Received: by 2002:ab2:7903:0:b0:1fb:b500:807b with SMTP id a3csp1159072lqj; Mon, 3 Jun 2024 11:58:28 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWC3MMVE6oP8bTj693SlYekWM56kvYEvXcIo8/BE6i108myS0WMKxyI28l4WQakHBkhP0RXXocEDCkc4Ez4vjiDerLjnUtkpP6rBOTHKg== X-Google-Smtp-Source: AGHT+IH0JCbNRefP3lxOQPi32ghnw+nH5VA4jK8JNqKgDceyAWXnA4JUyxdZ5he6OvcKkRBeloYC X-Received: by 2002:a05:6a20:841c:b0:1af:667c:38cc with SMTP id adf61e73a8af0-1b26f0f1ae9mr11512541637.5.1717441108174; Mon, 03 Jun 2024 11:58:28 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1717441108; cv=pass; d=google.com; s=arc-20160816; b=ypIwhuqrxaHsRwWzVl9lsCj5YS6YZokcvGTmPfkdzq0Yzu+7+Dq3w4VN8hs/NNgAf4 YRv4IXUsAF8Xps3I7qk5FchKH4x8lTEdI4mij9YMP9TeWu81o52nsYujz3+1E58MK+5W xTobomRWxmI9N9InJUwLkrWvqBd3VfW7l+CqD+O396OfRpSqkTeixeTtssBkOoGiNnu3 btFbVboslBA/JDeW1XIipc7GVnKTJn5sPGt7Gqd2yMRY9kHwiro6xlL2Pf77urpaHKiN Ks33Zbiv+afA52iHu2mABwv/GmIhoFC/8x0oOemcDFz4A2SM5yPMBN693XL7HFcEdLlH ppRw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=sIT6bpi+QA6lCG9sj/bdR00vB8OkBUOOPJlemYB4yWU=; fh=p0K1HihtWOX1DTQYWJbAwHwS39aNkULk9vuFi0V+sgs=; b=kJTeekjx6ls1SLl6sl0sqjUG2QG6rRoXCGtQUyl/zLY5MFCaFC3+q96LpDaj59sBk7 D6bSls1g3Uwq/t/QpqOWPdZdBHWgrNOwanv2vTV8C76phlFSWArrEBalTnbCssYQ0RxQ 5AkMldvjEIuh5dLYGtNFoYfoilZyjKdG0nZytw+bHmd0bGOJiC6hwbRWQLIvAbLCPPAc /NabT6Z+O2cuel1d36Tu5VwGFy9/GoTknOk9gd7WkPYIA1FmX2P28hMUZLC0JVcKR+11 i1jclpMmlrxaCstx8qaAcEy6Oyvja1Ol7F2FIyZbOXQIikgx2BS/qhVgkxdE4CL3zvVj giSw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=aLpnTXdJ; arc=pass (i=1 spf=pass spfdomain=redhat.com dkim=pass dkdomain=redhat.com dmarc=pass fromdomain=redhat.com); spf=pass (google.com: domain of linux-kernel+bounces-199588-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-199588-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id d9443c01a7336-1f6323ea853si69975175ad.353.2024.06.03.11.58.27 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 03 Jun 2024 11:58:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-199588-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=aLpnTXdJ; arc=pass (i=1 spf=pass spfdomain=redhat.com dkim=pass dkdomain=redhat.com dmarc=pass fromdomain=redhat.com); spf=pass (google.com: domain of linux-kernel+bounces-199588-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-199588-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 9E7A0284A4C for ; Mon, 3 Jun 2024 18:58:27 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id BC35E13B7BD; Mon, 3 Jun 2024 18:57:41 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="aLpnTXdJ" Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 448FB139D0E for ; Mon, 3 Jun 2024 18:57:39 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.133.124 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1717441060; cv=none; b=opzdfm31O9yW9pxLTtnAfDBDFIGw3ZTEEQdvlLPfwY3mf0vvkGxheiqyf+zi8AstuU+N3j4Cb7AM8fs3WVk9+BK235aMLKJAq5pGMliSHR9omKrwdTJIocpTaTab1lmDjKA+mnpb7K1R/rQKmy0ZFkTJrRQGMnGBMXC4IH18bvc= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1717441060; c=relaxed/simple; bh=mVwwYMl1OdGzNy/Wsg5IEmizpoOZ6mCPt5pefo278mI=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=oOkDrfUwcV9TZyuuWxokIW3MypIhfNj5/xio9+dSQ50kQDlvcsxNGefFDuDszFY+9NCwT5yUU+LYIAjs1Mr0EhmXQ4HGPU92Q/jb4zT86HiQhfS1qI5e0hD4aqCjbZpQFNzrqdQrbWxmbDFj9fgczeD5cpQ11G/WY/L+z3H+6SE= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=aLpnTXdJ; arc=none