On Fri, Jun 4, 2021 at 6:56 AM Dumitru Ceara <dce...@redhat.com> wrote: > > On 5/28/21 9:23 PM, Han Zhou wrote: > > If a lflow has an lport name in the match, but when the lflow is > > processed the port-binding is not seen by ovn-controller, the > > corresponding openflow will not be created. Later if the port-binding is > > created/monitored by ovn-controller, the lflow is not reprocessed > > because the lflow didn't change and ovn-controller doesn't know that the > > port-binding affects the lflow. This patch fixes the problem by tracking > > the references when parsing the lflow, even if the port-binding is not > > found when the lflow is firstly parsed. A test case is also added to > > cover the scenario. > > > > Signed-off-by: Han Zhou <hz...@ovn.org> > > --- > > controller/lflow.c | 66 +++++++++++++++++++++++++++---------- > > controller/lflow.h | 3 ++ > > controller/ovn-controller.c | 17 ++++++++-- > > tests/ovn.at | 48 +++++++++++++++++++++++++++ > > 4 files changed, 114 insertions(+), 20 deletions(-) > > > > diff --git a/controller/lflow.c b/controller/lflow.c > > index 0abb6eb96..fa102e8d0 100644 > > --- a/controller/lflow.c > > +++ b/controller/lflow.c > > @@ -61,6 +61,7 @@ struct lookup_port_aux { > > > > struct condition_aux { > > struct ovsdb_idl_index *sbrec_port_binding_by_name; > > + const struct sbrec_datapath_binding *dp; > > const struct sbrec_chassis *chassis; > > const struct sset *active_tunnels; > > const struct sbrec_logical_flow *lflow; > > @@ -98,6 +99,12 @@ lookup_port_cb(const void *aux_, const char *port_name, unsigned int *portp) > > > > const struct lookup_port_aux *aux = aux_; > > > > + /* Store the name that used to lookup the lport to lflow reference, so that > > + * in the future when the lport's port binding changes, the logical flow > > + * that references this lport can be reprocessed. */ > > + lflow_resource_add(aux->lfrr, REF_TYPE_PORTBINDING, port_name, > > + &aux->lflow->header_.uuid); > > + > > const struct sbrec_port_binding *pb > > = lport_lookup_by_name(aux->sbrec_port_binding_by_name, port_name); > > if (pb && pb->datapath == aux->dp) { > > @@ -149,19 +156,18 @@ is_chassis_resident_cb(const void *c_aux_, const char *port_name) > > { > > const struct condition_aux *c_aux = c_aux_; > > > > + /* Store the port name that used to lookup the lport to lflow reference, so > > + * that in the future when the lport's port-binding changes the logical > > + * flow that references this lport can be reprocessed. */ > > + lflow_resource_add(c_aux->lfrr, REF_TYPE_PORTBINDING, port_name, > > + &c_aux->lflow->header_.uuid); > > + > > const struct sbrec_port_binding *pb > > = lport_lookup_by_name(c_aux->sbrec_port_binding_by_name, port_name); > > if (!pb) { > > return false; > > } > > > > - /* Store the port_name to lflow reference. */ > > - int64_t dp_id = pb->datapath->tunnel_key; > > - char buf[16]; > > - get_unique_lport_key(dp_id, pb->tunnel_key, buf, sizeof(buf)); > > - lflow_resource_add(c_aux->lfrr, REF_TYPE_PORTBINDING, buf, > > - &c_aux->lflow->header_.uuid); > > - > > if (strcmp(pb->type, "chassisredirect")) { > > /* for non-chassisredirect ports */ > > return pb->chassis && pb->chassis == c_aux->chassis; > > @@ -623,8 +629,6 @@ add_matches_to_flow_table(const struct sbrec_logical_flow *lflow, > > int64_t dp_id = dp->tunnel_key; > > char buf[16]; > > get_unique_lport_key(dp_id, port_id, buf, sizeof(buf)); > > - lflow_resource_add(l_ctx_out->lfrr, REF_TYPE_PORTBINDING, buf, > > - &lflow->header_.uuid); > > if (!sset_contains(l_ctx_in->local_lport_ids, buf)) { > > VLOG_DBG("lflow "UUID_FMT > > " port %s in match is not local, skip", > > @@ -788,6 +792,7 @@ consider_logical_flow__(const struct sbrec_logical_flow *lflow, > > }; > > struct condition_aux cond_aux = { > > .sbrec_port_binding_by_name = l_ctx_in->sbrec_port_binding_by_name, > > + .dp = dp, > > .chassis = l_ctx_in->chassis, > > .active_tunnels = l_ctx_in->active_tunnels, > > .lflow = lflow, > > @@ -883,7 +888,9 @@ consider_logical_flow__(const