2 * Copyright (c) 2008, 2009 Nicira Networks.
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at:
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
26 #include <linux/rtnetlink.h>
27 #include <linux/ethtool.h>
28 #include <linux/sockios.h>
29 #include <netinet/in.h>
32 #include <sys/ioctl.h>
34 #include <sys/sysmacros.h>
38 #include "dynamic-string.h"
42 #include "ofp-print.h"
45 #include "poll-loop.h"
50 #define THIS_MODULE VLM_dpif
52 /* A datapath interface. */
59 /* Rate limit for individual messages going to or from the datapath, output at
60 * DBG level. This is very high because, if these are enabled, it is because
61 * we really need to see them. */
62 static struct vlog_rate_limit dpmsg_rl = VLOG_RATE_LIMIT_INIT(600, 600);
64 /* Not really much point in logging many dpif errors. */
65 static struct vlog_rate_limit error_rl = VLOG_RATE_LIMIT_INIT(9999, 5);
67 static int get_minor_from_name(const char *name, unsigned int *minor);
68 static int name_to_minor(const char *name, unsigned int *minor);
69 static int lookup_minor(const char *name, unsigned int *minor);
70 static int open_by_minor(unsigned int minor, struct dpif **dpifp);
71 static int make_openvswitch_device(unsigned int minor, char **fnp);
72 static void check_rw_odp_flow(struct odp_flow *);
75 dpif_open(const char *name, struct dpif **dpifp)
84 error = name_to_minor(name, &minor);
89 error = open_by_minor(minor, &dpif);
94 /* We can open the device, but that doesn't mean that it's been created.
95 * If it hasn't been, then any command other than ODP_DP_CREATE will
96 * return ENODEV. Try something innocuous. */
97 listen_mask = 0; /* Make Valgrind happy. */
98 if (ioctl(dpif->fd, ODP_GET_LISTEN_MASK, &listen_mask)) {
100 if (error != ENODEV) {
101 VLOG_WARN("%s: probe returned unexpected error: %s",
102 dpif_name(dpif), strerror(error));
112 dpif_close(struct dpif *dpif)
122 do_ioctl(const struct dpif *dpif, int cmd, const char *cmd_name,
125 int error = ioctl(dpif->fd, cmd, arg) ? errno : 0;
128 VLOG_WARN_RL(&error_rl, "%s: ioctl(%s) failed (%s)",
129 dpif_name(dpif), cmd_name, strerror(error));
131 VLOG_DBG_RL(&dpmsg_rl, "%s: ioctl(%s): success",
132 dpif_name(dpif), cmd_name);
139 dpif_create(const char *name, struct dpif **dpifp)
145 if (!get_minor_from_name(name, &minor)) {
146 /* Minor was specified in 'name', go ahead and create it. */
149 error = open_by_minor(minor, &dpif);
154 error = ioctl(dpif->fd, ODP_DP_CREATE, name) < 0 ? errno : 0;
162 for (minor = 0; minor < ODP_MAX; minor++) {
165 error = open_by_minor(minor, &dpif);
170 error = ioctl(dpif->fd, ODP_DP_CREATE, name) < 0 ? errno : 0;
176 if (error != EBUSY) {
185 dpif_name(const struct dpif *dpif)
191 dpif_delete(struct dpif *dpif)
193 COVERAGE_INC(dpif_destroy);
194 return do_ioctl(dpif, ODP_DP_DESTROY, "ODP_DP_DESTROY", NULL);
198 dpif_get_dp_stats(const struct dpif *dpif, struct odp_stats *stats)
200 memset(stats, 0, sizeof *stats);
201 return do_ioctl(dpif, ODP_DP_STATS, "ODP_DP_STATS", stats);
