From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-wr0-f195.google.com (mail-wr0-f195.google.com [209.85.128.195]) by dpdk.org (Postfix) with ESMTP id 7F3DB1B2A7 for ; Wed, 14 Feb 2018 14:13:30 +0100 (CET) Received: by mail-wr0-f195.google.com with SMTP id k32so15609706wrk.4 for ; Wed, 14 Feb 2018 05:13:30 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=6wind-com.20150623.gappssmtp.com; s=20150623; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding:content-language; bh=nVQuEEOZJ6ARbnQoLzGBKtMsR7nTNsGMP1A3C5GPQDU=; b=WsF4O/MHuz6lrbh0VRxCTPtrCjzeXIHfbz+HwZdNbTgQwhN6l4VrcX/60ZuoC/9yQw posLdFbJsEzBSAudkHRjY48R8KrTpDq2My8f9C6p+E78tfrYpUu6dFStAHIC0dKgX4Ns QkFznRkmKzfSy6VVeckCl6Gy/A8aE/aiayjY08+wIR+zu3Y6vlFQ7SbjEBgvvjIyztPw LICMUw9Ow/tJgT6g5JlWp7sfKh0pAfvgeF2jmjqH1QTj6nzWXrQGy3RoKtwaY+MJlEZD wQA4P0v8Y1mUHX+CfDze4hF/QhE4euwb7SFnf8ZzWM4/6pNJXE4VwXKj6jMIhy43sqyi qg7w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=nVQuEEOZJ6ARbnQoLzGBKtMsR7nTNsGMP1A3C5GPQDU=; b=qyIHsXOLaPZTfCxIXiyhKVCLxANyCbFxfXLqhXMA54O/nIFgo5DiV0TxlUTn2b9Zrg 9RSIBWEAhqbOYiCt2aF/jLxWggMl1qvBoRTtZ/t3ChiQ0vL9szkrnCFMg0vKGUioZrPH IVC3cu063+ny6RHgi2aIsOOK9tdufK2ZOR/CMbdtxaPQ4QD4cRn8IEXYdlb5ZqYLqd4L D72oL5unWSDsD4ycMC1OzLQUvdvxmYz7CVFxmpgEbyErpzU8kUf9zwvpqA0cKRTcUOp3 SowmMiu2LgY4nTbPOg9w9u9RolmEGQcxcoDF/WFTBdJr/uZhCRrDKwREkbcT9Gd3I7ze j0LA== X-Gm-Message-State: APf1xPBR6jwDQFqDcjj3Vxxmq6f9XhqbZfuB3eZk/scTggeZRpoY7IIn EK8BkNEUJqlAcMveafluQc5+Sg== X-Google-Smtp-Source: AH8x224SwSM3NoFtz/vDszQreFXkV4XUgmUjR1XHPmkmuVBdD81unoHh5nfqv4KzGc+Xu6wLrdL7SQ== X-Received: by 10.223.150.65 with SMTP id c1mr4600176wra.167.1518614010102; Wed, 14 Feb 2018 05:13:30 -0800 (PST) Received: from ?IPv6:2a01:e35:2e04:96e0:c150:28ea:209e:273a? ([2a01:e35:2e04:96e0:c150:28ea:209e:273a]) by smtp.gmail.com with ESMTPSA id t5sm14316794wra.47.2018.02.14.05.13.28 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 14 Feb 2018 05:13:29 -0800 (PST) To: Ophir Munk , dev@dpdk.org Cc: Thomas Monjalon , Olga Shern , stable@dpdk.org References: <1518546947-20932-1-git-send-email-ophirmu@mellanox.com> <1518607939-29121-1-git-send-email-ophirmu@mellanox.com> From: Pascal Mazon Message-ID: Date: Wed, 14 Feb 2018 14:13:28 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <1518607939-29121-1-git-send-email-ophirmu@mellanox.com> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-US Subject: Re: [dpdk-dev] [PATCH v3] net/tap: fix promiscuous rules double insertions X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 14 Feb 2018 13:13:30 -0000 Good job. Looks ok to me. Acked-by: Pascal Mazon On 14/02/2018 12:32, Ophir Munk wrote: > Running testpmd command "port stop all" followed by command "port start > all" may result in a TAP error: > PMD: Kernel refused TC filter rule creation (17): File exists > > Root cause analysis: during the execution of "port start all" command > testpmd calls rte_eth_promiscuous_enable() while during the execution > of "port stop all" command testpmd does not call > rte_eth_promiscuous_disable(). > As a result the TAP PMD is trying to add tc (traffic control command) > promiscuous rules to the remote netvsc device consecutively. From the > kernel point of view it is seen as an attempt to add the same rule more > than once. In recent kernels (e.g. version 4.13) this attempt is rejected > with a "File exists" error. In less recent kernels (e.g. version 4.4) the > same rule may have been successfully accepted twice, which is undesirable. > > In the corrupted code every tc promiscuous rule included a different > handle number parameter. If instead an identical handle number is > used for all tc promiscuous rules - all kernels will reject the second > identical rule with a "File exists" error, which is easy to identify and > to silently ignore. > > Fixes: 2bc06869cd94 ("net/tap: add remote netdevice traffic capture") > Cc: stable@dpdk.org > > Signed-off-by: Ophir Munk > --- > v1: initial version > v2: add detailed commit message > v3: textual fixes to commit message and code comments > > drivers/net/tap/tap_flow.c | 11 +++++++++++ > 1 file changed, 11 insertions(+) > > diff --git a/drivers/net/tap/tap_flow.c b/drivers/net/tap/tap_flow.c > index 65657f0..551b2d8 100644 > --- a/drivers/net/tap/tap_flow.c > +++ b/drivers/net/tap/tap_flow.c > @@ -123,6 +123,7 @@ enum key_status_e { > }; > > #define ISOLATE_HANDLE 1 > +#define REMOTE_PROMISCUOUS_HANDLE 2 > > struct rte_flow { > LIST_ENTRY(rte_flow) next; /* Pointer to the next rte_flow structure */ > @@ -1692,9 +1693,15 @@ int tap_flow_implicit_create(struct pmd_internals *pmd, > * The ISOLATE rule is always present and must have a static handle, as > * the action is changed whether the feature is enabled (DROP) or > * disabled (PASSTHRU). > + * There is just one REMOTE_PROMISCUOUS rule in all cases. It should > + * have a static handle such that adding it twice will fail with EEXIST > + * with any kernel version. Remark: old kernels may falsely accept the > + * same REMOTE_PROMISCUOUS rules if they had different handles. > */ > if (idx == TAP_ISOLATE) > remote_flow->msg.t.tcm_handle = ISOLATE_HANDLE; > + else if (idx == TAP_REMOTE_PROMISC) > + remote_flow->msg.t.tcm_handle = REMOTE_PROMISCUOUS_HANDLE; > else > tap_flow_set_handle(remote_flow); > if (priv_flow_process(pmd, attr, items, actions, NULL, > @@ -1709,12 +1716,16 @@ int tap_flow_implicit_create(struct pmd_internals *pmd, > } > err = tap_nl_recv_ack(pmd->nlsk_fd); > if (err < 0) { > + /* Silently ignore re-entering remote promiscuous rule */ > + if (errno == EEXIST && idx == TAP_REMOTE_PROMISC) > + goto success; > RTE_LOG(ERR, PMD, > "Kernel refused TC filter rule creation (%d): %s\n", > errno, strerror(errno)); > goto fail; > } > LIST_INSERT_HEAD(&pmd->implicit_flows, remote_flow, next); > +success: > return 0; > fail: > if (remote_flow)