On 24 Apr 2024, at 15:50, Adrian Moreno wrote:
> Add support for psample sampling via two new attributes to the > OVS_ACTION_ATTR_SAMPLE action. > > OVS_SAMPLE_ATTR_PSAMPLE_GROUP used to pass an integer psample group_id. > OVS_SAMPLE_ATTR_PSAMPLE_COOKIE used to pass a variable-length binary > cookie that will be forwared to psample. > > The maximum length of the user-defined cookie is set to 16, same as > tc_cookie, to discourage using cookies that will not be offloadable. > > In order to simplify the internal processing of the action and given the > maximum size of the cookie is relatively small, add both fields to the > internal-only struct sample_arg. > > The presence of a group_id mandates that the action shall called the > psample module to multicast the packet with such group_id and the > user-provided cookie if present. This behavior is orthonogal to > also executing the nested actions if present. > > Signed-off-by: Adrian Moreno <amore...@redhat.com> This is not a full review yet. Just some comments, as I’m looking at the user-space patch first and added similar comments. I’ll do a proper review of this series once I’m done with user-space part. //Eelco > --- > Documentation/netlink/specs/ovs_flow.yaml | 6 ++ > include/uapi/linux/openvswitch.h | 49 ++++++++++---- > net/openvswitch/actions.c | 51 +++++++++++++-- > net/openvswitch/flow_netlink.c | 80 ++++++++++++++++++----- > 4 files changed, 153 insertions(+), 33 deletions(-) > > diff --git a/Documentation/netlink/specs/ovs_flow.yaml > b/Documentation/netlink/specs/ovs_flow.yaml > index 4fdfc6b5cae9..5543c2937225 100644 > --- a/Documentation/netlink/specs/ovs_flow.yaml > +++ b/Documentation/netlink/specs/ovs_flow.yaml > @@ -825,6 +825,12 @@ attribute-sets: > name: actions > type: nest > nested-attributes: action-attrs > + - > + name: psample_group > + type: u32 > + - > + name: psample_cookie > + type: binary > - > name: userspace-attrs > enum-name: ovs-userspace-attr > diff --git a/include/uapi/linux/openvswitch.h > b/include/uapi/linux/openvswitch.h > index efc82c318fa2..e9cd6f3a952d 100644 > --- a/include/uapi/linux/openvswitch.h > +++ b/include/uapi/linux/openvswitch.h > @@ -639,6 +639,7 @@ enum ovs_flow_attr { > #define OVS_UFID_F_OMIT_MASK (1 << 1) > #define OVS_UFID_F_OMIT_ACTIONS (1 << 2) > > +#define OVS_PSAMPLE_COOKIE_MAX_SIZE 16 > /** > * enum ovs_sample_attr - Attributes for %OVS_ACTION_ATTR_SAMPLE action. > * @OVS_SAMPLE_ATTR_PROBABILITY: 32-bit fraction of packets to sample with > @@ -646,15 +647,27 @@ enum ovs_flow_attr { > * %UINT32_MAX samples all packets and intermediate values sample > intermediate > * fractions of packets. > * @OVS_SAMPLE_ATTR_ACTIONS: Set of actions to execute in sampling event. > - * Actions are passed as nested attributes. > + * Actions are passed as nested attributes. Optional if > + * OVS_SAMPLE_ATTR_PSAMPLE_GROUP is set. > + * @OVS_SAMPLE_ATTR_PSAMPLE_GROUP: A 32-bit number to be used as psample > group. > + * Optional if OVS_SAMPLE_ATTR_ACTIONS is set. > + * @OVS_SAMPLE_ATTR_PSAMPLE_COOKIE: A variable-length binary cookie that, if > + * provided, will be copied to the psample cookie. As there is a limit