2 * Copyright (c) 2009, 2010 InMon Corp.
3 * Copyright (c) 2009 Nicira Networks.
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at:
9 * http://www.apache.org/licenses/LICENSE-2.0
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
19 #include "ofproto-sflow.h"
22 #include "collectors.h"
28 #include "poll-loop.h"
29 #include "port-array.h"
30 #include "sflow_api.h"
31 #include "socket-util.h"
34 #define THIS_MODULE VLM_sflow
37 struct ofproto_sflow_port {
38 struct netdev *netdev; /* Underlying network device, for stats. */
39 SFLDataSource_instance dsi; /* sFlow library's notion of port number. */
42 struct ofproto_sflow {
43 struct ofproto *ofproto;
44 struct collectors *collectors;
45 SFLAgent *sflow_agent;
46 struct ofproto_sflow_options *options;
49 size_t n_flood, n_all;
50 struct port_array ports; /* Indexed by ODP port number. */
53 #define RECEIVER_INDEX 1
55 static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 5);
58 nullable_string_is_equal(const char *a, const char *b)
60 return a ? b && !strcmp(a, b) : !b;
64 ofproto_sflow_options_equal(const struct ofproto_sflow_options *a,
65 const struct ofproto_sflow_options *b)
67 return (svec_equal(&a->targets, &b->targets)
68 && a->sampling_rate == b->sampling_rate
69 && a->polling_interval == b->polling_interval
70 && a->header_len == b->header_len
71 && a->sub_id == b->sub_id
72 && nullable_string_is_equal(a->agent_device, b->agent_device)
73 && nullable_string_is_equal(a->control_ip, b->control_ip));
76 static struct ofproto_sflow_options *
77 ofproto_sflow_options_clone(const struct ofproto_sflow_options *old)
79 struct ofproto_sflow_options *new = xmemdup(old, sizeof *old);
80 svec_clone(&new->targets, &old->targets);
81 new->agent_device = old->agent_device ? xstrdup(old->agent_device) : NULL;
82 new->control_ip = old->control_ip ? xstrdup(old->control_ip) : NULL;
87 ofproto_sflow_options_destroy(struct ofproto_sflow_options *options)
90 svec_destroy(&options->targets);
91 free(options->agent_device);
92 free(options->control_ip);
97 /* sFlow library callback to allocate memory. */
99 sflow_agent_alloc_cb(void *magic OVS_UNUSED, SFLAgent *agent OVS_UNUSED,
102 return calloc(1, bytes);
105 /* sFlow library callback to free memory. */
107 sflow_agent_free_cb(void *magic OVS_UNUSED, SFLAgent *agent OVS_UNUSED,
114 /* sFlow library callback to report error. */
116 sflow_agent_error_cb(void *magic OVS_UNUSED, SFLAgent *agent OVS_UNUSED,
119 VLOG_WARN("sFlow agent error: %s", msg);
122 /* sFlow library callback to send datagram. */
124 sflow_agent_send_packet_cb(void *os_, SFLAgent *agent OVS_UNUSED,
125 SFLReceiver *receiver OVS_UNUSED, u_char *pkt,
128 struct ofproto_sflow *os = os_;
129 collectors_send(os->collectors, pkt, pktLen);
133 sflow_agent_get_counters(void *os_, SFLPoller *poller,
134 SFL_COUNTERS_SAMPLE_TYPE *cs)
136 struct ofproto_sflow *os = os_;
137 SFLCounters_sample_element elem;
138 struct ofproto_sflow_port *osp;
139 SFLIf_counters *counters;
140 struct netdev_stats stats;
141 enum netdev_flags flags;
144 osp = port_array_get(&os->ports, poller->bridgePort);
149 elem.tag = SFLCOUNTERS_GENERIC;
150 counters = &elem.counterBlock.generic;
151 counters->ifIndex = SFL_DS_INDEX(poller->dsi);
152 counters->ifType = 6;
153 if (!netdev_get_features(osp->netdev, ¤t, NULL, NULL, NULL)) {
154 /* The values of ifDirection come from MAU MIB (RFC 2668): 0 = unknown,
155 1 = full-duplex, 2 = half-duplex, 3 = in, 4=out */
156 counters->ifSpeed = netdev_features_to_bps(current);
157 counters->ifDirection = (netdev_features_is_full_duplex(current)
160 counters->ifSpeed = 100000000;
161 counters->ifDirection = 0;
163 if (!netdev_get_flags(osp->netdev, &flags) && flags & NETDEV_UP) {
166 counters->ifStatus = 1; /* ifAdminStatus up. */
167 if (!netdev_get_carrier(osp->netdev, &carrier) && carrier) {
168 counters->ifStatus |= 2; /* ifOperStatus us. */
171 counters->ifStatus = 0; /* Down. */
175 1. Is the multicast counter filled in?
