from 'flow_table' and frees them. (The hmap itself isn't
* destroyed.)
*
- * This called be called be ofctrl_run() within the main loop. */
+ * This can be called by ofctrl_run() within the main loop. */
void
-ofctrl_put(struct hmap *flow_table)
+ofctrl_put(void)
{
/* The flow table can be updated if the connection to the switch is up and
* in the correct state and not backlogged with existing flow_mods. (Our
* criteria for being backlogged appear very conservative, but the socket
- * between ovn-controller and OVS provides some buffering.) Otherwise,
- * discard the flows. A solution to either of those problems will cause us
- * to wake up and retry. */
+ * between ovn-controller and OVS provides some buffering.) */
if (state != S_UPDATE_FLOWS
|| rconn_packet_counter_n_packets(tx_counter)) {
- ovn_flow_table_clear(flow_table);
return;
}
@@ -617,8 +738,8 @@ ofctrl_put(struct hmap *flow_table)
* longer desired, delete them; if any of them should have different
* actions, update them. */
struct ovn_flow *i, *next;
- HMAP_FOR_EACH_SAFE (i, next, hmap_node, &installed_flows) {
- struct ovn_flow *d = ovn_flow_lookup(flow_table, i);
+ HMAP_FOR_EACH_SAFE (i, next, match_hmap_node, &installed_flows) {
+ struct ovn_flow *d = ovn_flow_lookup_by_match(&match_flow_table, i);
if (!d) {
/* Installed flow is no longer desirable. Delete it from the
* switch and from installed_flows. */
@@ -629,9 +750,9 @@ ofctrl_put(struct hmap *flow_table)
.command = OFPFC_DELETE_STRICT,
};
queue_flow_mod(&fm);
- ovn_flow_log(i, "removing");
+ ovn_flow_log(i, "removing installed");
- hmap_remove(&installed_flows, &i->hmap_node);
+ hmap_remove(&installed_flows, &i->match_hmap_node);
ovn_flow_destroy(i);
} else {
if (!ofpacts_equal(i->ofpacts, i->ofpacts_len,
@@ -646,40 +767,38 @@ ofctrl_put(struct hmap *flow_table)
.command = OFPFC_MODIFY_STRICT,
};
queue_flow_mod(&fm);
- ovn_flow_log(i, "updating");
+ ovn_flow_log(i, "updating installed");
/* Replace 'i''s actions by 'd''s. */
free(i->ofpacts);
- i->ofpacts = d->ofpacts;
+ i->ofpacts = xmemdup(d->ofpacts, d->ofpacts_len);
i->ofpacts_len = d->ofpacts_len;
- d->ofpacts = NULL;
- d->ofpacts_len = 0;
}
-
- hmap_remove(flow_table, &d->hmap_node);
- ovn_flow_destroy(d);
}
}
- /* The previous loop removed from 'flow_table' all of the flows that are
- * already installed. Thus, any flows remaining in 'flow_table' need to
- * be added to the flow table. */
+ /* Iterate through the new flows and add those that aren't found
+ * in the installed flow table. */
struct ovn_flow *d;
- HMAP_FOR_EACH_SAFE (d, next, hmap_node, flow_table) {
- /* Send flow_mod to add flow. */
- struct ofputil_flow_mod fm = {
- .match = d->match,
- .priority = d->priority,
- .table_id = d->table_id,
- .ofpacts = d->ofpacts,
- .ofpacts_len = d->ofpacts_len,
- .command = OFPFC_ADD,
- };
- queue_flow_mod(&fm);
- ovn_flow_log(d, "adding");
-
- /* Move 'd' from 'flow_table' to installed_flows. */
- hmap_remove(flow_table, &d->hmap_node);
- hmap_insert(&installed_flows, &d->hmap_node, d->hmap_node.hash);
+ HMAP_FOR_EACH_SAFE (d, next, match_hmap_node, &match_flow_table) {
+ struct ovn_flow *i = ovn_flow_lookup_by_match(&installed_flows, d);
+ if (!i) {
+ /* Send flow_mod to add flow. */
+ struct ofputil_flow_mod fm = {
+ .match = d->match,
+ .priority = d->priority,
+ .table_id = d->table_id,
+ .ofpacts = d->ofpacts,
+ .ofpacts_len = d->ofpacts_len,
+ .command = OFPFC_ADD,
+ };
+ queue_flow_mod(&fm);
+ ovn_flow_log(d, "adding installed");
+
+ /* Copy 'd' from 'flow_table' to installed_flows. */
+ struct ovn_flow *new_node = ofctrl_dup_flow(d);
+ hmap_insert(&installed_flows, &new_node->match_hmap_node,
