2012-02-03 12:21:14 +09:00
|
|
|
# Copyright (C) 2011, 2012 Nippon Telegraph and Telephone Corporation.
|
2012-01-31 16:45:04 +09:00
|
|
|
# Copyright (C) 2011, 2012 Isaku Yamahata <yamahata at valinux co jp>
|
2011-12-09 15:56:05 +09:00
|
|
|
#
|
2012-04-06 08:38:45 +09:00
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
2011-12-09 15:56:05 +09:00
|
|
|
#
|
2012-04-06 08:38:45 +09:00
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
2011-12-09 15:56:05 +09:00
|
|
|
#
|
2012-04-06 08:38:45 +09:00
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
|
|
|
# implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2011-12-09 15:56:05 +09:00
|
|
|
|
2012-02-24 14:37:32 +09:00
|
|
|
import contextlib
|
2013-02-20 12:38:44 +09:00
|
|
|
from oslo.config import cfg
|
2011-12-09 15:56:05 +09:00
|
|
|
import logging
|
2013-04-25 16:05:50 +09:00
|
|
|
from ryu.lib import hub
|
|
|
|
from ryu.lib.hub import StreamServer
|
2012-03-07 20:53:27 +09:00
|
|
|
import traceback
|
2012-01-30 18:30:55 +09:00
|
|
|
import random
|
2012-11-12 12:46:01 +09:00
|
|
|
import ssl
|
2011-12-09 15:56:05 +09:00
|
|
|
|
2013-02-03 21:54:40 +09:00
|
|
|
import ryu.base.app_manager
|
|
|
|
|
2012-07-17 06:57:34 +09:00
|
|
|
from ryu.ofproto import ofproto_common
|
2011-12-09 15:56:05 +09:00
|
|
|
from ryu.ofproto import ofproto_parser
|
|
|
|
from ryu.ofproto import ofproto_v1_0
|
|
|
|
from ryu.ofproto import ofproto_v1_0_parser
|
2012-02-23 12:55:46 +09:00
|
|
|
from ryu.ofproto import ofproto_v1_2
|
|
|
|
from ryu.ofproto import ofproto_v1_2_parser
|
2012-11-22 16:33:24 +09:00
|
|
|
from ryu.ofproto import ofproto_v1_3
|
|
|
|
from ryu.ofproto import ofproto_v1_3_parser
|
2012-03-13 09:06:23 +09:00
|
|
|
from ryu.ofproto import nx_match
|
2011-12-09 15:56:05 +09:00
|
|
|
|
|
|
|
from ryu.controller import handler
|
2012-02-02 14:48:35 +09:00
|
|
|
from ryu.controller import ofp_event
|
2011-12-09 15:56:05 +09:00
|
|
|
|
2013-05-15 10:22:37 +09:00
|
|
|
from ryu.lib.dpid import dpid_to_str
|
|
|
|
|
2011-12-09 15:56:05 +09:00
|
|
|
LOG = logging.getLogger('ryu.controller.controller')
|
|
|
|
|
2013-02-12 17:20:57 +09:00
|
|
|
CONF = cfg.CONF
|
|
|
|
CONF.register_cli_opts([
|
2013-02-21 11:23:32 +09:00
|
|
|
cfg.StrOpt('ofp-listen-host', default='', help='openflow listen host'),
|
|
|
|
cfg.IntOpt('ofp-tcp-listen-port', default=ofproto_common.OFP_TCP_PORT,
|
2013-02-12 17:20:57 +09:00
|
|
|
help='openflow tcp listen port'),
|
2013-02-21 11:23:32 +09:00
|
|
|
cfg.IntOpt('ofp-ssl-listen-port', default=ofproto_common.OFP_SSL_PORT,
|
2013-02-12 17:20:57 +09:00
|
|
|
help='openflow ssl listen port'),
|
2013-02-21 11:23:32 +09:00
|
|
|
