Ilya Maximets writes:
> On 5/16/24 19:03, Adrian Moreno wrote:
>>
>>
>> On 4/24/24 9:53 PM, Adrian Moreno wrote:
>>> This is the userspace counterpart of the work being done in the kernel
>>> [1]. Sending it as RFC to get some early feedback on the overall
>>> solution.
>>>
>>> ** Problem
Eelco Chaudron writes:
> On 16 May 2024, at 14:46, Ilya Maximets wrote:
>
>> On 5/14/24 15:15, Eelco Chaudron wrote:
>>> The flow_reval_monitor.py script incorrectly reported the reasons for
>>> FDR_PURGE and FDR_TOO_EXPENSIVE, as their descriptions were swapped.
>>> This patch rectifies the
dd vxlan tunneling support.")
Signed-off-by: Aaron Conole
---
v1->v2: Include a comment as requested by Eelco, and add some details about
bridge port packets.
net/openvswitch/actions.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/net/openvswitch/actions.c b/net/openv
f to bridge in delete reasons.
> - Added comment pointing back to delete reasons in .c.
> v2: - Converted the list of strings to dictionary.
> - Added comment to code to keep code and script in sync.
> - Unified flow_delete reason comments and script output.
> ---
Acked-by:
n conntrack
> tuple to sw_flow_key.")
> Reported-by: Antonin Bas
> Closes: https://github.com/openvswitch/ovs-issues/issues/327
> Signed-off-by: Ilya Maximets
> ---
Acked-by: Aaron Conole
> Note: I'm working on a selftest for this issue, but it requires some
> ground w
Adrian Moreno writes:
> On 5/3/24 11:43 AM, Eelco Chaudron wrote:
>> On 24 Apr 2024, at 15:50, Adrian Moreno wrote:
>>
>>> Add support for psample sampling via two new attributes to the
>>> OVS_ACTION_ATTR_SAMPLE action.
>>>
>>> OVS_SAMPLE_ATTR_PSAMPLE_GROUP used to pass an integer psample
Jakub Kicinski writes:
> On Thu, 25 Apr 2024 19:57:19 +0100 Simon Horman wrote:
>> openvswitch.sh does not appear to have any dependencies on Open vSwitch
>> user-space. My understanding is that, rather, it makes use of
>> tools/testing/selftests/net/openvswitch/ovs-dpctl.py to talk to the
Simon Horman writes:
> On Wed, Apr 24, 2024 at 02:14:09PM -0400, Aaron Conole wrote:
>> Simon Horman writes:
>>
>> > Hi Aaron, Jakub, all,
>> >
>> > I have recently been exercising the Open vSwitch kernel selftests,
>> > using vng, somet
Jakub Kicinski writes:
> On Wed, 24 Apr 2024 17:44:05 +0100 Simon Horman wrote:
>> I have recently been exercising the Open vSwitch kernel selftests,
>> using vng,
>
> Speaking of ovs tests, we currently don't run them in CI (and suffer
> related skips in pmtu.sh) because Amazon Linux doesn't
Benjamin Poirier writes:
> On 2024-04-24 18:37 +0100, Simon Horman wrote:
>> On Wed, Apr 24, 2024 at 05:44:05PM +0100, Simon Horman wrote:
>> > Hi Aaron, Jakub, all,
>> >
>> > I have recently been exercising the Open vSwitch kernel selftests,
>> > using vng, something like this:
>> >
>> >
Simon Horman writes:
> Hi Aaron, Jakub, all,
>
> I have recently been exercising the Open vSwitch kernel selftests,
> using vng, something like this:
>
> TESTDIR="tools/testing/selftests/net/openvswitch"
>
> vng -v --run . --user root --cpus 2 \
> --overlay-rwdir
Jun Gu writes:
> dev_get_by_name will provide a reference on the netdev. So ensure that
> the reference of netdev is released after completed.
>
> Fixes: 2540088b836f ("net: openvswitch: Check vport netdev name")
> Signed-off-by: Jun Gu
> ---
Thanks
t;
> To prevent this, it should be changed to hlist_for_each_entry_safe.