+ new_node->match_hmap_node.hash);
+ }
}
}
@@ -20,6 +20,7 @@
#include <stdint.h>
#include "openvswitch/meta-flow.h"
+#include "ovsdb-idl.h"
struct controller_ctx;
struct hmap;
@@ -30,12 +31,21 @@ struct ovsrec_bridge;
/* Interface for OVN main loop. */
void ofctrl_init(void);
enum mf_field_id ofctrl_run(const struct ovsrec_bridge *br_int);
-void ofctrl_put(struct hmap *flows);
+void ofctrl_put(void);
void ofctrl_wait(void);
void ofctrl_destroy(void);
-/* Flow table interface to the rest of ovn-controller. */
-void ofctrl_add_flow(struct hmap *flows, uint8_t table_id, uint16_t priority,
- const struct match *, const struct ofpbuf *ofpacts);
+struct ovn_flow *ofctrl_dup_flow(struct ovn_flow *source);
+
+/* Flow table interfaces to the rest of ovn-controller. */
+void ofctrl_add_flow(uint8_t table_id, uint16_t priority,
+ const struct match *, const struct ofpbuf *ofpacts,
+ const struct uuid *uuid, bool is_new);
+
+void ofctrl_remove_flows(const struct uuid *uuid);
+
+void ofctrl_flow_table_clear(void);
+
+void ovn_flow_table_clear(void);
#endif /* ovn/ofctrl.h */
@@ -433,16 +433,15 @@ main(int argc, char *argv[])
update_ct_zones(&all_lports, &patched_datapaths, &ct_zones,
ct_zone_bitmap);
- struct hmap flow_table = HMAP_INITIALIZER(&flow_table);
+ ovn_flow_table_clear();
lflow_run(&ctx, &lports, &mcgroups, &local_datapaths,
- &patched_datapaths, &ct_zones, &flow_table);
+ &patched_datapaths, &ct_zones);
if (chassis_id) {
physical_run(&ctx, mff_ovn_geneve,
- br_int, chassis_id, &ct_zones, &flow_table,
+ br_int, chassis_id, &ct_zones,
&local_datapaths, &patched_datapaths);
}
- ofctrl_put(&flow_table);
- hmap_destroy(&flow_table);
+ ofctrl_put();
}
sset_destroy(&all_lports);
@@ -51,6 +51,9 @@ physical_register_ovs_idl(struct ovsdb_idl *ovs_idl)
ovsdb_idl_add_column(ovs_idl, &ovsrec_interface_col_external_ids);
}
+/* UUID to identify OF flows not associated with ovsdb rows. */
+static struct uuid *hc_uuid = NULL;
+
/* Maps from a chassis to the OpenFlow port number of the tunnel that can be
* used to reach that chassis. */
struct chassis_tunnel {
@@ -149,11 +152,15 @@ get_localnet_port(struct hmap *local_datapaths, int64_t tunnel_key)
void
physical_run(struct controller_ctx *ctx, enum mf_field_id mff_ovn_geneve,
const struct ovsrec_bridge *br_int, const char *this_chassis_id,
- const struct simap *ct_zones, struct hmap *flow_table,
+ const struct simap *ct_zones,
struct hmap *local_datapaths, struct hmap *patched_datapaths)
{
struct simap localvif_to_ofport = SIMAP_INITIALIZER(&localvif_to_ofport);
struct hmap tunnels = HMAP_INITIALIZER(&tunnels);
+ if (!hc_uuid) {
+ hc_uuid = xmalloc(sizeof(struct uuid));
+ uuid_generate(hc_uuid);
+ }
for (int i = 0; i < br_int->n_ports; i++) {
const struct ovsrec_port *port_rec = br_int->ports[i];
@@ -398,8 +405,9 @@ physical_run(struct controller_ctx *ctx, enum mf_field_id mff_ovn_geneve,
/* Resubmit to first logical ingress pipeline table. */
put_resubmit(OFTABLE_LOG_INGRESS_PIPELINE, &ofpacts);
- ofctrl_add_flow(flow_table, OFTABLE_PHY_TO_LOG,
- tag ? 150 : 100, &match, &ofpacts);
+ ofctrl_add_flow(OFTABLE_PHY_TO_LOG,
+ tag ? 150 : 100, &match, &ofpacts,
+ &binding->header_.uuid, true);
if (!tag && (!strcmp(binding->type, "localnet")
|| !strcmp(binding->type, "l2gateway"))) {
@@ -408,7 +416,8 @@ physical_run(struct controller_ctx *ctx, enum mf_field_id mff_ovn_geneve,
* action. */
ofpbuf_pull(&ofpacts, ofpacts_orig_size);
match_set_dl_tci_masked(&match, 0, htons(VLAN_CFI));
- ofctrl_add_flow(flow_table, 0, 100, &match, &ofpacts);
+ ofctrl_add_flow(0, 100, &match, &ofpacts,
+ &binding->header_.uuid, true);
}
/* Table 33, priority 100.
