On 18 Nov 2022, at 2:57, Peng He wrote:

> Since there are possible race conditions (between the kernel datapath and
> userspace datapath),
> I guess this patch is now needed again? But two datapath is really rare in
> the real deployment.
> So I am not sure if we should pay attention here.

I still think we should add this, as there seem to be a decent amount of times 
people intermix a kernel interface with a DPDK one. For example, the bridge 
interface, which would be up to get routing information for tunnels.

//Eelco


> Eelco Chaudron <echau...@redhat.com> 于2022年10月19日周三 18:50写道:
>
>>
>>
>> On 10 Oct 2022, at 9:12, Eelco Chaudron wrote:
>>
>>> On 8 Oct 2022, at 5:27, Peng He wrote:
>>>
>>>> Hi,Eelco
>>>>
>>>> after a second thought, I think this patch is not needed neither,
>>>> the code here is trying to find a rule which cover the packet,
>>>> it does not mean the match and action of rule equals to the ones
>>>> of the ukey.
>>>>
>>>> So the code here is just a prevention, no need to make it consistent
>>>> with ukey.
>>>>
>>>> but the comments above are really misleading, so I sent a new patch
>> fixing
>>>> it.
>>>
>>> Ack, will wait for the v5, and review.
>>
>> As I did not see a v5, I reviewed the v4, and assume this patch can be
>> ignored.
>>
>> //Eelco
>>
>>>> Peng He <xnhp0...@gmail.com> 于2022年10月3日周一 20:41写道:
>>>>
>>>>> When PMDs perform upcalls, the newly generated ukey will replace
>>>>> the old, however, the newly generated mageflow will be discard
>>>>> to reuse the old one without checking if the actions of new and
>>>>> old are equal.
>>>>>
>>>>> This code prevents in case someone runs dpctl/add-flow to add
>>>>> a dp flow with inconsistent actions with the actions of ukey,
>>>>> and causes more confusion.
>>>>>
>>>>> Signed-off-by: Peng He <hepeng.0...@bytedance.com>
>>>>> ---
>>>>>  lib/dpif-netdev.c | 17 ++++++++++++++++-
>>>>>  1 file changed, 16 insertions(+), 1 deletion(-)
>>>>>
>>>>> diff --git a/lib/dpif-netdev.c b/lib/dpif-netdev.c
>>>>> index a45b46014..b316e59ef 100644
>>>>> --- a/lib/dpif-netdev.c
>>>>> +++ b/lib/dpif-netdev.c
>>>>> @@ -8304,7 +8304,22 @@ handle_packet_upcall(struct dp_netdev_pmd_thread
>>>>> *pmd,
>>>>>           * to be locking revalidators out of making flow
>> modifications. */
>>>>>          ovs_mutex_lock(&pmd->flow_mutex);
>>>>>          netdev_flow = dp_netdev_pmd_lookup_flow(pmd, key, NULL);
>>>>> -        if (OVS_LIKELY(!netdev_flow)) {
>>>>> +        if (OVS_UNLIKELY(netdev_flow)) {
>>>>> +            struct dp_netdev_actions *old_act =
>>>>> +                dp_netdev_flow_get_actions(netdev_flow);
>>>>> +
>>>>> +            if ((add_actions->size != old_act->size) ||
>>>>> +                    memcmp(old_act->actions, add_actions->data,
>>>>> +                                             add_actions->size)) {
>>>>> +
>>>>> +               struct dp_netdev_actions *new_act =
>>>>> +                   dp_netdev_actions_create(add_actions->data,
>>>>> +                                            add_actions->size);
>>>>> +
>>>>> +               ovsrcu_set(&netdev_flow->actions, new_act);
>>>>> +               ovsrcu_postpone(dp_netdev_actions_free, old_act);
>>>>> +            }
>>>>> +        } else {
>>>>>              netdev_flow = dp_netdev_flow_add(pmd, &match, &ufid,
>>>>>                                               add_actions->data,
>>>>>                                               add_actions->size,
>>>>> orig_in_port);
>>>>> --
>>>>> 2.25.1
>>>>>
>>>>>
>>>>
>>>> --
>>>> hepeng
>>
>>
>
> -- 
> hepeng

_______________________________________________
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev

Reply via email to