205 dpif_get_drop_frags(const struct dpif *dpif, bool *drop_frags)
208 int error = do_ioctl(dpif, ODP_GET_DROP_FRAGS, "ODP_GET_DROP_FRAGS", &tmp);
209 *drop_frags = error ? tmp & 1 : false;
214 dpif_set_drop_frags(struct dpif *dpif, bool drop_frags)
216 int tmp = drop_frags;
217 return do_ioctl(dpif, ODP_SET_DROP_FRAGS, "ODP_SET_DROP_FRAGS", &tmp);
221 dpif_recv_purge(struct dpif *dpif)
223 struct odp_stats stats;
227 COVERAGE_INC(dpif_purge);
229 error = dpif_get_dp_stats(dpif, &stats);
234 for (i = 0; i < stats.max_miss_queue + stats.max_action_queue; i++) {
236 error = dpif_recv(dpif, &buf);
238 return error == EAGAIN ? 0 : error;
246 dpif_port_add(struct dpif *dpif, const char *devname, uint16_t flags,
249 struct odp_port port;
253 COVERAGE_INC(dpif_port_add);
255 memset(&port, 0, sizeof port);
256 strncpy(port.devname, devname, sizeof port.devname);
259 error = do_ioctl(dpif, ODP_PORT_ADD, NULL, &port);
262 VLOG_DBG_RL(&dpmsg_rl, "%s: added %s as port %"PRIu16,
263 dpif_name(dpif), devname, port_no);
265 port_no = UINT16_MAX;
266 VLOG_WARN_RL(&error_rl, "%s: failed to add %s as port: %s",
267 dpif_name(dpif), devname, strerror(errno));
276 dpif_port_del(struct dpif *dpif, uint16_t port_no)
279 COVERAGE_INC(dpif_port_del);
280 return do_ioctl(dpif, ODP_PORT_DEL, "ODP_PORT_DEL", &tmp);
284 dpif_port_query_by_number(const struct dpif *dpif, uint16_t port_no,
285 struct odp_port *port)
287 memset(port, 0, sizeof *port);
288 port->port = port_no;
289 if (!ioctl(dpif->fd, ODP_PORT_QUERY, port)) {
290 VLOG_DBG_RL(&dpmsg_rl, "%s: port %"PRIu16" is device %s",
291 dpif_name(dpif), port_no, port->devname);
294 VLOG_WARN_RL(&error_rl, "%s: failed to query port %"PRIu16": %s",
295 dpif_name(dpif), port_no, strerror(errno));
301 dpif_port_query_by_name(const struct dpif *dpif, const char *devname,
302 struct odp_port *port)
304 memset(port, 0, sizeof *port);
305 strncpy(port->devname, devname, sizeof port->devname);
306 if (!ioctl(dpif->fd, ODP_PORT_QUERY, port)) {
307 VLOG_DBG_RL(&dpmsg_rl, "%s: device %s is on port %"PRIu16,
308 dpif_name(dpif), devname, port->port);
311 /* Log level is DBG here because all the current callers are interested
312 * in whether 'dpif' actually has a port 'devname', so that it's not an
313 * issue worth logging if it doesn't. */
314 VLOG_DBG_RL(&error_rl, "%s: failed to query port %s: %s",
315 dpif_name(dpif), devname, strerror(errno));
321 dpif_port_get_name(struct dpif *dpif, uint16_t port_no,
322 char *name, size_t name_size)
324 struct odp_port port;
327 assert(name_size > 0);
329 error = dpif_port_query_by_number(dpif, port_no, &port);
331 ovs_strlcpy(name, port.devname, name_size);
339 dpif_port_list(const struct dpif *dpif,
340 struct odp_port **portsp, size_t *n_portsp)
342 struct odp_port *ports;
347 struct odp_stats stats;
348 struct odp_portvec pv;
350 error = dpif_get_dp_stats(dpif, &stats);
355 ports = xcalloc(stats.n_ports, sizeof *ports);
357 pv.n_ports = stats.n_ports;