@@ -438,8 +447,8 @@ physical_run(struct controller_ctx *ctx, enum mf_field_id mff_ovn_geneve,
/* Resubmit to table 34. */
put_resubmit(OFTABLE_DROP_LOOPBACK, &ofpacts);
- ofctrl_add_flow(flow_table, OFTABLE_LOCAL_OUTPUT, 100, &match,
- &ofpacts);
+ ofctrl_add_flow(OFTABLE_LOCAL_OUTPUT, 100, &match, &ofpacts,
+ &binding->header_.uuid, true);
/* Table 34, Priority 100.
* =======================
@@ -450,8 +459,8 @@ physical_run(struct controller_ctx *ctx, enum mf_field_id mff_ovn_geneve,
match_set_metadata(&match, htonll(dp_key));
match_set_reg(&match, MFF_LOG_INPORT - MFF_REG0, port_key);
match_set_reg(&match, MFF_LOG_OUTPORT - MFF_REG0, port_key);
- ofctrl_add_flow(flow_table, OFTABLE_DROP_LOOPBACK, 100,
- &match, &ofpacts);
+ ofctrl_add_flow(OFTABLE_DROP_LOOPBACK, 100, &match, &ofpacts,
+ &binding->header_.uuid, true);
/* Table 64, Priority 100.
* =======================
@@ -485,8 +494,8 @@ physical_run(struct controller_ctx *ctx, enum mf_field_id mff_ovn_geneve,
ofpact_put_STRIP_VLAN(&ofpacts);
put_stack(MFF_IN_PORT, ofpact_put_STACK_POP(&ofpacts));
}
- ofctrl_add_flow(flow_table, OFTABLE_LOG_TO_PHY, 100,
- &match, &ofpacts);
+ ofctrl_add_flow(OFTABLE_LOG_TO_PHY, 100, &match, &ofpacts,
+ &binding->header_.uuid, true);
} else if (!tun) {
/* Remote port connected by localnet port */
/* Table 33, priority 100.
@@ -508,8 +517,8 @@ physical_run(struct controller_ctx *ctx, enum mf_field_id mff_ovn_geneve,
/* Resubmit to table 33. */
put_resubmit(OFTABLE_LOCAL_OUTPUT, &ofpacts);
- ofctrl_add_flow(flow_table, OFTABLE_LOCAL_OUTPUT, 100, &match,
- &ofpacts);
+ ofctrl_add_flow(OFTABLE_LOCAL_OUTPUT, 100, &match, &ofpacts,
+ &binding->header_.uuid, true);
} else {
/* Remote port connected by tunnel */
/* Table 32, priority 100.
@@ -532,8 +541,8 @@ physical_run(struct controller_ctx *ctx, enum mf_field_id mff_ovn_geneve,
/* Output to tunnel. */
ofpact_put_OUTPUT(&ofpacts)->port = ofport;
- ofctrl_add_flow(flow_table, OFTABLE_REMOTE_OUTPUT, 100,
- &match, &ofpacts);
+ ofctrl_add_flow(OFTABLE_REMOTE_OUTPUT, 100, &match, &ofpacts,
+ &binding->header_.uuid, true);
}
}
@@ -608,8 +617,8 @@ physical_run(struct controller_ctx *ctx, enum mf_field_id mff_ovn_geneve,
* group as the logical output port. */
put_load(mc->tunnel_key, MFF_LOG_OUTPORT, 0, 32, &ofpacts);
- ofctrl_add_flow(flow_table, OFTABLE_LOCAL_OUTPUT, 100,
- &match, &ofpacts);
+ ofctrl_add_flow(OFTABLE_LOCAL_OUTPUT, 100, &match, &ofpacts,
+ &mc->header_.uuid, true);
}
/* Table 32, priority 100.