>
> Fixes: 11efd5cb04a1 ("openvswitch: Support conntrack zone limit")
> Signed-off-by: Hyunwoo Kim
> ---
Reviewed-by: Aaron Conole
___
dev mailing list
d...@open
Chris Riches writes:
> On 15/04/2024 14:39, Jon Kohler wrote:
>>> On Apr 11, 2024, at 9:43 AM, Chris Riches wrote:
>>>
>>> On 11/04/2024 14:24, Ilya Maximets wrote:
On 4/11/24 10:59, Chris Riches wrote:
> From what we know so far, the DB was full of stale connection-tracking
>
;
> Signed-off-by: Adrian Moreno
> ---
Thanks, Adrian.
Reviewed-by: Aaron Conole
___
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev
Daniel Ding writes:
> 2024年3月30日 上午2:43,Aaron Conole 写道:
>
> Daniel Ding writes:
>
> When I try filter geneve protocol with a vlan, the warning message
> occurs that tell me the kernel cann't support this combination.
>
> ^ can't
&g
k.rst | 2 +-
> NEWS | 3 ++
> README.rst | 2 +-
> 12 files changed, 50 insertions(+), 47 deletions(-)
Acked-by: Aaron Conole
> diff --git a/Documentation/internals/committer-respons
ed-By: Luca Czesla
> Signed-off-by: Luca Czesla
> Co-Authored-By: Max Lamprecht
> Signed-off-by: Max Lamprecht
> Signed-off-by: Felix Huettner
> ---
Acked-by: Aaron Conole
Thanks!
___
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev
Felix Huettner via dev writes:
> Extract checking for a given kernel version to a separate function.
> It will be used also in the next patch.
>
> Acked-by: Mike Pattrick
> Acked-by: Eelco Chaudron
> Signed-off-by: Felix Huettner
> ---
Acked-by: Aaron Conole
&g
mit...@outlook.com writes:
> From: miter
>
> Ofproto_class_find__() may return NULL, and dereference it to cause
> segfault.
>
> Tested-by: Zhang YuHuang
> Signed-off-by: Lin Huang
> ---
I guess that type_run and type_wait aren't flagged this way because the
only users walk the ofproto types
Daniel Ding writes:
> When I try filter geneve protocol with a vlan, the warning message
> occurs that tell me the kernel cann't support this combination.
^ can't
>
> $ ovs-tcpdump -i eth2 -nne vlan 10 and geneve
> Warning: Kernel filter failed: Invalid argument
Cheng Li writes:
> Force expire a connection and then create new connection of the same
> tuple(cmap hash). This makes ct->conns cmap operation expensive(
> within ct->ct_lock).
>
> This patch cover the scenario by doing the clean immediately instead
> of setting expire. Also this patch fix
Eelco Chaudron writes:
> On 25 Mar 2024, at 13:37, Ilya Maximets wrote:
>
>> On 3/25/24 13:22, Aaron Conole wrote:
>>> Eelco Chaudron writes:
>>>
>>>> On 22 Mar 2024, at 20:06, Aaron Conole wrote:
>>>>
>>>>> O
Aaron Conole writes:
> Ilya Maximets writes:
>
>> On 3/22/24 14:40, Aaron Conole wrote:
>>> Open vSwitch supports the ability to invoke a controller action by way
>>> of a sample action with a specified meter. In the normal case, this
>>> sample action
Eelco Chaudron writes:
> On 22 Mar 2024, at 20:06, Aaron Conole wrote:
>
>> Open vSwitch is originally intended to switch at layer 2, only dealing with
>> Ethernet frames. With the introduction of l3 tunnels support, it crossed
>> into the realm of needing to care
Ilya Maximets writes:
> On 3/22/24 14:40, Aaron Conole wrote:
>> Open vSwitch supports the ability to invoke a controller action by way
>> of a sample action with a specified meter. In the normal case, this
>> sample action is transparently generated during xlate processi
oss, time 1061ms
In this case, the first ping request receives the FRAG_NEEDED message and
a local routing exception is created.
Reported-at: https://issues.redhat.com/browse/FDP-164
Fixes: 58264848a5a7 ("openvswitch: Add vxlan tunneling support.")
Signed-off-by: Aaron Conole
---
NOTE:
to preserve metering, whether we are
doing a plain old send to controller, or a continuation.
Fixes: 77ab5fd2a95b ("Implement serializing the state of packet traversal in
"continuations".")
Reported-at: https://issues.redhat.com/browse/FDP-455
Tested-by: Alex Musil
Signed-
stly.")