358 error = do_ioctl(dpif, ODP_PORT_LIST, "ODP_PORT_LIST", &pv);
363 } else if (pv.n_ports <= stats.n_ports) {
366 n_ports = pv.n_ports;
369 /* Soft error: port count increased behind our back. Try again. */
386 dpif_port_group_set(struct dpif *dpif, uint16_t group,
387 const uint16_t ports[], size_t n_ports)
389 struct odp_port_group pg;
391 COVERAGE_INC(dpif_port_group_set);
392 assert(n_ports <= UINT16_MAX);
394 pg.ports = (uint16_t *) ports;
395 pg.n_ports = n_ports;
396 return do_ioctl(dpif, ODP_PORT_GROUP_SET, "ODP_PORT_GROUP_SET", &pg);
400 dpif_port_group_get(const struct dpif *dpif, uint16_t group,
401 uint16_t **ports, size_t *n_ports)
408 struct odp_port_group pg;
411 pg.n_ports = *n_ports;
413 error = do_ioctl(dpif, ODP_PORT_GROUP_GET, "ODP_PORT_GROUP_GET", &pg);
420 } else if (pg.n_ports <= *n_ports) {
422 *n_ports = pg.n_ports;
425 /* Soft error: there were more ports than we expected in the
426 * group. Try again. */
428 *ports = xcalloc(pg.n_ports, sizeof **ports);
429 *n_ports = pg.n_ports;
436 dpif_flow_flush(struct dpif *dpif)
438 COVERAGE_INC(dpif_flow_flush);
439 return do_ioctl(dpif, ODP_FLOW_FLUSH, "ODP_FLOW_FLUSH", NULL);
442 static enum vlog_level
443 flow_message_log_level(int error)
445 return error ? VLL_WARN : VLL_DBG;
449 should_log_flow_message(int error)
451 return !vlog_should_drop(THIS_MODULE, flow_message_log_level(error),
452 error ? &error_rl : &dpmsg_rl);
456 log_flow_message(const struct dpif *dpif, int error,
457 const char *operation,
458 const flow_t *flow, const struct odp_flow_stats *stats,
459 const union odp_action *actions, size_t n_actions)
461 struct ds ds = DS_EMPTY_INITIALIZER;
462 ds_put_format(&ds, "%s: ", dpif_name(dpif));
464 ds_put_cstr(&ds, "failed to ");
466 ds_put_format(&ds, "%s ", operation);
468 ds_put_format(&ds, "(%s) ", strerror(error));
470 flow_format(&ds, flow);
472 ds_put_cstr(&ds, ", ");
473 format_odp_flow_stats(&ds, stats);
475 if (actions || n_actions) {
476 ds_put_cstr(&ds, ", actions:");
477 format_odp_actions(&ds, actions, n_actions);
479 vlog(THIS_MODULE, flow_message_log_level(error), "%s", ds_cstr(&ds));
484 do_flow_ioctl(const struct dpif *dpif, int cmd, struct odp_flow *flow,
485 const char *operation, bool show_stats)
487 int error = do_ioctl(dpif, cmd, NULL, flow);
488 if (error && show_stats) {
491 if (should_log_flow_message(error)) {
492 log_flow_message(dpif, error, operation, &flow->key,
493 show_stats && !error ? &flow->stats : NULL,
494 flow->actions, flow->n_actions);
500 dpif_flow_put(struct dpif *dpif, struct odp_flow_put *put)
502 int error = do_ioctl(dpif, ODP_FLOW_PUT, NULL, put);
503 COVERAGE_INC(dpif_flow_put);
504 if (should_log_flow_message(error)) {
505 struct ds operation = DS_EMPTY_INITIALIZER;
506 ds_put_cstr(&operation, "put");
507 if (put->flags & ODPPF_CREATE) {
508 ds_put_cstr(&operation, "[create]");
510 if (put->flags & ODPPF_MODIFY) {
511 ds_put_cstr(&operation, "[modify]");
513 if (put->flags & ODPPF_ZERO_STATS) {