cfg.StrOpt('ctl-privkey', default=None, help='controller private key'),
|
|
|
|
cfg.StrOpt('ctl-cert', default=None, help='controller certificate'),
|
|
|
|
cfg.StrOpt('ca-certs', default=None, help='CA certificates')
|
2013-02-12 17:20:57 +09:00
|
|
|
])
|
2011-12-09 15:56:05 +09:00
|
|
|
|
|
|
|
|
|
|
|
class OpenFlowController(object):
|
|
|
|
def __init__(self):
|
|
|
|
super(OpenFlowController, self).__init__()
|
|
|
|
|
|
|
|
# entry point
|
|
|
|
def __call__(self):
|
|
|
|
#LOG.debug('call')
|
|
|
|
self.server_loop()
|
|
|
|
|
|
|
|
def server_loop(self):
|
2013-03-18 14:05:48 +09:00
|
|
|
if CONF.ctl_privkey is not None and CONF.ctl_cert is not None:
|
2013-02-12 17:20:57 +09:00
|
|
|
if CONF.ca_certs is not None:
|
|
|
|
server = StreamServer((CONF.ofp_listen_host,
|
|
|
|
CONF.ofp_ssl_listen_port),
|
2012-11-12 12:46:01 +09:00
|
|
|
datapath_connection_factory,
|
2013-02-12 17:20:57 +09:00
|
|
|
keyfile=CONF.ctl_privkey,
|
|
|
|
certfile=CONF.ctl_cert,
|
2012-11-12 12:46:01 +09:00
|
|
|
cert_reqs=ssl.CERT_REQUIRED,
|
2013-02-12 17:20:57 +09:00
|
|
|
ca_certs=CONF.ca_certs,
|
2012-11-12 12:46:01 +09:00
|
|
|
ssl_version=ssl.PROTOCOL_TLSv1)
|
|
|
|
else:
|
2013-02-12 17:20:57 +09:00
|
|
|
server = StreamServer((CONF.ofp_listen_host,
|
|
|
|
CONF.ofp_ssl_listen_port),
|
2012-11-12 12:46:01 +09:00
|
|
|
datapath_connection_factory,
|
2013-02-12 17:20:57 +09:00
|
|
|
keyfile=CONF.ctl_privkey,
|
|
|
|
certfile=CONF.ctl_cert,
|
2012-11-12 12:46:01 +09:00
|
|
|
ssl_version=ssl.PROTOCOL_TLSv1)
|
|
|
|
else:
|
2013-02-12 17:20:57 +09:00
|
|
|
server = StreamServer((CONF.ofp_listen_host,
|
|
|
|
CONF.ofp_tcp_listen_port),
|
2012-11-12 12:46:01 +09:00
|
|
|
datapath_connection_factory)
|
|
|
|
|
2011-12-09 15:56:05 +09:00
|
|
|
#LOG.debug('loop')
|
|
|
|
server.serve_forever()
|
|
|
|
|
|
|
|
|
|
|
|
def _deactivate(method):
|
|
|
|
def deactivate(self):
|
|
|
|
try:
|
|
|
|
method(self)
|
|
|
|
finally:
|
|
|
|
self.is_active = False
|
|
|
|
return deactivate
|
|
|
|
|
|
|
|
|
|
|
|
class Datapath(object):
|
|
|
|
supported_ofp_version = {
|
|
|
|
ofproto_v1_0.OFP_VERSION: (ofproto_v1_0,
|
|
|
|
ofproto_v1_0_parser),
|
2012-02-23 12:55:46 +09:00
|
|
|
ofproto_v1_2.OFP_VERSION: (ofproto_v1_2,
|
|
|
|
ofproto_v1_2_parser),
|
2012-11-22 16:33:24 +09:00
|
|
|
ofproto_v1_3.OFP_VERSION: (ofproto_v1_3,
|
|
|
|
ofproto_v1_3_parser),
|
2012-08-22 06:27:12 +09:00
|
|
|
}
|
2011-12-09 15:56:05 +09:00
|
|
|
|
|
|
|
def __init__(self, socket, address):
|
|
|
|
super(Datapath, self).__init__()
|
|
|
|
|
|
|
|
self.socket = socket
|
|
|
|
self.address = address
|
|
|
|
self.is_active = True
|
|
|
|
|
2012-02-25 11:47:13 +09:00
|
|
|
# The limit is arbitrary. We need to limit queue size to
|