> Fixes: ea83a2fcd0d3 ("lib: Show tunnel egress interface in ovsdb")
> Reported-at: https://github.com/openvswitch/ovs-issues/issues/185
> Reported-at:
> https://mail.openvswitch.org/pipermail/ovs-discuss/2022-October/052091.html
> Signed-off-by: Ilya Maximets
> ---
Thanks!
Acked-by: Aaron Conole
___
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev
Ilya Maximets writes:
> On 3/19/24 20:56, Aaron Conole wrote:
>> Ilya Maximets writes:
>>
>>> Currently, ovs-vswitchd is subscribed to all the routing changes in the
>>> kernel. On each change, it marks the internal routing table cache as
>>> invali
Ilya Maximets writes:
> On 3/7/24 18:25, Aaron Conole wrote:
>> Open vSwitch supports the ability to invoke a controller action by way
>> of a sample action with a specified meter. In the normal case, this
>> sample action is transparently generated during xlate processi
Ilya Maximets writes:
> Currently, ovs-vswitchd is subscribed to all the routing changes in the
> kernel. On each change, it marks the internal routing table cache as
> invalid, then resets it and dumps all the routes from the kernel from
> scratch. The reason for that is kernel routing
ut these are not available in Ubuntu 22.04 image.
>
> This should be fixed by GitHub, but until new images are available
> reducing ASLR entropy manually to 28 bits to make builds work.
>
> Reported-at: https://github.com/actions/runner-images/issues/9491
> Signed-off-by: Ilya Maximets
>
to preserve metering, whether we are
doing a plain old send to controller, or a continuation.
Fixes: 77ab5fd2a95b ("Implement serializing the state of packet traversal in
"continuations".")
Reported-at: https://issues.redhat.com/browse/FDP-455
Tested-by: Alex Musil
Signed-
Simon Horman writes:
> + Xavier
>
> On Thu, Aug 31, 2023 at 02:52:59PM -0400, Aaron Conole wrote:
>> Ilya Maximets writes:
>>
>> > On 8/31/23 09:15, Frode Nordahl wrote:
>> >> On Wed, Aug 30, 2023 at 9:30 PM Paolo Valerio wrote:
>> >>
All supported versions of Fedora do package libbpf, so it
makes sense to enable USDT support.
Acked-by: Simon Horman
Acked-by: Eelco Chaudron
Signed-off-by: Aaron Conole
---
rhel/openvswitch-fedora.spec.in | 8
1 file changed, 8 insertions(+)
diff --git a/rhel/openvswitch
-scripts/flow_reval_monitor.py)
which serves as a demonstration of how the new USDT probe might be used
going forward.
Acked-by: Han Zhou
Signed-off-by: Kevin Sprague
Co-authored-by: Aaron Conole
Signed-off-by: Aaron Conole
---
v8 -> v9: Reorganized the flow delete reasons enum
Upda
Resurrecting a feature from 2022, introduce a probe that indicates
why a particular flow may be selected for eviction during revalidation
and includes the flow information.
The second patch tells fedora builds to include the USDT probe support
on Fedora systems.
Aaron Conole (1):
rhel: Enable
Eelco Chaudron writes:
> On 20 Feb 2024, at 22:47, Aaron Conole wrote:
>
>> From: Kevin Sprague
>>
>> During normal operations, it is useful to understand when a particular flow
>> gets removed from the system. This can be useful when debugging performance
>>
Adrian Moreno writes:
> On 2/16/24 16:28, Aaron Conole wrote:
>> Normally a spawned process under OVS is given a SIGTERM when the test
>> ends as part of cleanup. However, in case the process is still lingering
>> for some reason, we also send a SIGKILL to force it down
Adrian Moreno writes:
> On 2/20/24 19:06, Aaron Conole wrote:
>> Eelco Chaudron writes:
>>
>>> On 19 Feb 2024, at 19:57, Aaron Conole wrote:
>>>
>>>> Eelco Chaudron writes:
>>>>
>>>>> On 12 Feb 2024, at 15:15, Aar
un():
>
> Signed-off-by: Daniel Ding
> ---
LGTM for the linux side - maybe Alin might check the windows side.