514 ds_put_cstr(&operation, "[zero]");
516 #define ODPPF_ALL (ODPPF_CREATE | ODPPF_MODIFY | ODPPF_ZERO_STATS)
517 if (put->flags & ~ODPPF_ALL) {
518 ds_put_format(&operation, "[%x]", put->flags & ~ODPPF_ALL);
520 log_flow_message(dpif, error, ds_cstr(&operation), &put->flow.key,
521 !error ? &put->flow.stats : NULL,
522 put->flow.actions, put->flow.n_actions);
523 ds_destroy(&operation);
529 dpif_flow_del(struct dpif *dpif, struct odp_flow *flow)
531 COVERAGE_INC(dpif_flow_del);
532 check_rw_odp_flow(flow);
533 memset(&flow->stats, 0, sizeof flow->stats);
534 return do_flow_ioctl(dpif, ODP_FLOW_DEL, flow, "delete flow", true);
538 dpif_flow_get(const struct dpif *dpif, struct odp_flow *flow)
540 struct odp_flowvec fv;
543 COVERAGE_INC(dpif_flow_get);
545 check_rw_odp_flow(flow);
548 error = do_ioctl(dpif, ODP_FLOW_GET, "ODP_FLOW_GET", &fv);
550 error = flow->stats.error;
552 VLOG_WARN_RL(&error_rl, "%s: ioctl(ODP_FLOW_GET) failed (%s)",
553 dpif_name(dpif), strerror(error));
560 dpif_flow_get_multiple(const struct dpif *dpif,
561 struct odp_flow flows[], size_t n)
563 struct odp_flowvec fv;
566 COVERAGE_ADD(dpif_flow_query_multiple, n);
569 for (i = 0; i < n; i++) {
570 check_rw_odp_flow(&flows[i]);
572 return do_ioctl(dpif, ODP_FLOW_GET, "ODP_FLOW_GET",
577 dpif_flow_list(const struct dpif *dpif, struct odp_flow flows[], size_t n,
580 struct odp_flowvec fv;
584 COVERAGE_INC(dpif_flow_query_list);
587 if (RUNNING_ON_VALGRIND) {
588 memset(flows, 0, n * sizeof *flows);
590 for (i = 0; i < n; i++) {
591 flows[i].actions = NULL;
592 flows[i].n_actions = 0;
595 error = do_ioctl(dpif, ODP_FLOW_LIST, NULL, &fv);
598 VLOG_WARN_RL(&error_rl, "%s: flow list failed (%s)",
599 dpif_name(dpif), strerror(error));
601 COVERAGE_ADD(dpif_flow_query_list_n, fv.n_flows);
603 VLOG_DBG_RL(&dpmsg_rl, "%s: listed %zu flows",
604 dpif_name(dpif), *n_out);
610 dpif_flow_list_all(const struct dpif *dpif,
611 struct odp_flow **flowsp, size_t *np)
613 struct odp_stats stats;
614 struct odp_flow *flows;
621 error = dpif_get_dp_stats(dpif, &stats);
626 flows = xmalloc(sizeof *flows * stats.n_flows);
627 error = dpif_flow_list(dpif, flows, stats.n_flows, &n_flows);
633 if (stats.n_flows != n_flows) {
634 VLOG_WARN_RL(&error_rl, "%s: datapath stats reported %"PRIu32" "
635 "flows but flow listing reported %zu",
636 dpif_name(dpif), stats.n_flows, n_flows);
644 dpif_execute(struct dpif *dpif, uint16_t in_port,
645 const union odp_action actions[], size_t n_actions,
646 const struct ofpbuf *buf)
650 COVERAGE_INC(dpif_execute);
652 struct odp_execute execute;
653 memset(&execute, 0, sizeof execute);
654 execute.in_port = in_port;
655 execute.actions = (union odp_action *) actions;
656 execute.n_actions = n_actions;
657 execute.data = buf->data;
658 execute.length = buf->size;
659 error = do_ioctl(dpif, ODP_EXECUTE, NULL, &execute);
664 if (!(error ? VLOG_DROP_WARN(&error_rl) : VLOG_DROP_DBG(&dpmsg_rl))) {
665 struct ds ds = DS_EMPTY_INITIALIZER;