smtp.client-ip=170.10.133.124 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1717441058; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=sIT6bpi+QA6lCG9sj/bdR00vB8OkBUOOPJlemYB4yWU=; b=aLpnTXdJGwyEng8cQtXkX63ExNAlRDU3gfiC4YreYimdXmz8swXqt2ZracDqMLSspH40Fv KW1TMah/iJ/feE2y8vo+CeDCgspD9YOAWrSEXgEl9sjrTTiQyX04GYpO+6JMUcOugh12pZ y6U0FD74sDFzA5mpjyqNvogG7ZelLlQ= Received: from mx-prod-mc-05.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-436-Ff_xJSlDMEC6qRHJ4q03sw-1; Mon, 03 Jun 2024 14:57:37 -0400 X-MC-Unique: Ff_xJSlDMEC6qRHJ4q03sw-1 Received: from mx-prod-int-05.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-05.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.17]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-05.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 2CCA118FF92F; Mon, 3 Jun 2024 18:57:35 +0000 (UTC) Received: from antares.redhat.com (unknown [10.39.193.112]) by mx-prod-int-05.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id 361A11955F6E; Mon, 3 Jun 2024 18:57:30 +0000 (UTC) From: Adrian Moreno To: netdev@vger.kernel.org Cc: aconole@redhat.com, echaudro@redhat.com, horms@kernel.org, i.maximets@ovn.org, dev@openvswitch.org, Adrian Moreno , Pravin B Shelar , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , linux-kernel@vger.kernel.org Subject: [PATCH net-next v2 6/9] net: openvswitch: store sampling probability in cb. Date: Mon, 3 Jun 2024 20:56:40 +0200 Message-ID: <20240603185647.2310748-7-amorenoz@redhat.com> In-Reply-To: <20240603185647.2310748-1-amorenoz@redhat.com> References: <20240603185647.2310748-1-amorenoz@redhat.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.0 on 10.30.177.17 The behavior of actions might not be the exact same if they are being executed inside a nested sample action. Store the probability of the parent sample action in the skb's cb area. Use the probability in emit_sample to pass it down to psample. Signed-off-by: Adrian Moreno --- include/uapi/linux/openvswitch.h | 3 ++- net/openvswitch/actions.c | 25 ++++++++++++++++++++++--- net/openvswitch/datapath.h | 3 +++ net/openvswitch/vport.c | 1 + 4 files changed, 28 insertions(+), 4 deletions(-) diff --git a/include/uapi/linux/openvswitch.h b/include/uapi/linux/openvswitch.h index a0e9dde0584a..9d675725fa2b 100644 --- a/include/uapi/linux/openvswitch.h +++ b/include/uapi/linux/openvswitch.h @@ -649,7 +649,8 @@ enum ovs_flow_attr { * Actions are passed as nested attributes. * * Executes the specified actions with the given probability on a per-packet - * basis. + * basis. Nested actions will be able to access the probability value of the + * parent @OVS_ACTION_ATTR_SAMPLE. */ enum ovs_sample_attr { OVS_SAMPLE_ATTR_UNSPEC, diff --git a/net/openvswitch/actions.c