of to the cookie should we mention it here? > * > - * Executes the specified actions with the given probability on a per-packet > - * basis. > + * Either OVS_SAMPLE_ATTR_PSAMPLE_GROUP or OVS_SAMPLE_ATTR_ACTIONS must be > + * specified. > + * > + * Executes the specified actions and/or sends the packet to psample > + * with the given probability on a per-packet basis. > */ > enum ovs_sample_attr { > OVS_SAMPLE_ATTR_UNSPEC, > - OVS_SAMPLE_ATTR_PROBABILITY, /* u32 number */ > - OVS_SAMPLE_ATTR_ACTIONS, /* Nested OVS_ACTION_ATTR_* attributes. */ > + OVS_SAMPLE_ATTR_PROBABILITY, /* u32 number */ > + OVS_SAMPLE_ATTR_ACTIONS, /* Nested OVS_ACTION_ATTR_ Missing * after OVS_ACTION_ATTR_ > + * attributes. > + */ > + OVS_SAMPLE_ATTR_PSAMPLE_GROUP, /* u32 number */ > + OVS_SAMPLE_ATTR_PSAMPLE_COOKIE, /* binary */ As these are general sample options, I would not add the PSAMPLE reference. Other data paths could use a different implementation. So I guess OVS_SAMPLE_ATTR_GROUP_ID and OVS_SAMPLE_ATTR_COOKIE would be enough. > __OVS_SAMPLE_ATTR_MAX, > > #ifdef __KERNEL__ > @@ -665,13 +678,27 @@ enum ovs_sample_attr { > #define OVS_SAMPLE_ATTR_MAX (__OVS_SAMPLE_ATTR_MAX - 1) > > #ifdef __KERNEL__ > + > +/* Definition for flags in struct sample_arg. */ > +enum { > + /* When set, actions in sample will not change the flows. */ > + OVS_SAMPLE_ARG_FLAG_EXEC = 1 << 0, > + /* When set, the packet will be sent to psample. */ > + OVS_SAMPLE_ARG_FLAG_PSAMPLE = 1 << 1, > +}; > + > struct sample_arg { > - bool exec; /* When true, actions in sample will not > - * change flow keys. False otherwise. > - */ > - u32 probability; /* Same value as > - * 'OVS_SAMPLE_ATTR_PROBABILITY'. > - */ Not sure if you can actually do this, you are changing a structure that is part of the UAPI. This change breaks backwards compatibility. > + u16 flags; /* Flags that modify the behavior of the > + * action. See SAMPLE_ARG_FLAG_*. > + */ > + u32 probability; /* Same value as > + * 'OVS_SAMPLE_ATTR_PROBABILITY'. > + */ > + u32 group_id; /* Same value as > + * 'OVS_SAMPLE_ATTR_PSAMPLE_GROUP'. > + */ > + u8 cookie_len; /* Length of psample cookie. */ > + char cookie[OVS_PSAMPLE_COOKIE_MAX_SIZE]; /* psample cookie data. */ Would it make sense for the cookie also to be u8? > }; > #endif > > diff --git a/net/openvswitch/actions.c b/net/openvswitch/actions.c > index 6fcd7e2ca81f..eb3166986fd2 100644 > --- a/net/openvswitch/actions.c > +++ b/net/openvswitch/actions.c > @@ -24,6 +24,7 @@ > #include <net/checksum.h> > #include <net/dsfield.h> > #include <net/mpls.h> > +#include <net/psample.h> > #include <net/sctp/checksum.h> > > #include "datapath.h" > @@ -1025,6 +1026,34 @@ static int dec_ttl_exception_handler(struct datapath > *dp, struct sk_buff *skb, > return 0; > } > > +static int ovs_psample_packet(struct datapath *dp, struct sw_flow_key *key, > + const struct sample_arg *arg, > + struct sk_buff *skb) > +{ > + struct psample_group psample_group = {}; > + struct psample_metadata md = {}; > + struct vport *input_vport; > + u32 rate; > + > + psample_group.group_num = arg->group_id; > + psample_group.net = ovs_dp_get_net(dp); > + > + input_vport = ovs_vport_rcu(dp, key->phy.in_port); > + if (!input_vport) > + input_vport = ovs_vport_rcu(dp, OVSP_LOCAL); > + > + md.in_ifindex = input_vport->dev->ifindex; > + md.user_cookie = arg->cookie_len ? &arg->cookie[0] : NULL; > + md.user_cookie_len = arg->cookie_len; > + md.trunc_size = skb->len; > + > + rate = arg->probability ? U32_MAX / arg->probability : 0; > + > + psample_sample_packet(&psample_group, skb, rate, &md); Does this mean now the ovs module, now is dependent on the presence of psample? I think we should only support sampling to psample if the module exists, else we should return an error. There might be distributions not including psample by default. > + > + return 0; > +} > + > /* When 'last' is true, sample() should always consume the 'skb'. > * Otherwise, sample() should keep 'skb' intact regardless what > * actions are executed within sample(). > @@ -1033,11 +1062,12 @@ static int sample(struct datapath *dp, struct sk_buff > *skb, > struct sw_flow_key *key, const struct nlattr *attr, > bool last) > { > - struct nlattr *actions; > + const struct sample_arg *arg; > struct nlattr *sample_arg; > int rem = nla_len(attr); > - const struct sample_arg *arg; > + struct nlattr *actions; > bool clone_flow_key; > + int ret; > > /* The first action is always 'OVS_SAMPLE_ATTR_ARG'. */ > sample_arg = nla_data(attr); > @@ -1051,9 +1081,20 @@ static int sample(struct datapath *dp, struct sk_buff > *skb, > return 0; > } > > - clone_flow_key = !arg->exec; > - return clone_execute(dp, skb, key, 0, actions, rem, last, > - clone_flow_key); > + if (arg->flags & OVS_SAMPLE_ARG_FLAG_PSAMPLE) { > + ret = ovs_psample_packet(dp, key, arg, skb); > + if (ret) > + return ret; > + } > + > + if (nla_ok(actions, rem)) { > + clone_flow_key = !(arg->flags & OVS_SAMPLE_ARG_FLAG_EXEC); > + ret = clone_execute(dp, skb, key, 0, actions, rem, last, > + clone_flow_key); > + } else if (last) { > + ovs_kfree_skb_reason(skb, OVS_DROP_LAST_ACTION); > + } > + return ret; > } > > /* When 'last' is true, clone() should always consume the 'skb'. > diff --git a/net/openvswitch/flow_netlink.c b/net/openvswitch/flow_netlink.c > index f224d9bcea5e..1a348d3905fc 100644 > --- a/net/openvswitch/flow_netlink.c > +++ b/net/openvswitch/flow_netlink.c > @@ -2561,6 +2561,9 @@ static int __ovs_nla_copy_actions(struct net *net, > const struct nlattr *attr, > u32 mpls_label_count, bool log, > u32 depth); > > +static int copy_action(const struct nlattr *from, > + struct sw_flow_actions **sfa, bool log); > + > static int validate_and_copy_sample(struct net *net, const struct nlattr > *attr, > const struct sw_flow_key *key, > struct sw_flow_actions **sfa, > @@ -2569,10 +2572,10 @@ static int validate_and_copy_sample(struct net *net, > const struct nlattr *attr, > u32 depth) > { > const struct nlattr *attrs[OVS_SAMPLE_ATTR_MAX + 1]; > - const struct nlattr *probability, *actions; > + const struct nlattr *probability, *actions, *group, *cookie; > + struct sample_arg arg = {}; > const struct nlattr *a; > int rem, start, err; > - struct sample_arg arg; > > memset(attrs, 0, sizeof(attrs)); > nla_for_each_nested(a, attr, rem) { > @@ -2589,7 +2592,19 @@ static int