666 char *packet = ofp_packet_to_string(buf->data, buf->size, buf->size);
667 ds_put_format(&ds, "%s: execute ", dpif_name(dpif));
668 format_odp_actions(&ds, actions, n_actions);
670 ds_put_format(&ds, " failed (%s)", strerror(error));
672 ds_put_format(&ds, " on packet %s", packet);
673 vlog(THIS_MODULE, error ? VLL_WARN : VLL_DBG, "%s", ds_cstr(&ds));
681 dpif_recv_get_mask(const struct dpif *dpif, int *listen_mask)
683 int error = do_ioctl(dpif, ODP_GET_LISTEN_MASK, "ODP_GET_LISTEN_MASK",
692 dpif_recv_set_mask(struct dpif *dpif, int listen_mask)
694 return do_ioctl(dpif, ODP_SET_LISTEN_MASK, "ODP_SET_LISTEN_MASK",
699 dpif_recv(struct dpif *dpif, struct ofpbuf **bufp)
705 buf = ofpbuf_new(65536);
706 retval = read(dpif->fd, ofpbuf_tail(buf), ofpbuf_tailroom(buf));
709 if (error != EAGAIN) {
710 VLOG_WARN_RL(&error_rl, "%s: read failed: %s",
711 dpif_name(dpif), strerror(error));
713 } else if (retval >= sizeof(struct odp_msg)) {
714 struct odp_msg *msg = buf->data;
715 if (msg->length <= retval) {
717 if (VLOG_IS_DBG_ENABLED()) {
718 void *payload = msg + 1;
719 size_t length = buf->size - sizeof *msg;
720 char *s = ofp_packet_to_string(payload, length, length);
721 VLOG_DBG_RL(&dpmsg_rl, "%s: received %s message of length "
722 "%zu on port %"PRIu16": %s", dpif_name(dpif),
723 (msg->type == _ODPL_MISS_NR ? "miss"
724 : msg->type == _ODPL_ACTION_NR ? "action"
726 msg->length - sizeof(struct odp_msg),
731 COVERAGE_INC(dpif_recv);
734 VLOG_WARN_RL(&error_rl, "%s: discarding message truncated "
735 "from %zu bytes to %d",
736 dpif_name(dpif), msg->length, retval);
739 } else if (!retval) {
740 VLOG_WARN_RL(&error_rl, "%s: unexpected end of file", dpif_name(dpif));
743 VLOG_WARN_RL(&error_rl,
744 "%s: discarding too-short message (%d bytes)",
745 dpif_name(dpif), retval);
755 dpif_recv_wait(struct dpif *dpif)
757 poll_fd_wait(dpif->fd, POLLIN);
761 dpif_get_netflow_ids(const struct dpif *dpif,
762 uint8_t *engine_type, uint8_t *engine_id)
764 *engine_type = *engine_id = dpif->minor;
769 struct nl_sock *sock;
774 dpifmon_create(const char *datapath_name, struct dpifmon **monp)
777 char local_name[IFNAMSIZ];
780 mon = *monp = xmalloc(sizeof *mon);
782 error = dpif_open(datapath_name, &mon->dpif);
786 error = dpif_port_get_name(mon->dpif, ODPP_LOCAL,
787 local_name, sizeof local_name);
789 goto error_close_dpif;
792 mon->local_ifindex = if_nametoindex(local_name);
793 if (!mon->local_ifindex) {
795 VLOG_WARN("could not get ifindex of %s device: %s",
796 local_name, strerror(errno));
797 goto error_close_dpif;
800 error = nl_sock_create(NETLINK_ROUTE, RTNLGRP_LINK, 0, 0, &mon->sock);
802 VLOG_WARN("could not create rtnetlink socket: %s", strerror(error));
803 goto error_close_dpif;
809 dpif_close(mon->dpif);
817 dpifmon_destroy(struct dpifmon *mon)
820 dpif_close(mon->dpif);
821 nl_sock_destroy(mon->sock);
826 dpifmon_poll(struct dpifmon *mon, char **devnamep)
828 static struct vlog_rate_limit slow_rl = VLOG_RATE_LIMIT_INIT(1, 5);
