On Mon, Jun 30, 2014 at 3:01 PM, Alex Wang <[email protected]> wrote:
> Due to the race condition in userspace, there is chance that two
> overlapping megaflows could be installed in datapath. And this
> causes userspace unable to delete the less inclusive megaflow flow
> even after it timeout, since the flow_del logic will stop at the
> first match of masked flow.
>
> This commit fixes the bug by making the kernel flow_del and flow_get
> logic check all masks in that case.
>
> Signed-off-by: Alex Wang <[email protected]>
> Acked-by: Andy Zhou <[email protected]>
> ---
> datapath/datapath.c | 8 ++++----
> datapath/flow_table.c | 25 +++++++++++++++++++++++++
> datapath/flow_table.h | 2 ++
> 3 files changed, 31 insertions(+), 4 deletions(-)
>
> diff --git a/datapath/datapath.c b/datapath/datapath.c
> index e504fee..b72419b 100644
> --- a/datapath/datapath.c
> +++ b/datapath/datapath.c
> @@ -1117,8 +1117,8 @@ static int ovs_flow_cmd_get(struct sk_buff *skb, struct
> genl_info *info)
> goto unlock;
> }
>
> - flow = ovs_flow_tbl_lookup(&dp->table, &key);
> - if (!flow || !ovs_flow_cmp_unmasked_key(flow, &match)) {
> + flow = ovs_flow_tbl_lookup_exact(&dp->table, &match);
> + if (!flow) {
> err = -ENOENT;
> goto unlock;
> }
> @@ -1165,8 +1165,8 @@ static int ovs_flow_cmd_del(struct sk_buff *skb, struct
> genl_info *info)
> err = ovs_flow_tbl_flush(&dp->table);
> goto unlock;
> }
> - flow = ovs_flow_tbl_lookup(&dp->table, &key);
> - if (unlikely(!flow || !ovs_flow_cmp_unmasked_key(flow, &match))) {
> + flow = ovs_flow_tbl_lookup_exact(&dp->table, &match);
> + if (unlikely(!flow)) {
> err = -ENOENT;
> goto unlock;
> }
Can you use exact-lookup in ovsflow_cmd_set(). and do same in
ovs_flow_cmd_new() when ovs_flow_cmp_unmasked_key() fails. We also
need to change return value to ENOENT.
> diff --git a/datapath/flow_table.c b/datapath/flow_table.c
> index 9746822..dfd3997 100644
> --- a/datapath/flow_table.c
> +++ b/datapath/flow_table.c
> @@ -686,6 +686,31 @@ struct sw_flow *ovs_flow_tbl_lookup(struct flow_table
> *tbl,
> return flow_lookup(tbl, ti, ma, key, &n_mask_hit, &index);
> }
>
> +struct sw_flow *ovs_flow_tbl_lookup_exact(struct flow_table *tbl,
> + struct sw_flow_match *match)
> +{
> + struct table_instance *ti = rcu_dereference_ovsl(tbl->ti);
> + struct mask_array *ma = rcu_dereference_ovsl(tbl->mask_array);
> + struct sw_flow *flow;
> + u32 __always_unused n_mask_hit;
> + int i;
> +
> + n_mask_hit = 0;
> +
since it always unused there is no need to set it.
> + for (i = 0; i < ma->max; i++) {
All valid mask are stored in (0, count] range, so we can loop from 0
to ma->count.
> + struct sw_flow_mask *mask;
> +
> + mask = rcu_dereference_ovsl(ma->masks[i]);
it is always called under ovs lock, so we need ovsl_dereference().
> + if (mask) {
> + flow = masked_flow_lookup(ti, match->key, mask,
> &n_mask_hit);
> + if (flow && ovs_flow_cmp_unmasked_key(flow, match)) {
> /* Found */
> + return flow;
> + }
> + }
> + }
> + return NULL;
> +}
> +
> int ovs_flow_tbl_num_masks(const struct flow_table *table)
> {
> struct mask_array *ma;
> diff --git a/datapath/flow_table.h b/datapath/flow_table.h
> index ee86953..a05d36a 100644
> --- a/datapath/flow_table.h
> +++ b/datapath/flow_table.h
> @@ -89,6 +89,8 @@ struct sw_flow *ovs_flow_tbl_lookup_stats(struct flow_table
> *,
> u32 *n_mask_hit);
> struct sw_flow *ovs_flow_tbl_lookup(struct flow_table *,
> const struct sw_flow_key *);
> +struct sw_flow *ovs_flow_tbl_lookup_exact(struct flow_table *,
> + struct sw_flow_match *match);
>
> bool ovs_flow_cmp_unmasked_key(const struct sw_flow *flow,
> struct sw_flow_match *match);
otherwise looks good.
Acked-by: Pravin B Shelar <[email protected]>
> --
> 1.7.9.5
>
_______________________________________________
dev mailing list
[email protected]
http://openvswitch.org/mailman/listinfo/dev