From: Ben Pfaff Date: Fri, 10 Oct 2008 17:13:12 +0000 (-0700) Subject: rconn: Be pickier about what constitutes a successful connection. X-Git-Url: https://pintos-os.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=e10dfcf357301f359acea912f3efd652c8208b3e;p=openvswitch rconn: Be pickier about what constitutes a successful connection. When secchan is configured to "fail open" after failing to connect to a controller for a period of time, it needs a heuristic for what constitutes a successful connection. Until now, that heuristic was simply that when it received an OpenFlow message from the controller (any OpenFlow message), it considered the connection successful. However, this is no longer good enough, because NOX performs admission control on connections after sending a number of OpenFlow messages, in particular after doing OpenFlow version negotiation and requesting the switch features (and receiving the reply). Thus, this commit adjusts the heuristic by only considering certain OpenFlow messages to demonstrate that admission control checks have passed and thus that the connection should be considered successful. As a fallback, any connection that persists for 30 seconds or longer is also considered successful. An alternate and complementary approach (that this commit does not implement) would be to use an OpenFlow error message to indicate why the connection is closing. Fixes bug #239. --- diff --git a/include/rconn.h b/include/rconn.h index 53054c14..1ce73e9c 100644 --- a/include/rconn.h +++ b/include/rconn.h @@ -78,7 +78,7 @@ void rconn_add_monitor(struct rconn *, struct vconn *); const char *rconn_get_name(const struct rconn *); bool rconn_is_alive(const struct rconn *); bool rconn_is_connected(const struct rconn *); -int rconn_disconnected_duration(const struct rconn *); +int rconn_failure_duration(const struct rconn *); bool rconn_is_connectivity_questionable(struct rconn *); uint32_t rconn_get_ip(const struct rconn *); diff --git a/lib/rconn.c b/lib/rconn.c index e5f377b9..7db14e21 100644 --- a/lib/rconn.c +++ b/lib/rconn.c @@ -92,6 +92,17 @@ struct rconn { time_t last_connected; unsigned int packets_sent; + /* In S_ACTIVE and S_IDLE, probably_admitted reports whether we believe + * that the peer has made a (positive) admission control decision on our + * connection. If we have not yet been (probably) admitted, then the + * connection does not reset the timer used for deciding whether the switch + * should go into fail-open mode. + * + * last_admitted reports the last time we believe such a positive admission + * control decision was made. */ + bool probably_admitted; + time_t last_admitted; + /* These values are simply for statistics reporting, not used directly by * anything internal to the rconn (or the secchan for that matter). */ unsigned int packets_received; @@ -131,6 +142,8 @@ static void disconnect(struct rconn *, int error); static void flush_queue(struct rconn *); static void question_connectivity(struct rconn *); static void copy_to_monitor(struct rconn *, const struct ofpbuf *); +static bool is_connected_state(enum state); +static bool is_admitted_msg(const struct ofpbuf *); /* Creates a new rconn, connects it (reliably) to 'name', and returns it. */ struct rconn * @@ -184,6 +197,9 @@ rconn_create(int probe_interval, int max_backoff) rc->packets_sent = 0; + rc->probably_admitted = false; + rc->last_admitted = time_now(); + rc->packets_received = 0; rc->n_attempted_connections = 0; rc->n_successful_connections = 0; @@ -436,6 +452,11 @@ rconn_recv(struct rconn *rc) int error = vconn_recv(rc->vconn, &buffer); if (!error) { copy_to_monitor(rc, buffer); + if (is_admitted_msg(buffer) + || time_now() - rc->last_connected >= 30) { + rc->probably_admitted = true; + rc->last_admitted = time_now(); + } rc->last_received = time_now(); rc->packets_received++; if (rc->state == S_IDLE) { @@ -558,15 +579,21 @@ rconn_is_alive(const struct rconn *rconn) bool rconn_is_connected(const struct rconn *rconn) { - return rconn->state & (S_ACTIVE | S_IDLE); + return is_connected_state(rconn->state); } -/* Returns 0 if 'rconn' is connected, otherwise the number of seconds that it - * has been disconnected. */ +/* Returns 0 if 'rconn' is connected and the connection is believed to have + * been accepted by the controller. Otherwise, if 'rconn' is in a "failure + * mode" (that is, it is not connected or if it has recently connected and the + * controller is not yet believed to have made an admission control decision + * for this switch), returns the number of seconds that it has been in failure + * mode. */ int -rconn_disconnected_duration(const struct rconn *rconn) +rconn_failure_duration(const struct rconn *rconn) { - return rconn_is_connected(rconn) ? 0 : time_now() - rconn->last_received; + return (rconn_is_connected(rconn) && rconn->probably_admitted + ? 0 + : time_now() - rconn->last_admitted); } /* Returns the IP address of the peer, or 0 if the peer is not connected over @@ -773,6 +800,9 @@ timed_out(const struct rconn *rc) static void state_transition(struct rconn *rc, enum state state) { + if (is_connected_state(state) && !is_connected_state(rc->state)) { + rc->probably_admitted = false; + } if (rconn_is_connected(rc)) { rc->total_time_connected += elapsed_in_this_state(rc); } @@ -818,3 +848,27 @@ copy_to_monitor(struct rconn *rc, const struct ofpbuf *b) } ofpbuf_delete(clone); } + +static bool +is_connected_state(enum state state) +{ + return (state & (S_ACTIVE | S_IDLE)) != 0; +} + +static bool +is_admitted_msg(const struct ofpbuf *b) +{ + struct ofp_header *oh = b->data; + uint8_t type = oh->type; + return !(type < 32 + && (1u << type) & ((1u << OFPT_HELLO) | + (1u << OFPT_ERROR) | + (1u << OFPT_ECHO_REQUEST) | + (1u << OFPT_ECHO_REPLY) | + (1u << OFPT_VENDOR) | + (1u << OFPT_FEATURES_REQUEST) | + (1u << OFPT_FEATURES_REPLY) | + (1u << OFPT_GET_CONFIG_REQUEST) | + (1u << OFPT_GET_CONFIG_REPLY) | + (1u << OFPT_SET_CONFIG))); +} diff --git a/secchan/secchan.c b/secchan/secchan.c index a937d097..2fcd3f04 100644 --- a/secchan/secchan.c +++ b/secchan/secchan.c @@ -1579,7 +1579,7 @@ fail_open_periodic_cb(void *fail_open_) if (time_now() < fail_open->boot_deadline) { return; } - disconn_secs = rconn_disconnected_duration(fail_open->remote_rconn); + disconn_secs = rconn_failure_duration(fail_open->remote_rconn); open = disconn_secs >= fail_open->s->probe_interval * 3; if (open != (fail_open->lswitch != NULL)) { if (!open) { @@ -1620,7 +1620,7 @@ fail_open_status_cb(struct status_reply *sr, void *fail_open_) struct fail_open_data *fail_open = fail_open_; const struct settings *s = fail_open->s; int trigger_duration = s->probe_interval * 3; - int cur_duration = rconn_disconnected_duration(fail_open->remote_rconn); + int cur_duration = rconn_failure_duration(fail_open->remote_rconn); status_reply_put(sr, "trigger-duration=%d", trigger_duration); status_reply_put(sr, "current-duration=%d", cur_duration);