829 static const struct nl_policy rtnlgrp_link_policy[] = {
830 [IFLA_IFNAME] = { .type = NL_A_STRING },
831 [IFLA_MASTER] = { .type = NL_A_U32, .optional = true },
833 struct nlattr *attrs[ARRAY_SIZE(rtnlgrp_link_policy)];
839 error = nl_sock_recv(mon->sock, &buf, false);
842 if (!nl_policy_parse(buf, NLMSG_HDRLEN + sizeof(struct ifinfomsg),
844 attrs, ARRAY_SIZE(rtnlgrp_link_policy))) {
845 VLOG_WARN_RL(&slow_rl, "received bad rtnl message");
848 const char *devname = nl_attr_get_string(attrs[IFLA_IFNAME]);
851 if (attrs[IFLA_MASTER]) {
852 uint32_t master_ifindex = nl_attr_get_u32(attrs[IFLA_MASTER]);
853 for_us = master_ifindex == mon->local_ifindex;
855 /* It's for us if that device is one of our ports. */
856 struct odp_port port;
857 for_us = !dpif_port_query_by_name(mon->dpif, devname, &port);
861 /* Not for us, try again. */
863 COVERAGE_INC(dpifmon_poll_false_wakeup);
866 COVERAGE_INC(dpifmon_poll_changed);
867 *devnamep = xstrdup(devname);
877 VLOG_WARN_RL(&slow_rl, "dpifmon socket overflowed");
881 VLOG_WARN_RL(&slow_rl, "error on dpifmon socket: %s", strerror(error));
888 dpifmon_run(struct dpifmon *mon UNUSED)
890 /* Nothing to do in this implementation. */
894 dpifmon_wait(struct dpifmon *mon)
896 nl_sock_wait(mon->sock, POLLIN);
899 static int get_openvswitch_major(void);
900 static int get_major(const char *target, int default_major);
903 lookup_minor(const char *name, unsigned int *minor)
905 struct ethtool_drvinfo drvinfo;
911 sock = socket(AF_INET, SOCK_DGRAM, 0);
913 VLOG_WARN("socket(AF_INET) failed: %s", strerror(errno));
918 memset(&ifr, 0, sizeof ifr);
919 strncpy(ifr.ifr_name, name, sizeof ifr.ifr_name);
920 ifr.ifr_data = (caddr_t) &drvinfo;
922 memset(&drvinfo, 0, sizeof drvinfo);
923 drvinfo.cmd = ETHTOOL_GDRVINFO;
924 if (ioctl(sock, SIOCETHTOOL, &ifr)) {
925 VLOG_WARN("ioctl(SIOCETHTOOL) failed: %s", strerror(errno));
927 goto error_close_sock;
930 if (strcmp(drvinfo.driver, "openvswitch")) {
931 VLOG_WARN("%s is not an openvswitch device", name);
933 goto error_close_sock;
936 if (!isdigit(drvinfo.bus_info[0])) {
937 VLOG_WARN("%s ethtool info does not contain an openvswitch minor",
940 goto error_close_sock;
943 *minor = atoi(drvinfo.bus_info);
954 make_openvswitch_device(unsigned int minor, char **fnp)
956 dev_t dev = makedev(get_openvswitch_major(), minor);
957 const char dirname[] = "/dev/net";
962 sprintf(fn, "%s/dp%d", dirname, minor);
964 if (!S_ISCHR(s.st_mode)) {
965 VLOG_WARN_RL(&error_rl, "%s is not a character device, fixing",
967 } else if (s.st_rdev != dev) {
968 VLOG_WARN_RL(&error_rl,
969 "%s is device %u:%u instead of %u:%u, fixing",
970 fn, major(s.st_rdev), minor(s.st_rdev),
971 major(dev), minor(dev));
976 VLOG_WARN_RL(&error_rl, "%s: unlink failed (%s)",
977 fn, strerror(errno));
980 } else if (errno == ENOENT) {
981 if (stat(dirname, &s)) {
982 if (errno == ENOENT) {
983 if (mkdir(dirname, 0755)) {
984 VLOG_WARN_RL(&error_rl, "%s: mkdir failed (%s)",