176 2. Does the multicast counter include broadcasts?
177 3. Does the rx_packets counter include multicasts/broadcasts?
179 netdev_get_stats(osp->netdev, &stats);
180 counters->ifInOctets = stats.rx_bytes;
181 counters->ifInUcastPkts = stats.rx_packets;
182 counters->ifInMulticastPkts = stats.multicast;
183 counters->ifInBroadcastPkts = -1;
184 counters->ifInDiscards = stats.rx_dropped;
185 counters->ifInErrors = stats.rx_errors;
186 counters->ifInUnknownProtos = -1;
187 counters->ifOutOctets = stats.tx_bytes;
188 counters->ifOutUcastPkts = stats.tx_packets;
189 counters->ifOutMulticastPkts = -1;
190 counters->ifOutBroadcastPkts = -1;
191 counters->ifOutDiscards = stats.tx_dropped;
192 counters->ifOutErrors = stats.tx_errors;
193 counters->ifPromiscuousMode = 0;
195 SFLADD_ELEMENT(cs, &elem);
196 sfl_poller_writeCountersSample(poller, cs);
199 /* Obtains an address to use for the local sFlow agent and stores it into
200 * '*agent_addr'. Returns true if successful, false on failure.
202 * The sFlow agent address should be a local IP address that is persistent and
203 * reachable over the network, if possible. The IP address associated with
204 * 'agent_device' is used if it has one, and otherwise 'control_ip', the IP
205 * address used to talk to the controller. */
207 sflow_choose_agent_address(const char *agent_device, const char *control_ip,
208 SFLAddress *agent_addr)
212 memset(agent_addr, 0, sizeof *agent_addr);
213 agent_addr->type = SFLADDRESSTYPE_IP_V4;
216 struct netdev *netdev;
218 if (!netdev_open_default(agent_device, &netdev)) {
219 int error = netdev_get_in4(netdev, &in4, NULL);
220 netdev_close(netdev);
227 if (control_ip && !lookup_ip(control_ip, &in4)) {
231 VLOG_ERR("could not determine IP address for sFlow agent");
235 agent_addr->address.ip_v4.addr = in4.s_addr;
240 ofproto_sflow_clear(struct ofproto_sflow *os)
242 struct ofproto_sflow_port *osp;
243 unsigned int odp_port;
245 if (os->sflow_agent) {
246 sfl_agent_release(os->sflow_agent);
247 os->sflow_agent = NULL;
249 collectors_destroy(os->collectors);
250 os->collectors = NULL;
251 ofproto_sflow_options_destroy(os->options);
254 PORT_ARRAY_FOR_EACH (osp, &os->ports, odp_port) {
255 ofproto_sflow_del_port(os, odp_port);
257 port_array_clear(&os->ports);
259 /* Turn off sampling to save CPU cycles. */
260 dpif_set_sflow_probability(os->dpif, 0);
264 ofproto_sflow_is_enabled(const struct ofproto_sflow *os)
266 return os->collectors != NULL;
269 struct ofproto_sflow *
270 ofproto_sflow_create(struct dpif *dpif)
272 struct ofproto_sflow *os;
274 os = xcalloc(1, sizeof *os);
276 os->next_tick = time_now() + 1;
277 port_array_init(&os->ports);
282 ofproto_sflow_destroy(struct ofproto_sflow *os)
285 ofproto_sflow_clear(os);
286 port_array_destroy(&os->ports);
292 ofproto_sflow_add_poller(struct ofproto_sflow *os,
293 struct ofproto_sflow_port *osp, uint16_t odp_port)
295 SFLPoller *poller = sfl_agent_addPoller(os->sflow_agent, &osp->dsi, os,
296 sflow_agent_get_counters);
297 sfl_poller_set_sFlowCpInterval(poller, os->options->polling_interval);
298 sfl_poller_set_sFlowCpReceiver(poller, RECEIVER_INDEX);
299 sfl_poller_set_bridgePort(poller, odp_port);
303 ofproto_sflow_add_sampler(struct ofproto_sflow *os,
304 struct ofproto_sflow_port *osp,
305 u_int32_t sampling_rate, u_int32_t header_len)
307 SFLSampler *sampler = sfl_agent_addSampler(os->sflow_agent, &osp->dsi);
308 sfl_sampler_set_sFlowFsPacketSamplingRate(sampler, sampling_rate);
309 sfl_sampler_set_sFlowFsMaximumHeaderSize(sampler, header_len);
310 sfl_sampler_set_sFlowFsReceiver(sampler, RECEIVER_INDEX);
314 ofproto_sflow_add_port(struct ofproto_sflow *os, uint16_t odp_port,
315 const char *netdev_name)
317 struct ofproto_sflow_port *osp;
318 struct netdev *netdev;
322 ofproto_sflow_del_port(os, odp_port);
324 /* Open network device. */
325 error = netdev_open_default(netdev_name, &netdev);
327 VLOG_WARN_RL(&rl, "failed to open network device \"%s\": %s",
328 netdev_name, strerror(error));
332 /* Add to table of ports. */
333 osp = xmalloc(sizeof *osp);
334 osp->netdev = netdev;
335 ifindex = netdev_get_ifindex(netdev);
337 ifindex = (os->sflow_agent->subId << 16) + odp_port;
339 SFL_DS_SET(osp->dsi, 0, ifindex, 0);
340 port_array_set(&os->ports, odp_port, osp);
343 if (os->sflow_agent) {
344 ofproto_sflow_add_poller(os, osp, odp_port);