|
|
|
# prevent it from eating memory up
|
2013-04-25 16:05:50 +09:00
|
|
|
self.send_q = hub.Queue(16)
|
2011-12-09 15:56:05 +09:00
|
|
|
|
2012-01-15 23:10:30 +09:00
|
|
|
self.set_version(max(self.supported_ofp_version))
|
2012-01-30 18:30:55 +09:00
|
|
|
self.xid = random.randint(0, self.ofproto.MAX_XID)
|
2011-12-09 15:56:05 +09:00
|
|
|
self.id = None # datapath_id is unknown yet
|
|
|
|
self.ports = None
|
2012-03-13 09:06:13 +09:00
|
|
|
self.flow_format = ofproto_v1_0.NXFF_OPENFLOW10
|
2013-02-03 21:54:40 +09:00
|
|
|
self.ofp_brick = ryu.base.app_manager.lookup_service_brick('ofp_event')
|
|
|
|
self.set_state(handler.HANDSHAKE_DISPATCHER)
|
2011-12-09 15:56:05 +09:00
|
|
|
|
2012-02-24 14:37:32 +09:00
|
|
|
def close(self):
|
2013-02-03 21:54:40 +09:00
|
|
|
self.set_state(handler.DEAD_DISPATCHER)
|
|
|
|
|
|
|
|
def set_state(self, state):
|
|
|
|
self.state = state
|
|
|
|
ev = ofp_event.EventOFPStateChange(self)
|
|
|
|
ev.state = state
|
RyuApp: allows observers to specify state
This fixes the following exception:
> $ ryu-manager ryu_app(OF1.2 app)
> $ sudo mn --controller remote 127.0.0.1
> $ sudo ovs-vsctl set bridge s1 protocols='[OpenFlow10,OpenFlow12]'
> connected socket:<socket fileno=4 sock=127.0.0.1:6633 peer=127.0.0.1:60456> address:('127.0.0.1', 60456)
> EVENT ofp_event->dpset EventOFPStateChange
> connected socket:<socket fileno=10 sock=127.0.0.1:6633 peer=127.0.0.1:60457> address:('127.0.0.1', 60457)
> EVENT ofp_event->dpset EventOFPStateChange
> hello ev <ryu.controller.ofp_event.EventOFPHello object at 0x11bf550>
> unsupported version 0x1. If possible, set the switch to use one of the versions [3]
> error msg ev version: 0x3 msg_type 0x1 xid 0xc84d9220 type 0x1 code 0x1 0x3 0x1 0x0 0x5f 0xc8 0x4d 0x92 0x20 0x0 0x0 0x0 0x0 0x75 0x6e 0x73 0x75 0x70 0x70 0x6f
> +0x72 0x74 0x65 0x64 0x20 0x76 0x65 0x72 0x73 0x69 0x6f 0x6e 0x20 0x30 0x78 0x31 0x2e 0x20 0x49 0x66 0x20 0x70 0x6f 0x73 0x73 0x69 0x62 0x6c 0x65 0x2c 0x20 0x73
> +0x65 0x74 0x20 0x74 0x68 0x65 0x20 0x73 0x77 0x69 0x74 0x63 0x68
> EVENT ofp_event->dpset EventOFPPortStatus
> DPSET: A port was modified.(datapath id = None, port number = 1)
> Traceback (most recent call last):
> File "/usr/lib/python2.7/dist-packages/gevent/greenlet.py", line 390, in run
> result = self._run(*self.args, **self.kwargs)
> File "/usr/local/lib/python2.7/dist-packages/ryu-1.6-py2.7.egg/ryu/base/app_manager.py", line 86, in _event_loop
> handler(ev)
> File "/usr/local/lib/python2.7/dist-packages/ryu-1.6-py2.7.egg/ryu/controller/dpset.py", line 192, in port_status_handler
> self.port_state[datapath.id].modify(port.port_no, port)
> KeyError: None