985 dirname, strerror(errno));
989 VLOG_WARN_RL(&error_rl, "%s: stat failed (%s)",
990 dirname, strerror(errno));
995 VLOG_WARN_RL(&error_rl, "%s: stat failed (%s)", fn, strerror(errno));
999 /* The device needs to be created. */
1000 if (mknod(fn, S_IFCHR | 0700, dev)) {
1001 VLOG_WARN_RL(&error_rl,
1002 "%s: creating character device %u:%u failed (%s)",
1003 fn, major(dev), minor(dev), strerror(errno));
1014 get_openvswitch_major(void)
1016 static unsigned int openvswitch_major;
1017 if (!openvswitch_major) {
1018 enum { DEFAULT_MAJOR = 248 };
1019 openvswitch_major = get_major("openvswitch", DEFAULT_MAJOR);
1021 return openvswitch_major;
1025 get_major(const char *target, int default_major)
1027 const char fn[] = "/proc/devices";
1032 file = fopen(fn, "r");
1034 VLOG_ERR("opening %s failed (%s)", fn, strerror(errno));
1038 for (ln = 1; fgets(line, sizeof line, file); ln++) {
1042 if (!strncmp(line, "Character", 9) || line[0] == '\0') {
1043 /* Nothing to do. */
1044 } else if (!strncmp(line, "Block", 5)) {
1045 /* We only want character devices, so skip the rest of the file. */
1047 } else if (sscanf(line, "%d %63s", &major, name)) {
1048 if (!strcmp(name, target)) {
1055 VLOG_WARN("%s:%d: syntax error", fn, ln);
1061 VLOG_ERR("%s: %s major not found (is the module loaded?), using "
1062 "default major %d", fn, target, default_major);
1064 VLOG_INFO("using default major %d for %s", default_major, target);
1065 return default_major;
1069 name_to_minor(const char *name, unsigned int *minor)
1071 if (!get_minor_from_name(name, minor)) {
1074 return lookup_minor(name, minor);
1078 get_minor_from_name(const char *name, unsigned int *minor)
1080 if (!strncmp(name, "dp", 2) && isdigit(name[2])) {
1081 *minor = atoi(name + 2);
1089 open_by_minor(unsigned int minor, struct dpif **dpifp)
1097 error = make_openvswitch_device(minor, &fn);
1102 fd = open(fn, O_RDONLY | O_NONBLOCK);
1105 VLOG_WARN("%s: open failed (%s)", fn, strerror(error));
1111 dpif = xmalloc(sizeof *dpif);
1112 dpif->name = xasprintf("dp%u", dpif->minor);
1113 dpif->minor = minor;
1119 /* There is a tendency to construct odp_flow objects on the stack and to
1120 * forget to properly initialize their "actions" and "n_actions" members.
1121 * When this happens, we get memory corruption because the kernel
1122 * writes through the random pointer that is in the "actions" member.
1124 * This function attempts to combat the problem by:
1126 * - Forcing a segfault if "actions" points to an invalid region (instead
1127 * of just getting back EFAULT, which can be easily missed in the log).
1129 * - Storing a distinctive value that is likely to cause an
1130 * easy-to-identify error later if it is dereferenced, etc.
1132 * - Triggering a warning on uninitialized memory from Valgrind if
1133 * "actions" or "n_actions" was not initialized.
1136 check_rw_odp_flow(struct odp_flow *flow)
1138 if (flow->n_actions) {
1139 memset(&flow->actions[0], 0xcc, sizeof flow->actions[0]);