On 7/20/23 16:55, Aaron Conole wrote: > Ilya Maximets <i.maxim...@ovn.org> writes: > >> OVS configuration is based on port names and OpenFlow port numbers. >> Names are stored in the database and translated later to OF ports. >> On the datapath level, each port has a name and a datapath port number. >> Port name in the database has to match datapath port name, unless it's >> a tunnel port. >> >> If a datapath port is renamed with 'ip link set DEV name NAME', >> ovs-vswitchd will wake up, destroy all the OpenFlow-related structures >> and clean other things up. This is because the port no longer >> represents the port from a database due to a name difference. >> >> However, ovs-vswitch will not actually remove the port from the >> datapath, because it thinks that this port is no longer there. This >> is happening because lookup is performed by name and the name have >> changed. As a result we have a port in a datapath that is not related >> to any port known to ovs-vswitchd and ovs-vswitchd can't remove it. >> This port also occupies a datapath port number and prevents the port >> to be added back with a new name. >> >> Fix that by performing lookup by a datapath port number during the port >> destruction. The name was used only to avoid spurious warnings in a >> normal case where the port was successfully deleted by other parts of >> OVS. Adding an extra flag to avoid these warnings instead. >> >> Fixes: 02f8d6460afd ("ofproto-dpif: Query port existence by name to prevent >> warnings.") >> Reported-at: https://github.com/openvswitch/ovs-issues/issues/284 >> Signed-off-by: Ilya Maximets <i.maxim...@ovn.org> >> --- >> lib/dpctl.c | 2 +- >> lib/dpif.c | 13 +++++---- >> lib/dpif.h | 2 +- >> ofproto/ofproto-dpif.c | 14 ++++++---- >> tests/system-interface.at | 57 +++++++++++++++++++++++++++++++++++++++ >> 5 files changed, 76 insertions(+), 12 deletions(-) >> >> diff --git a/lib/dpctl.c b/lib/dpctl.c >> index 4394653ab..79b82a176 100644 >> --- a/lib/dpctl.c >> +++ b/lib/dpctl.c >> @@ -673,7 +673,7 @@ show_dpif(struct dpif *dpif, struct dpctl_params >> *dpctl_p) >> } >> >> for (int i = 0; i < n_port_nos; i++) { >> - if (dpif_port_query_by_number(dpif, port_nos[i], &dpif_port)) { >> + if (dpif_port_query_by_number(dpif, port_nos[i], &dpif_port, true)) >> { >> continue; >> } >> >> diff --git a/lib/dpif.c b/lib/dpif.c >> index b1cbf39c4..29041ab91 100644 >> --- a/lib/dpif.c >> +++ b/lib/dpif.c >> @@ -705,13 +705,14 @@ dpif_port_set_config(struct dpif *dpif, odp_port_t >> port_no, >> * initializes '*port' appropriately; on failure, returns a positive errno >> * value. >> * >> - * Retuns ENODEV if the port doesn't exist. >> + * Retuns ENODEV if the port doesn't exist. Will not log a warning in this >> + * case unless 'warn_if_not_found' is true. >> * >> * The caller owns the data in 'port' and must free it with >> * dpif_port_destroy() when it is no longer needed. */ >> int >> dpif_port_query_by_number(const struct dpif *dpif, odp_port_t port_no, >> - struct dpif_port *port) >> + struct dpif_port *port, bool warn_if_not_found) >> { >> int error = dpif->dpif_class->port_query_by_number(dpif, port_no, port); >> if (!error) { >> @@ -719,8 +720,10 @@ dpif_port_query_by_number(const struct dpif *dpif, >> odp_port_t port_no, >> dpif_name(dpif), port_no, port->name); >> } else { >> memset(port, 0, sizeof *port); >> - VLOG_WARN_RL(&error_rl, "%s: failed to query port %"PRIu32": %s", >> - dpif_name(dpif), port_no, ovs_strerror(error)); >> + VLOG_RL(&error_rl, >> + (error == ENODEV && !warn_if_not_found) ? VLL_DBG : >> VLL_WARN, >> + "%s: failed to query port %"PRIu32": %s", >> + dpif_name(dpif), port_no, ovs_strerror(error)); > > Do we want to log at all in the case that we didn't set > warn_if_not_found?