> <Greenlet at 0x11bc518: <bound method DPSet._event_loop of <ryu.controller.dpset.DPSet object at 0xd0df10>>> failed with KeyError
Reported-by: HIYAMA Manabu <hiyama.manabu@po.ntts.co.jp>
Signed-off-by: FUJITA Tomonori <fujita.tomonori@lab.ntt.co.jp>
2013-02-27 21:24:03 +09:00
|
|
|
self.ofp_brick.send_event_to_observers(ev, state)
|
2012-02-24 14:37:32 +09:00
|
|
|
|
2011-12-09 15:56:05 +09:00
|
|
|
def set_version(self, version):
|
|
|
|
assert version in self.supported_ofp_version
|
|
|
|
self.ofproto, self.ofproto_parser = self.supported_ofp_version[version]
|
|
|
|
|
|
|
|
# Low level socket handling layer
|
|
|
|
@_deactivate
|
|
|
|
def _recv_loop(self):
|
|
|
|
buf = bytearray()
|
2012-07-17 06:57:34 +09:00
|
|
|
required_len = ofproto_common.OFP_HEADER_SIZE
|
2011-12-09 15:56:05 +09:00
|
|
|
|
2012-02-25 11:47:15 +09:00
|
|
|
count = 0
|
2011-12-09 15:56:05 +09:00
|
|
|
while self.is_active:
|
2012-02-25 11:47:14 +09:00
|
|
|
ret = self.socket.recv(required_len)
|
2011-12-09 15:56:05 +09:00
|
|
|
if len(ret) == 0:
|
|
|
|
self.is_active = False
|
|
|
|
break
|
|
|
|
buf += ret
|
|
|
|
while len(buf) >= required_len:
|
|
|
|
(version, msg_type, msg_len, xid) = ofproto_parser.header(buf)
|
|
|
|
required_len = msg_len
|
|
|
|
if len(buf) < required_len:
|
|
|
|
break
|
|
|
|
|
|
|
|
msg = ofproto_parser.msg(self,
|
|
|
|
version, msg_type, msg_len, xid, buf)
|
|
|
|
#LOG.debug('queue msg %s cls %s', msg, msg.__class__)
|
2013-02-03 21:54:40 +09:00
|
|
|
ev = ofp_event.ofp_msg_to_ev(msg)
|
2013-03-06 23:40:24 +09:00
|
|
|
self.ofp_brick.send_event_to_observers(ev, self.state)
|
|
|
|
|
2013-03-11 19:09:01 +09:00
|
|
|
handlers = [handler for handler in
|
|
|
|
self.ofp_brick.get_handlers(ev) if self.state in
|
|
|
|
handler.dispatchers]
|
2013-02-03 21:54:40 +09:00
|
|
|
for handler in handlers:
|
2013-03-11 19:09:01 +09:00
|
|
|
handler(ev)
|
2013-02-03 21:54:40 +09:00
|
|
|
|
2011-12-09 15:56:05 +09:00
|
|
|
buf = buf[required_len:]
|
2012-07-17 06:57:34 +09:00
|
|
|
required_len = ofproto_common.OFP_HEADER_SIZE
|
2011-12-09 15:56:05 +09:00
|
|
|
|
2012-02-25 11:47:15 +09:00
|
|
|
# We need to schedule other greenlets. Otherwise, ryu
|
|
|
|
# can't accept new switches or handle the existing
|
|
|
|
# switches. The limit is arbitrary. We need the better
|
|
|
|
# approach in the future.
|
|
|
|
count += 1
|
|
|
|
if count > 2048:
|
|
|
|
count = 0
|
2013-04-25 16:05:50 +09:00
|
|
|
hub.sleep(0)
|
2012-02-25 11:47:15 +09:00
|
|
|
|
2011-12-09 15:56:05 +09:00
|
|
|
@_deactivate
|
|
|
|
def _send_loop(self):
|
2013-02-13 13:23:40 +09:00
|
|
|
try:
|
|
|
|
while self.is_active:
|
|
|
|
buf = self.send_q.get()
|
|
|
|
self.socket.sendall(buf)
|
|
|
|
finally:
|
2013-04-25 16:08:25 +09:00
|
|
|
q = self.send_q
|
|
|
|
# first, clear self.send_q to prevent new references.
|
2013-02-13 13:23:40 +09:00
|
|
|
self.send_q = None
|
2013-04-25 16:08:25 +09:00
|
|
|
# there might be threads currently blocking in send_q.put().
|
|
|
|
# unblock them by draining the queue.
|
|
|
|
try:
|
|
|
|
while q.get(block=False):
|
|
|
|
pass
|
|
|
|
except hub.QueueEmpty:
|
|
|
|
pass
|
2011-12-09 15:56:05 +09:00
|
|
|
|
|
|
|
def send(self, buf):
|
2013-02-13 13:23:40 +09:00
|
|
|
if self.send_q:
|
|
|
|
self.send_q.put(buf)
|
2011-12-09 15:56:05 +09:00
|
|
|
|
2012-01-30 18:30:55 +09:00
|
|
|
def set_xid(self, msg):
|
|
|
|
self.xid += 1
|
|
|
|
self.xid &= self.ofproto.MAX_XID
|
|
|
|
msg.set_xid(self.xid)
|
|
|
|
return self.xid
|
|
|
|
|
2011-12-09 15:56:05 +09:00
|
|
|
def send_msg(self, msg):
|
|
|
|
assert isinstance(msg, self.ofproto_parser.MsgBase)
|
2012-01-30 18:30:55 +09:00
|
|
|
if msg.xid is None:
|
|
|
|
self.set_xid(msg)
|
2011-12-09 15:56:05 +09:00
|
|
|
msg.serialize()
|
|
|
|
# LOG.debug('send_msg %s', msg)
|
|
|
|
self.send(msg.buf)
|
|
|
|
|
|
|
|
def serve(self):
|
2013-04-25 16:05:50 +09:00
|
|
|
send_thr = hub.spawn(self._send_loop)
|
2011-12-09 15:56:05 +09:00
|
|
|
|
|
|
|
# send hello message immediately
|
|
|
|
hello = self.ofproto_parser.OFPHello(self)
|
|
|
|
self.send_msg(hello)
|
|
|
|
|
2012-02-24 14:37:29 +09:00
|
|
|
try:
|
|
|
|
self._recv_loop()
|
|
|
|
finally:
|
2013-04-25 16:05:50 +09:00
|
|
|
hub.kill(send_thr)
|
|
|
|
hub.joinall([send_thr])
|
2011-12-09 15:56:05 +09:00
|
|
|
|
|
|
|
#
|
|
|
|
# Utility methods for convenience
|
|
|
|
#
|
|
|
|
def send_packet_out(self, buffer_id=0xffffffff, in_port=None,
|
|
|
|
actions=None, data=None):
|
|
|
|
if in_port is None:
|
|
|
|
in_port = self.ofproto.OFPP_NONE
|
|
|
|
packet_out = self.ofproto_parser.OFPPacketOut(
|
|
|
|
self, buffer_id, in_port, actions, data)
|
|
|
|
self.send_msg(packet_out)
|
|
|
|
|
2012-03-13 09:06:23 +09:00
|
|
|
def send_flow_mod(self, rule, cookie, command, idle_timeout, hard_timeout,
|
2012-04-04 18:37:57 +09:00
|
|
|
priority=None, buffer_id=0xffffffff,
|
2011-12-09 15:56:05 +09:00
|
|
|
out_port=None, flags=0, actions=None):
|
2012-04-04 18:37:57 +09:00
|
|
|
if priority is None:
|
|
|
|
priority = self.ofproto.OFP_DEFAULT_PRIORITY
|
2011-12-09 15:56:05 +09:00
|
|
|
if out_port is None:
|
|
|
|
out_port = self.ofproto.OFPP_NONE
|
2012-03-13 09:06:23 +09:00
|
|
|
flow_format = rule.flow_format()
|
|
|
|
assert (flow_format == ofproto_v1_0.NXFF_OPENFLOW10 or
|
|
|
|
flow_format == ofproto_v1_0.NXFF_NXM)
|
|
|
|
if self.flow_format < flow_format:
|
|
|
|
self.send_nxt_set_flow_format(flow_format)
|
|
|
|
if flow_format == ofproto_v1_0.NXFF_OPENFLOW10:
|
|
|
|
match_tuple = rule.match_tuple()
|
|
|
|
match = self.ofproto_parser.OFPMatch(*match_tuple)
|
|
|
|
flow_mod = self.ofproto_parser.OFPFlowMod(
|
|
|
|
self, match, cookie, command, idle_timeout, hard_timeout,
|