struct sbrec_logical_flow *lflow, > > > > /* Cache new entry if caching is enabled. */ > > if (lflow_cache_is_enabled(l_ctx_out->lflow_cache)) { > > - if (cached_expr && !is_cr_cond_present) { > > + if (cached_expr > > + && !lflow_ref_lookup(&l_ctx_out->lfrr->lflow_ref_table, > > + &lflow->header_.uuid)) { > > lflow_cache_add_matches(l_ctx_out->lflow_cache, > > &lflow->header_.uuid, matches, > > matches_size); > > @@ -1746,19 +1753,42 @@ lflow_processing_end: > > return handled; > > } > > > > +/* Handles a port-binding change that is possibly related to a lport's > > + * residence status on this chassis. */ > > bool > > lflow_handle_flows_for_lport(const struct sbrec_port_binding *pb, > > struct lflow_ctx_in *l_ctx_in, > > struct lflow_ctx_out *l_ctx_out) > > { > > - bool changed; > > - int64_t dp_id = pb->datapath->tunnel_key; > > - char pb_ref_name[16]; > > - get_unique_lport_key(dp_id, pb->tunnel_key, pb_ref_name, > > - sizeof(pb_ref_name)); > > - > > - return lflow_handle_changed_ref(REF_TYPE_PORTBINDING, pb_ref_name, > > - l_ctx_in, l_ctx_out, &changed); > > + bool changed, ret = true; > > Same nit as in patch 1, I'd personally split this in two declarations. > Ack
> > + > > + if (!lflow_handle_changed_ref(REF_TYPE_PORTBINDING, pb->logical_port, > > + l_ctx_in, l_ctx_out, &changed)) { > > + ret = false; > > + } > > + return ret; > > +} > > + > > +/* Handles port-binding add/deletions. */ > > +bool > > +lflow_handle_port_binding_add_del(struct lflow_ctx_in *l_ctx_in, > > + struct lflow_ctx_out *l_ctx_out) > > For consistency with other functions that perform I-P in lflow.c we > should probably rename this to lflow_handle_changed_port_bindings(). Ack > > > +{ > > + bool changed, ret = true; > > Same nit as in patch 1, I'd personally split this in two declarations. Ack > > > + const struct sbrec_port_binding *pb; > > + SBREC_PORT_BINDING_TABLE_FOR_EACH_TRACKED (pb, > > + l_ctx_in->port_binding_table) { > > + if (!sbrec_port_binding_is_new(pb) > > + && !sbrec_port_binding_is_deleted(pb)) { > > + continue; > > + } > > + if (!lflow_handle_changed_ref(REF_TYPE_PORTBINDING, pb->logical_port, > > + l_ctx_in, l_ctx_out, &changed)) { > > + ret = false; > > + break; > > + } > > + } > > + return ret; > > } > > > > bool > > diff --git a/controller/lflow.h b/controller/lflow.h > > index 07263ff47..1ae32b9c5 100644 > > --- a/controller/lflow.h > > +++ b/controller/lflow.h > > @@ -130,6 +130,7 @@ struct lflow_ctx_in { > > struct ovsdb_idl_index *sbrec_logical_flow_by_logical_datapath; > > struct ovsdb_idl_index *sbrec_logical_flow_by_logical_dp_group; > > struct ovsdb_idl_index *sbrec_port_binding_by_name; > > + const struct sbrec_port_binding_table *port_binding_table; > > const struct sbrec_dhcp_options_table *dhcp_options_table; > > const struct sbrec_dhcpv6_options_table *dhcpv6_options_table; > > const struct sbrec_datapath_binding_table *dp_binding_table; > > @@ -180,6 +181,8 @@ bool lflow_add_flows_for_datapath(const struct sbrec_datapath_binding *, > > bool lflow_handle_flows_for_lport(const struct sbrec_port_binding *, > > struct lflow_ctx_in *, > > struct lflow_ctx_out *); > > +bool lflow_handle_port_binding_add_del(struct lflow_ctx_in *, > > + struct lflow_ctx_out *); > > bool lflow_handle_mc_group_changes(struct lflow_ctx_in *, > > struct lflow_ctx_out *); > > #endif /* controller/lflow.h */ > > diff --git a/controller/ovn-controller.c b/controller/ovn-controller.c > > index 949137c0a..6566f44be 100644 > > --- a/controller/ovn-controller.c > > +++ b/controller/ovn-controller.c > > @@ -2000,6 +2000,10 @@ static void init_lflow_ctx(struct engine_node *node, > > engine_get_input("SB_multicast_group", node), > > "name_datapath"); > > > > + struct sbrec_port_binding_table *port_binding_table = > > + (struct sbrec_port_binding_table *)EN_OVSDB_GET( > > + engine_get_input("SB_port_binding", node)); > > + > > struct sbrec_dhcp_options_table *dhcp_table = > > (struct sbrec_dhcp_options_table *)EN_OVSDB_GET( > > engine_get_input("SB_dhcp_options", node)); > > @@ -2063,6 +2067,7 @@ static void init_lflow_ctx(struct engine_node *node, > > l_ctx_in->sbrec_logical_flow_by_logical_dp_group = > > sbrec_logical_flow_by_dp_group; > > l_ctx_in->sbrec_port_binding_by_name = sbrec_port_binding_by_name; > > + l_ctx_in->port_binding_table = port_binding_table; > > l_ctx_in->dhcp_options_table = dhcp_table; > > l_ctx_in->dhcpv6_options_table = dhcpv6_table; > > l_ctx_in->mac_binding_table = mac_binding_table; > > @@ -2253,6 +2258,13 @@ flow_output_sb_port_binding_handler(struct engine_node *node, > > struct ed_type_flow_output *fo = data; > > struct ovn_desired_flow_table *flow_table = &fo->flow_table; > > > > + struct lflow_ctx_in l_ctx_in; > > + struct lflow_ctx_out l_ctx_out; > > + init_lflow_ctx(node, rt_data, fo, &l_ctx_in, &l_ctx_out); > > + if (!lflow_handle_port_binding_add_del(&l_ctx_in, &l_ctx_out)) { > > + return false; > > + } > > + > > struct physical_ctx p_ctx; > > init_physical_ctx(node, rt_data, &p_ctx); > > > > @@ -2356,8 +2368,9 @@ _flow_output_resource_ref_handler(struct engine_node *node, void *data, > > break; > > > > case REF_TYPE_PORTBINDING: > > - /* This ref type is handled in the > > - * flow_output_runtime_data_handler. */ > > + /* This ref type is handled in: > > + * - flow_output_runtime_data_handler > > + * - flow_output_sb_port_binding_handler. */ > > case REF_TYPE_MC_GROUP: > > /* This ref type is handled in the > > * flow_output_sb_multicast_group_handler. */ > > diff --git a/tests/ovn.at b/tests/ovn.at > > index a21dbadac..5efd32d82 100644 > > --- a/tests/ovn.at > > +++ b/tests/ovn.at > > @@ -26749,3 +26749,51 @@ AT_CHECK([ovs-ofctl dump-flows br-int "nw_src= 10.0.0.0/24" | \ > > OVN_CLEANUP([hv1]) > > AT_CLEANUP > > ]) > > + > > +# Test when a logical port name is used in an ACL before it is created. When it > > +# is created later, the ACL should be programmed as openflow rules by > > +# ovn-controller. Although this is not likely to happen in real world use > > +# cases, it is possible that a port-binding is observed by ovn-controller AFTER > > +# an lflow that references the port is processed. So this test case is to make > > +# sure the incremental processing in ovn-controller reprocesses the lflow when > > +# the port-binding is observed. > > +OVN_FOR_EACH_NORTHD([ > > +AT_SETUP([ovn -- ACL referencing lport before creation]) > > +ovn_start > > + > > +net_add n1 > > + > > +sim_add hv1 > > +as hv1 > > +ovs-vsctl add-br br-phys > > +ovn_attach n1 br-phys 192.168.0.1 > > + > > +# Bind both lp1 and lp2 on the chasis. > > +ovs-vsctl add-port br-int lp1 -- set interface lp1 external_ids:iface-id=lp1 > > +ovs-vsctl add-port br-int lp2 -- set interface lp2 external_ids:iface-id=lp2 > > It's, probably, good to prepend "check " to all ovs-*ctl/ovn-*ctl calls. > They might catch unexpected issues in the future. Ack. Thanks, Han > > > + > > +# Create only lport lp1, but not lp2. > > +ovn-nbctl ls-add lsw0 > > +ovn-nbctl lsp-add lsw0 lp1 \ > > + -- lsp-set-addresses lp1 "f0:00:00:00:00:01 10.0.0.11" > > + > > +# Each lport is referenced by an ACL. > > +ovn-nbctl acl-add lsw0 to-lport 1002 'outport == "lp1" && ip4.src == 10.0.0.111' allow-related > > +ovn-nbctl acl-add lsw0 to-lport 1002 'outport == "lp2" && ip4.src == 10.0.0.222' allow-related > > + > > +# The first ACL should be programmed. > > +check ovn-nbctl --wait=hv sync > > +AT_CHECK([ovs-ofctl dump-flows br-int table=44 | grep 10.0.0.111], [0], [ignore]) > > + > > +# Now create the lport lp2. > > +ovn-nbctl ls-add lsw0 > > +ovn-nbctl lsp-add lsw0 lp2 \ > > + -- lsp-set-addresses lp2 "f0:00:00:00:00:02 10.0.0.22" > > + > > +check ovn-nbctl --wait=hv sync > > +# Now the second ACL should be programmed. > > +AT_CHECK([ovs-ofctl dump-flows br-int table=44 | grep 10.0.0.222], [0], [ignore]) > > + > > +OVN_CLEANUP([hv1]) > > +AT_CLEANUP > > +]) > > > > Thanks, > Dumitru > _______________________________________________ dev mailing list d...@openvswitch.org https://mail.openvswitch.org/mailman/listinfo/ovs-dev