It's slightly useful for debug purposes. E.g. it was useful to see that the function was executed while developing this fix. > Should we go on the dpmsg_rl instead of error_rl in > that case? I guess, I just mimicked what dpif_port_query_by_name() is doing. It's currently using error_rl for both cases as well. I suppose, the '/* Not really much point in logging many dpif errors. */' kind of still applies. But we can change to use different limits for different log levels. What do you think? > >> } >> return error; >> } >> @@ -788,7 +791,7 @@ dpif_port_get_name(struct dpif *dpif, odp_port_t port_no, >> >> ovs_assert(name_size > 0); >> >> - error = dpif_port_query_by_number(dpif, port_no, &port); >> + error = dpif_port_query_by_number(dpif, port_no, &port, true); >> if (!error) { >> ovs_strlcpy(name, port.name, name_size); >> dpif_port_destroy(&port); >> diff --git a/lib/dpif.h b/lib/dpif.h >> index 9e9d0aa1b..0f2dc2ef3 100644 >> --- a/lib/dpif.h >> +++ b/lib/dpif.h >> @@ -463,7 +463,7 @@ void dpif_port_clone(struct dpif_port *, const struct >> dpif_port *); >> void dpif_port_destroy(struct dpif_port *); >> bool dpif_port_exists(const struct dpif *dpif, const char *devname); >> int dpif_port_query_by_number(const struct dpif *, odp_port_t port_no, >> - struct dpif_port *); >> + struct dpif_port *, bool warn_if_not_found); >> int dpif_port_query_by_name(const struct dpif *, const char *devname, >> struct dpif_port *); >> int dpif_port_get_name(struct dpif *, odp_port_t port_no, >> diff --git a/ofproto/ofproto-dpif.c b/ofproto/ofproto-dpif.c >> index fad7342b0..e22ca757a 100644 >> --- a/ofproto/ofproto-dpif.c >> +++ b/ofproto/ofproto-dpif.c >> @@ -2161,8 +2161,7 @@ port_destruct(struct ofport *port_, bool del) >> struct ofproto_dpif *ofproto = ofproto_dpif_cast(port->up.ofproto); >> const char *devname = netdev_get_name(port->up.netdev); >> const char *netdev_type = netdev_get_type(port->up.netdev); >> - char namebuf[NETDEV_VPORT_NAME_BUFSIZE]; >> - const char *dp_port_name; >> + struct dpif_port dpif_port; >> >> ofproto->backer->need_revalidate = REV_RECONFIGURE; >> xlate_txn_start(); >> @@ -2176,9 +2175,13 @@ port_destruct(struct ofport *port_, bool del) >> del = dpif_cleanup_required(ofproto->backer->dpif); >> } >> >> - dp_port_name = netdev_vport_get_dpif_port(port->up.netdev, namebuf, >> - sizeof namebuf); >> - if (del && dpif_port_exists(ofproto->backer->dpif, dp_port_name)) { >> + /* Don't try to delete ports that are not part of the datapath. */ >> + if (del && port->odp_port == ODPP_NONE) { >> + del = false; >> + } >> + >> + if (del && !dpif_port_query_by_number(ofproto->backer->dpif, >> + port->odp_port, &dpif_port, >> false)) { >> /* The underlying device is still there, so delete it. This >> * happens when the ofproto is being destroyed, since the caller >> * assumes that removal of attached ports will happen as part of >> @@ -2186,6 +2189,7 @@ port_destruct(struct ofport *port_, bool del) >> if (!port->is_tunnel) { >> dpif_port_del(ofproto->backer->dpif, port->odp_port, false); >> } >> + dpif_port_destroy(&dpif_port); >> } else if (del) { >> /* The underlying device is already deleted (e.g. tunctl -d). >> * Calling dpif_port_remove to do local cleanup for the netdev */ >> diff --git a/tests/system-interface.at b/tests/system-interface.at >> index 148f011c7..d4ee5c46b 100644 >> --- a/tests/system-interface.at >> +++ b/tests/system-interface.at >> @@ -123,6 +123,63 @@ AT_CHECK([ip link show | grep " genev_sys_[[0-9]]*: .* >> ovs-system " | diff -u - >> OVS_TRAFFIC_VSWITCHD_STOP >> AT_CLEANUP >> >> +AT_SETUP([interface - datapath port rename]) >> +OVS_TRAFFIC_VSWITCHD_START() >> + >> +dnl Not relevant for userspace datapath. >> +AT_SKIP_IF([! ovs-appctl dpctl/show | grep -q ovs-system]) >> + >> +AT_CHECK([ip link add ovs-veth0 type veth peer name ovs-veth1]) >> +dnl We will rename ovs-veth0, so removing the peer on exit. >> +on_exit 'ip link del ovs-veth1' >> + >> +AT_CHECK([ovs-vsctl add-port br0 ovs-veth0]) >> + >> +OVS_WAIT_UNTIL([ip link show | grep -q "ovs-veth0.* ovs-system "]) >> + >> +AT_CHECK([ovs-appctl dpctl/show | grep port], [0], [dnl >> + port 0: ovs-system (internal) >> + port 1: br0 (internal) >> + port 2: ovs-veth0 >> +]) >> + >> +dnl Rename the interface while attached to OVS. >> +AT_CHECK([ip l set ovs-veth0 name ovs-new-port]) >> + >> +dnl Wait for the port to be detached from the OVS datapath. >> +OVS_WAIT_UNTIL([ip link show | grep "ovs-new-port" | grep -v "ovs-system"]) >> + >> +dnl Check that database indicates the error. >> +AT_CHECK([ovs-vsctl get interface ovs-veth0 error], [0], [dnl >> +"could not open network device ovs-veth0 (No such device)" >> +]) >> + >> +dnl Check that the port is no longer in the datapath. >> +AT_CHECK([ovs-appctl dpctl/show | grep port], [0], [dnl >> + port 0: ovs-system (internal) >> + port 1: br0 (internal) >> +]) >> + >> +dnl Rename the interface back and check that it is in use again. >> +AT_CHECK([ip l set ovs-new-port name ovs-veth0]) >> + >> +OVS_WAIT_UNTIL([ip link show | grep -q "ovs-veth0.* ovs-system "]) >> + >> +AT_CHECK([ovs-vsctl get interface ovs-veth0 error], [0], [dnl >> +[[]] >> +]) >> + >> +AT_CHECK([ovs-appctl dpctl/show | grep port], [0], [dnl >> + port 0: ovs-system (internal) >> + port 1: br0 (internal) >> + port 2: ovs-veth0 >> +]) >> + >> +OVS_TRAFFIC_VSWITCHD_STOP([" >> + /could not open network device ovs-veth0 (No such device)/d >> +"]) >> +AT_CLEANUP >> + >> AT_SETUP([interface - current speed]) >> AT_SKIP_IF([test $HAVE_ETHTOOL = "no"]) >> OVS_TRAFFIC_VSWITCHD_START() > _______________________________________________ dev mailing list d...@openvswitch.org https://mail.openvswitch.org/mailman/listinfo/ovs-dev