Uday,

ofproto-dpif-upcall.c calls into ofproto-dpif-xlate.c that performs flow 
lookups and thereby find the actions that should be applied to the packet. For 
example, action types are discerned in do_xlate_actions(). The “normal” action 
is actually a special port number (OFPP_NORMAL) and is processed by 
late_output_action().

To see the flow lookups and action processing in action, you should get 
familiar with “ovs-appctl ofproto/trace”. You can find numerous examples by:

$ cd tests
$ git grep “ofproto/trace”

Regards,

  Jarno

> On Aug 7, 2015, at 7:57 AM, <ravulakollu.ku...@wipro.com> 
> <ravulakollu.ku...@wipro.com> wrote:
> 
> Hi Team,
> 
> I am debugging upcall processing in ofproto-dpif-upcall.c  file . I am not 
> able to visualize how opfbuf structure is being
> filled with actions(Note: My bridge is configured without OF rules, meaning 
> actions=NORMAL).
> I could see packet is being flooded for unknown mac, vlan in the code. But 
> somehow dpif_netlink_operate is receiving proper netlink action
> attributes in sequence to be executed in DP.
> Also I could see in gdb xout.odp_actions is only holding some addresses. How 
> to know what actually resides in this address.
> (gdb) p upcall->xout.odp_actions->data
> $7 = (void *) 0x7f6275a53398
> 
> Could someone please , let me know  how this buffer is being filled, and what 
> is the importance of ofpbuf.
> 
> Thanks in Advance,
> Uday
> The information contained in this electronic message and any attachments to 
> this message are intended for the exclusive use of the addressee(s) and may 
> contain proprietary, confidential or privileged information. If you are not 
> the intended recipient, you should not disseminate, distribute or copy this 
> e-mail. Please notify the sender immediately and destroy all copies of this 
> message and any attachments. WARNING: Computer viruses can be transmitted via 
> email. The recipient should check this email and any attachments for the 
> presence of viruses. The company accepts no liability for any damage caused 
> by any virus transmitted by this email. www.wipro.com
> _______________________________________________
> dev mailing list
> dev@openvswitch.org
> http://openvswitch.org/mailman/listinfo/dev

_______________________________________________
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev

Reply via email to