|
|
|
priority, buffer_id, out_port, flags, actions)
|
|
|
|
else:
|
|
|
|
flow_mod = self.ofproto_parser.NXTFlowMod(
|
|
|
|
self, cookie, command, idle_timeout, hard_timeout,
|
|
|
|
priority, buffer_id, out_port, flags, rule, actions)
|
2011-12-09 15:56:05 +09:00
|
|
|
self.send_msg(flow_mod)
|
|
|
|
|
2012-03-13 09:06:23 +09:00
|
|
|
def send_flow_del(self, rule, cookie, out_port=None):
|
|
|
|
self.send_flow_mod(rule=rule, cookie=cookie,
|
2012-02-10 11:43:21 +09:00
|
|
|
command=self.ofproto.OFPFC_DELETE,
|
|
|
|
idle_timeout=0, hard_timeout=0, priority=0,
|
|
|
|
out_port=out_port)
|
|
|
|
|
2011-12-09 15:56:05 +09:00
|
|
|
def send_delete_all_flows(self):
|
2012-03-13 09:06:23 +09:00
|
|
|
rule = nx_match.ClsRule()
|
2011-12-09 15:56:05 +09:00
|
|
|
self.send_flow_mod(
|
2012-03-13 09:06:23 +09:00
|
|
|
rule=rule, cookie=0, command=self.ofproto.OFPFC_DELETE,
|
2011-12-09 15:56:05 +09:00
|
|
|
idle_timeout=0, hard_timeout=0, priority=0, buffer_id=0,
|
|
|
|
out_port=self.ofproto.OFPP_NONE, flags=0, actions=None)
|
|
|
|
|
|
|
|
def send_barrier(self):
|
|
|
|
barrier_request = self.ofproto_parser.OFPBarrierRequest(self)
|
|
|
|
self.send_msg(barrier_request)
|
|
|
|
|
2012-04-04 18:37:53 +09:00
|
|
|
def send_nxt_set_flow_format(self, flow_format):
|
|
|
|
assert (flow_format == ofproto_v1_0.NXFF_OPENFLOW10 or
|
|
|
|
flow_format == ofproto_v1_0.NXFF_NXM)
|
|
|
|
if self.flow_format == flow_format:
|
2012-03-13 09:06:13 +09:00
|
|
|
# Nothing to do
|
|
|
|
return
|
2012-04-04 18:37:53 +09:00
|
|
|
self.flow_format = flow_format
|
|
|
|
set_format = self.ofproto_parser.NXTSetFlowFormat(self, flow_format)
|
2012-03-13 09:06:13 +09:00
|
|
|
# FIXME: If NXT_SET_FLOW_FORMAT or NXFF_NXM is not supported by
|
|
|
|
# the switch then an error message will be received. It may be
|
|
|
|
# handled by setting self.flow_format to
|
|
|
|
# ofproto_v1_0.NXFF_OPENFLOW10 but currently isn't.
|
|
|
|
self.send_msg(set_format)
|
|
|
|
self.send_barrier()
|
|
|
|
|
2013-02-08 12:28:09 +09:00
|
|
|
def is_reserved_port(self, port_no):
|
|
|
|
return port_no > self.ofproto.OFPP_MAX
|
|
|
|
|
2011-12-09 15:56:05 +09:00
|
|
|
|
2012-02-02 14:48:34 +09:00
|
|
|
def datapath_connection_factory(socket, address):
|
2011-12-09 15:56:05 +09:00
|
|
|
LOG.debug('connected socket:%s address:%s', socket, address)
|
2012-02-24 14:37:32 +09:00
|
|
|
with contextlib.closing(Datapath(socket, address)) as datapath:
|
2012-03-07 20:53:27 +09:00
|
|
|
try:
|
|
|
|
datapath.serve()
|
|
|
|
except:
|
|
|
|
# Something went wrong.
|
|
|
|
# Especially malicious switch can send malformed packet,
|
|
|
|
# the parser raise exception.
|
|
|
|
# Can we do anything more graceful?
|
2013-06-18 16:35:25 +09:00
|
|
|
if datapath.id is None:
|
|
|
|
dpid_str = "%s" % datapath.id
|
|
|
|
else:
|
|
|
|
dpid_str = dpid_to_str(datapath.id)
|
|
|
|
LOG.error("Error in the datapath %s from %s", dpid_str, address)
|
2012-03-07 20:53:27 +09:00
|
|
|
raise
|