[ovs-dev] [PATCH ovs V8 12/26] netdev-tc-offloads: Add flower mask to priority map
Flavio Leitner
fbl at sysclose.org
Tue May 9 18:23:12 UTC 2017
On Wed, May 03, 2017 at 06:08:03PM +0300, Roi Dayan wrote:
> From: Paul Blakey <paulb at mellanox.com>
>
> Flower classifer requires a different priority per mask,
> so we hash the mask and generate a new priority for
> each new mask used.
>
> Signed-off-by: Paul Blakey <paulb at mellanox.com>
> Reviewed-by: Roi Dayan <roid at mellanox.com>
> Reviewed-by: Simon Horman <simon.horman at netronome.com>
> ---
> lib/netdev-tc-offloads.c | 38 ++++++++++++++++++++++++++++++++++++++
> 1 file changed, 38 insertions(+)
>
> diff --git a/lib/netdev-tc-offloads.c b/lib/netdev-tc-offloads.c
> index 9faea97..7e33fff 100644
> --- a/lib/netdev-tc-offloads.c
> +++ b/lib/netdev-tc-offloads.c
> @@ -209,6 +209,44 @@ find_ufid(int prio, int handle, struct netdev *netdev, ovs_u128 *ufid)
> return (data != NULL);
> }
>
> +struct prio_map_data {
> + struct hmap_node node;
> + struct tc_flower_key mask;
> + ovs_be16 protocol;
> + uint16_t prio;
> +};
> +
> +static uint16_t
> +get_prio_for_tc_flower(struct tc_flower *flower)
> +{
> + static struct hmap prios = HMAP_INITIALIZER(&prios);
> + static struct ovs_mutex prios_lock = OVS_MUTEX_INITIALIZER;
> + static int last_prio = 0;
> + size_t key_len = sizeof(struct tc_flower_key);
> + size_t hash = hash_bytes(&flower->mask, key_len,
> + (OVS_FORCE uint32_t) flower->key.eth_type);
> + struct prio_map_data *data;
> + struct prio_map_data *new_data;
> +
> + ovs_mutex_lock(&prios_lock);
> + HMAP_FOR_EACH_WITH_HASH(data, node, hash, &prios) {
> + if (!memcmp(&flower->mask, &data->mask, key_len)
> + && data->protocol == flower->key.eth_type) {
> + ovs_mutex_unlock(&prios_lock);
> + return data->prio;
> + }
> + }
> +
> + new_data = xzalloc(sizeof *new_data);
> + memcpy(&new_data->mask, &flower->mask, key_len);
> + new_data->prio = ++last_prio;
Well, not sure if it is realistic to have more than 65k different
masks which is the tc limit, but here it silently overflows. I
suspect that tc-flower will fail to insert the flow, but I haven't
looked further. It may be harmless, but wanna to point out anyways.
Flavio
> + new_data->protocol = flower->key.eth_type;
> + hmap_insert(&prios, &new_data->node, hash);
> + ovs_mutex_unlock(&prios_lock);
> +
> + return new_data->prio;
> +}
> +
> int
> netdev_tc_flow_flush(struct netdev *netdev)
> {
> --
> 2.7.4
>
> _______________________________________________
> dev mailing list
> dev at openvswitch.org
> https://mail.openvswitch.org/mailman/listinfo/ovs-dev
--
Flavio
More information about the dev
mailing list