validate_and_copy_sample(struct net *net, > const struct nlattr *attr, > return -EINVAL; > > actions = attrs[OVS_SAMPLE_ATTR_ACTIONS]; > - if (!actions || (nla_len(actions) && nla_len(actions) < NLA_HDRLEN)) > + if (actions && (!nla_len(actions) || nla_len(actions) < NLA_HDRLEN)) > + return -EINVAL; > + > + group = attrs[OVS_SAMPLE_ATTR_PSAMPLE_GROUP]; > + if (group && nla_len(group) != sizeof(u32)) > + return -EINVAL; > + > + cookie = attrs[OVS_SAMPLE_ATTR_PSAMPLE_COOKIE]; > + if (cookie && > + (!group || nla_len(cookie) > OVS_PSAMPLE_COOKIE_MAX_SIZE)) > + return -EINVAL; > + > + if (!group && !actions) > return -EINVAL; > > /* validation done, copy sample action. */ > @@ -2608,7 +2623,19 @@ static int validate_and_copy_sample(struct net *net, > const struct nlattr *attr, > * If the sample is the last action, it can always be excuted > * rather than deferred. > */ > - arg.exec = last || !actions_may_change_flow(actions); > + if (actions && (last || !actions_may_change_flow(actions))) > + arg.flags |= OVS_SAMPLE_ARG_FLAG_EXEC; > + > + if (group) { > + arg.flags |= OVS_SAMPLE_ARG_FLAG_PSAMPLE; > + arg.group_id = nla_get_u32(group); > + } > + > + if (cookie) { > + memcpy(&arg.cookie[0], nla_data(cookie), nla_len(cookie)); > + arg.cookie_len = nla_len(cookie); > + } > + > arg.probability = nla_get_u32(probability); > > err = ovs_nla_add_action(sfa, OVS_SAMPLE_ATTR_ARG, &arg, sizeof(arg), > @@ -2616,12 +2643,13 @@ static int validate_and_copy_sample(struct net *net, > const struct nlattr *attr, > if (err) > return err; > > - err = __ovs_nla_copy_actions(net, actions, key, sfa, > - eth_type, vlan_tci, mpls_label_count, log, > - depth + 1); > - > - if (err) > - return err; > + if (actions) { > + err = __ovs_nla_copy_actions(net, actions, key, sfa, > + eth_type, vlan_tci, > + mpls_label_count, log, depth + 1); > + if (err) > + return err; > + } > > add_nested_action_end(*sfa, start); > > @@ -3553,20 +3581,38 @@ static int sample_action_to_attr(const struct nlattr > *attr, > goto out; > } > > - ac_start = nla_nest_start_noflag(skb, OVS_SAMPLE_ATTR_ACTIONS); > - if (!ac_start) { > - err = -EMSGSIZE; > - goto out; > + if (arg->flags & OVS_SAMPLE_ARG_FLAG_PSAMPLE) { > + if (nla_put_u32(skb, OVS_SAMPLE_ATTR_PSAMPLE_GROUP, > + arg->group_id)) { > + err = -EMSGSIZE; > + goto out; > + } > + > + if (arg->cookie_len && > + nla_put(skb, OVS_SAMPLE_ATTR_PSAMPLE_COOKIE, > + arg->cookie_len, &arg->cookie[0])) { > + err = -EMSGSIZE; > + goto out; > + } > } > > - err = ovs_nla_put_actions(actions, rem, skb); > + if (nla_ok(actions, rem)) { > + ac_start = nla_nest_start_noflag(skb, OVS_SAMPLE_ATTR_ACTIONS); > + if (!ac_start) { > + err = -EMSGSIZE; > + goto out; > + } > + err = ovs_nla_put_actions(actions, rem, skb); > + } > > out: > if (err) { > - nla_nest_cancel(skb, ac_start); > + if (ac_start) > + nla_nest_cancel(skb, ac_start); > nla_nest_cancel(skb, start); > } else { > - nla_nest_end(skb, ac_start); > + if (ac_start) > + nla_nest_end(skb, ac_start); > nla_nest_end(skb, start); > } > > -- > 2.44.0 _______________________________________________ dev mailing list d...@openvswitch.org https://mail.openvswitch.org/mailman/listinfo/ovs-dev