349 ofproto_sflow_del_port(struct ofproto_sflow *os, uint16_t odp_port)
351 struct ofproto_sflow_port *osp = port_array_get(&os->ports, odp_port);
353 if (os->sflow_agent) {
354 sfl_agent_removePoller(os->sflow_agent, &osp->dsi);
355 sfl_agent_removeSampler(os->sflow_agent, &osp->dsi);
357 netdev_close(osp->netdev);
359 port_array_set(&os->ports, odp_port, NULL);
364 ofproto_sflow_set_options(struct ofproto_sflow *os,
365 const struct ofproto_sflow_options *options)
367 struct ofproto_sflow_port *osp;
368 bool options_changed;
369 SFLReceiver *receiver;
370 unsigned int odp_port;
374 if (!options->targets.n || !options->sampling_rate) {
375 /* No point in doing any work if there are no targets or nothing to
377 ofproto_sflow_clear(os);
381 options_changed = (!os->options
382 || !ofproto_sflow_options_equal(options, os->options));
384 /* Configure collectors if options have changed or if we're shortchanged in
385 * collectors (which indicates that opening one or more of the configured
386 * collectors failed, so that we should retry). */
388 || collectors_count(os->collectors) < options->targets.n) {
389 collectors_destroy(os->collectors);
390 collectors_create(&options->targets, SFL_DEFAULT_COLLECTOR_PORT,
392 if (os->collectors == NULL) {
393 VLOG_WARN_RL(&rl, "no collectors could be initialized, "
395 ofproto_sflow_clear(os);
400 /* Avoid reconfiguring if options didn't change. */
401 if (!options_changed) {
404 ofproto_sflow_options_destroy(os->options);
405 os->options = ofproto_sflow_options_clone(options);
407 /* Choose agent IP address. */
408 if (!sflow_choose_agent_address(options->agent_device,
409 options->control_ip, &agentIP)) {
410 ofproto_sflow_clear(os);
415 VLOG_INFO("creating sFlow agent %d", options->sub_id);
416 if (os->sflow_agent) {
417 sfl_agent_release(os->sflow_agent);
419 os->sflow_agent = xcalloc(1, sizeof *os->sflow_agent);
421 sfl_agent_init(os->sflow_agent,
424 now, /* Boot time. */
425 now, /* Current time. */
426 os, /* Pointer supplied to callbacks. */
427 sflow_agent_alloc_cb,
429 sflow_agent_error_cb,
430 sflow_agent_send_packet_cb);
432 receiver = sfl_agent_addReceiver(os->sflow_agent);
433 sfl_receiver_set_sFlowRcvrOwner(receiver, "Open vSwitch sFlow");
434 sfl_receiver_set_sFlowRcvrTimeout(receiver, 0xffffffff);
436 /* Set the sampling_rate down in the datapath. */
437 dpif_set_sflow_probability(os->dpif,
438 MAX(1, UINT32_MAX / options->sampling_rate));
440 /* Add samplers and pollers for the currently known ports. */
441 PORT_ARRAY_FOR_EACH (osp, &os->ports, odp_port) {
442 ofproto_sflow_add_sampler(os, osp,
443 options->sampling_rate, options->header_len);
448 ofproto_sflow_odp_port_to_ifindex(const struct ofproto_sflow *os,
451 struct ofproto_sflow_port *osp = port_array_get(&os->ports, odp_port);
452 return osp ? SFL_DS_INDEX(osp->dsi) : 0;
456 ofproto_sflow_received(struct ofproto_sflow *os, struct odp_msg *msg)
458 SFL_FLOW_SAMPLE_TYPE fs;
459 SFLFlow_sample_element hdrElem;
460 SFLSampled_header *header;
461 SFLFlow_sample_element switchElem;
463 const struct odp_sflow_sample_header *hdr;
464 const union odp_action *actions;
465 struct ofpbuf payload;
466 size_t n_actions, n_outputs;
471 /* Get odp_sflow_sample_header. */
472 min_size = sizeof *msg + sizeof *hdr;
473 if (min_size > msg->length) {
474 VLOG_WARN_RL(&rl, "sFlow packet too small (%"PRIu32" < %zu)",
475 msg->length, min_size);
478 hdr = (const struct odp_sflow_sample_header *) (msg + 1);
481 n_actions = hdr->n_actions;
482 if (n_actions > 65536 / sizeof *actions) {
483 VLOG_WARN_RL(&rl, "too many actions in sFlow packet (%zu > %zu)",
484 65536 / sizeof *actions, n_actions);
487 min_size += n_actions * sizeof *actions;
488 if (min_size > msg->length) {
489 VLOG_WARN_RL(&rl, "sFlow packet with %zu actions too small "
491 n_actions, msg->length, min_size);
494 actions = (const union odp_action *) (hdr + 1);
496 /* Get packet payload and extract flow. */
497 payload.data = (union odp_action *) (actions + n_actions);
498 payload.size = msg->length - min_size;
499 flow_extract(&payload, 0, msg->port, &flow);
501 /* Build a flow sample */
502 memset(&fs, 0, sizeof fs);
503 fs.input = ofproto_sflow_odp_port_to_ifindex(os, msg->port);
504 fs.output = 0; /* Filled in correctly below. */
505 fs.sample_pool = hdr->sample_pool;
507 /* We are going to give it to the sampler that represents this input port.