b/net/openvswitch/actions.c index 3b4dba0ded59..33f6d93ba5e4 100644 --- a/net/openvswitch/actions.c +++ b/net/openvswitch/actions.c @@ -1048,12 +1048,15 @@ static int sample(struct datapath *dp, struct sk_buff *skb, struct nlattr *sample_arg; int rem = nla_len(attr); const struct sample_arg *arg; + u32 init_probability; bool clone_flow_key; + int err; /* The first action is always 'OVS_SAMPLE_ATTR_ARG'. */ sample_arg = nla_data(attr); arg = nla_data(sample_arg); actions = nla_next(sample_arg, &rem); + init_probability = OVS_CB(skb)->probability; if ((arg->probability != U32_MAX) && (!arg->probability || get_random_u32() > arg->probability)) { @@ -1062,9 +1065,21 @@ static int sample(struct datapath *dp, struct sk_buff *skb, return 0; } + if (init_probability) { + OVS_CB(skb)->probability = ((u64)OVS_CB(skb)->probability * + arg->probability / U32_MAX); + } else { + OVS_CB(skb)->probability = arg->probability; + } + clone_flow_key = !arg->exec; - return clone_execute(dp, skb, key, 0, actions, rem, last, - clone_flow_key); + err = clone_execute(dp, skb, key, 0, actions, rem, last, + clone_flow_key); + + if (!last) + OVS_CB(skb)->probability = init_probability; + + return err; } /* When 'last' is true, clone() should always consume the 'skb'. @@ -1313,6 +1328,7 @@ static int execute_emit_sample(struct datapath *dp, struct sk_buff *skb, struct psample_metadata md = {}; struct vport *input_vport; const struct nlattr *a; + u32 rate; int rem; for (a = nla_data(attr), rem = nla_len(attr); rem > 0; @@ -1337,8 +1353,11 @@ static int execute_emit_sample(struct datapath *dp, struct sk_buff *skb, md.in_ifindex = input_vport->dev->ifindex; md.trunc_size = skb->len - OVS_CB(skb)->cutlen; + md.rate_as_probability = 1; + + rate = OVS_CB(skb)->probability ? OVS_CB(skb)->probability : U32_MAX; - psample_sample_packet(&psample_group, skb, 0, &md); + psample_sample_packet(&psample_group, skb, rate, &md); #endif return 0; diff --git a/net/openvswitch/datapath.h b/net/openvswitch/datapath.h index 0cd29971a907..9ca6231ea647 100644 --- a/net/openvswitch/datapath.h +++ b/net/openvswitch/datapath.h @@ -115,12 +115,15 @@ struct datapath { * fragmented. * @acts_origlen: The netlink size of the flow actions applied to this skb. * @cutlen: The number of bytes from the packet end to be removed. + * @probability: The sampling probability that was applied to this skb; 0 means + * no sampling has occurred; U32_MAX means 100% probability. */ struct ovs_skb_cb { struct vport *input_vport; u16 mru; u16 acts_origlen; u32 cutlen; + u32 probability; }; #define OVS_CB(skb) ((struct ovs_skb_cb *)(skb)->cb) diff --git a/net/openvswitch/vport.c b/net/openvswitch/vport.c index 972ae01a70f7..8732f6e51ae5 100644 --- a/net/openvswitch/vport.c +++ b/net/openvswitch/vport.c @@ -500,6 +500,7 @@ int ovs_vport_receive(struct vport *vport, struct sk_buff *skb, OVS_CB(skb)->input_vport = vport; OVS_CB(skb)->mru = 0; OVS_CB(skb)->cutlen = 0; + OVS_CB(skb)->probability = 0; if (unlikely(dev_net(skb->dev) != ovs_dp_get_net(vport->dp))) { u32 mark; -- 2.45.1