@@ -646,8 +655,9 @@ physical_run(struct controller_ctx *ctx, enum mf_field_id mff_ovn_geneve,
if (local_ports) {
put_resubmit(OFTABLE_LOCAL_OUTPUT, &remote_ofpacts);
}
- ofctrl_add_flow(flow_table, OFTABLE_REMOTE_OUTPUT, 100,
- &match, &remote_ofpacts);
+ ofctrl_add_flow(OFTABLE_REMOTE_OUTPUT, 100,
+ &match, &remote_ofpacts,
+ &mc->header_.uuid, true);
}
}
sset_destroy(&remote_chassis);
@@ -690,7 +700,8 @@ physical_run(struct controller_ctx *ctx, enum mf_field_id mff_ovn_geneve,
put_resubmit(OFTABLE_LOCAL_OUTPUT, &ofpacts);
- ofctrl_add_flow(flow_table, OFTABLE_PHY_TO_LOG, 100, &match, &ofpacts);
+ ofctrl_add_flow(OFTABLE_PHY_TO_LOG, 100, &match, &ofpacts,
+ hc_uuid, true);
}
/* Add flows for VXLAN encapsulations. Due to the limited amount of
@@ -723,8 +734,8 @@ physical_run(struct controller_ctx *ctx, enum mf_field_id mff_ovn_geneve,
put_load(binding->tunnel_key, MFF_LOG_INPORT, 0, 15, &ofpacts);
put_resubmit(OFTABLE_LOG_INGRESS_PIPELINE, &ofpacts);
- ofctrl_add_flow(flow_table, OFTABLE_PHY_TO_LOG, 100, &match,
- &ofpacts);
+ ofctrl_add_flow(OFTABLE_PHY_TO_LOG, 100, &match, &ofpacts,
+ hc_uuid, true);
}
}
@@ -737,7 +748,8 @@ physical_run(struct controller_ctx *ctx, enum mf_field_id mff_ovn_geneve,
match_init_catchall(&match);
ofpbuf_clear(&ofpacts);
put_resubmit(OFTABLE_LOCAL_OUTPUT, &ofpacts);
- ofctrl_add_flow(flow_table, OFTABLE_REMOTE_OUTPUT, 0, &match, &ofpacts);
+ ofctrl_add_flow(OFTABLE_REMOTE_OUTPUT, 0, &match, &ofpacts,
+ hc_uuid, true);
/* Table 34, Priority 0.
* =======================
@@ -751,7 +763,8 @@ physical_run(struct controller_ctx *ctx, enum mf_field_id mff_ovn_geneve,
MFF_LOG_REGS;
#undef MFF_LOG_REGS
put_resubmit(OFTABLE_LOG_EGRESS_PIPELINE, &ofpacts);
- ofctrl_add_flow(flow_table, OFTABLE_DROP_LOOPBACK, 0, &match, &ofpacts);
+ ofctrl_add_flow(OFTABLE_DROP_LOOPBACK, 0, &match, &ofpacts,
+ hc_uuid, true);
ofpbuf_uninit(&ofpacts);
simap_destroy(&localvif_to_ofport);
@@ -43,7 +43,7 @@ struct simap;
void physical_register_ovs_idl(struct ovsdb_idl *);
void physical_run(struct controller_ctx *, enum mf_field_id mff_ovn_geneve,
const struct ovsrec_bridge *br_int, const char *chassis_id,
- const struct simap *ct_zones, struct hmap *flow_table,
+ const struct simap *ct_zones,
struct hmap *local_datapaths, struct hmap *patched_datapaths);
#endif /* ovn/physical.h */
Ensure that ovn flow tables are persisted so that changes to them chan be applied incrementally - this is a prereq for making lflow_run and physical_run incremental. Signed-off-by: Ryan Moats <rmoats@us.ibm.com> --- ovn/controller/lflow.c | 26 ++-- ovn/controller/lflow.h | 3 +- ovn/controller/ofctrl.c | 271 +++++++++++++++++++++++++++++----------- ovn/controller/ofctrl.h | 18 ++- ovn/controller/ovn-controller.c | 9 +- ovn/controller/physical.c | 59 +++++---- ovn/controller/physical.h | 2 +- 7 files changed, 264 insertions(+), 124 deletions(-)