508 * By implementing "ingress-only" sampling like this we ensure that we
509 * never have to offer the same sample to more than one sampler. */
510 sampler = sfl_agent_getSamplerByIfIndex(os->sflow_agent, fs.input);
512 VLOG_WARN_RL(&rl, "no sampler for input ifIndex (%"PRIu32")",
517 /* Sampled header. */
518 memset(&hdrElem, 0, sizeof hdrElem);
519 hdrElem.tag = SFLFLOW_HEADER;
520 header = &hdrElem.flowType.header;
521 header->header_protocol = SFLHEADER_ETHERNET_ISO8023;
522 header->frame_length = payload.size;
523 header->stripped = 4; /* Ethernet FCS stripped off. */
524 header->header_length = MIN(payload.size,
525 sampler->sFlowFsMaximumHeaderSize);
526 header->header_bytes = payload.data;
528 /* Add extended switch element. */
529 memset(&switchElem, 0, sizeof(switchElem));
530 switchElem.tag = SFLFLOW_EX_SWITCH;
531 switchElem.flowType.sw.src_vlan = ntohs(flow.dl_vlan);
532 switchElem.flowType.sw.src_priority = -1; /* XXX */
533 switchElem.flowType.sw.dst_vlan = -1; /* Filled in correctly below. */
534 switchElem.flowType.sw.dst_priority = switchElem.flowType.sw.src_priority;
536 /* Figure out the output ports. */
538 for (i = 0; i < n_actions; i++) {
539 const union odp_action *a = &actions[i];
543 fs.output = ofproto_sflow_odp_port_to_ifindex(os, a->output.port);
547 case ODPAT_OUTPUT_GROUP:
548 n_outputs += (a->output_group.group == DP_GROUP_FLOOD ? os->n_flood
549 : a->output_group.group == DP_GROUP_ALL ? os->n_all
553 case ODPAT_SET_VLAN_VID:
554 switchElem.flowType.sw.dst_vlan = ntohs(a->vlan_vid.vlan_vid);
557 case ODPAT_SET_VLAN_PCP:
558 switchElem.flowType.sw.dst_priority = a->vlan_pcp.vlan_pcp;
566 /* Set output port, as defined by http://www.sflow.org/sflow_version_5.txt
567 (search for "Input/output port information"). */
569 /* This value indicates that the packet was dropped for an unknown
571 fs.output = 0x40000000 | 256;
572 } else if (n_outputs > 1 || !fs.output) {
573 /* Setting the high bit means "multiple output ports". */
574 fs.output = 0x80000000 | n_outputs;
577 /* Submit the flow sample to be encoded into the next datagram. */
578 SFLADD_ELEMENT(&fs, &hdrElem);
579 SFLADD_ELEMENT(&fs, &switchElem);
580 sfl_sampler_writeFlowSample(sampler, &fs);
584 ofproto_sflow_set_group_sizes(struct ofproto_sflow *os,
585 size_t n_flood, size_t n_all)
587 os->n_flood = n_flood;
592 ofproto_sflow_run(struct ofproto_sflow *os)
594 if (ofproto_sflow_is_enabled(os)) {
595 time_t now = time_now();
596 if (now >= os->next_tick) {
597 sfl_agent_tick(os->sflow_agent, now);
598 os->next_tick = now + 1;
604 ofproto_sflow_wait(struct ofproto_sflow *os)
606 if (ofproto_sflow_is_enabled(os)) {
607 poll_timer_wait(os->next_tick * 1000 - time_msec());