When you post v2 you can keep my
Reviewed-by: Aaron Conole
> utilities/ovs-tcpdump.in | 15 +++
> 1 file changed, 15 insertions(+)
>
> diff --git a/uti
Mike Pattrick writes:
> On Tue, Feb 20, 2024 at 8:56 PM Mike Pattrick wrote:
>>
>> This patch adopts the proposed RFC 6935 by allowing null UDP checksums
>> even if the tunnel protocol is IPv6. This is already supported by Linux
>> through the udp6zerocsumtx tunnel option. It is disabled by
Mike Pattrick writes:
> This patch adopts the proposed RFC 6935 by allowing null UDP checksums
> even if the tunnel protocol is IPv6. This is already supported by Linux
> through the udp6zerocsumtx tunnel option. It is disabled by default and
> IPv6 tunnels are flagged as requiring a checksum,
-scripts/flow_reval_monitor.py)
which serves as a demonstration of how the new USDT probe might be used
going forward.
Acked-by: Han Zhou
Signed-off-by: Kevin Sprague
Co-authored-by: Aaron Conole
Signed-off-by: Aaron Conole
---
v8 -> v9: Reorganized the flow delete reasons enum
Upda
All supported versions of Fedora do package libbpf, so it
makes sense to enable USDT support.
Acked-by: Simon Horman
Signed-off-by: Aaron Conole
---
rhel/openvswitch-fedora.spec.in | 8
1 file changed, 8 insertions(+)
diff --git a/rhel/openvswitch-fedora.spec.in b/rhel/openvswitch
Resurrecting a feature from 2022, introduce a probe that indicates
why a particular flow may be selected for eviction during revalidation
and includes the flow information.
The second patch tells fedora builds to include the USDT probe support
on Fedora systems.
Aaron Conole (1):
rhel: Enable
Eelco Chaudron writes:
> On 19 Feb 2024, at 19:57, Aaron Conole wrote:
>
>> Eelco Chaudron writes:
>>
>>> On 12 Feb 2024, at 15:15, Aaron Conole wrote:
>>>
>>>> Aaron Conole writes:
>>>>
>>>>> Eelco
Jakub Kicinski writes:
> On Fri, 16 Feb 2024 10:28:39 -0500 Aaron Conole wrote:
>> The series is a host of cleanups to the openvswitch selftest suite
>> which should be ready to run under the netdev selftest runners using
>> vng. For now, the testing has been don
Eelco Chaudron writes:
> On 12 Feb 2024, at 15:15, Aaron Conole wrote:
>
>> Aaron Conole writes:
>>
>>> Eelco Chaudron writes:
>>>
>>>> On 2 Feb 2024, at 11:31, Adrian Moreno wrote:
>>>>
>>>>> On 2/1/24 10:02, Eelco
Paolo Valerio writes:
> The patch, when 'persistent' flag is specified, makes the IP selection
> in a range persistent across reboots.
>
> Signed-off-by: Paolo Valerio
> Acked-by: Simon Horman
> ---
Acked-by: Aaron Conole
___
gt; Signed-off-by: Paolo Valerio
> Acked-by: Simon Horman
> ---
Acked-by: Aaron Conole
> Documentation/ref/ovs-actions.7.rst | 3 +--
> NEWS| 3 +++
> lib/conntrack.c | 15 ---
> lib/conntrack.h
Felix Huettner writes:
>> > diff --git a/lib/netlink-conntrack.c b/lib/netlink-conntrack.c
>> > index 492bfcffb..1b050894d 100644
>> > --- a/lib/netlink-conntrack.c
>> > +++ b/lib/netlink-conntrack.c
>> > @@ -25,6 +25,7 @@
>> > #include
>> > #include
>> > #include
>> > +#include
>> >
>>
Paolo Abeni writes:
> On Fri, 2024-02-16 at 10:28 -0500, Aaron Conole wrote:
>> Many openvswitch test cases reused netns and interface names. This works
>> fine as long as the test case cleans up gracefully. However, if there is
>> some kind of ungraceful termination
file which includes a timeout value that should be sufficent
for such environments.
Signed-off-by: Aaron Conole
---
.../testing/selftests/net/openvswitch/config | 50 +++
.../selftests/net/openvswitch/settings| 1 +
2 files changed, 51 insertions(+)
create mode 100644
timeout gets exceeded, while running under very slow debugging conditions.
The solution here is to cleanup the netns on executing the next test.
Signed-off-by: Aaron Conole
---
tools/testing/selftests/net/openvswitch/openvswitch.sh | 4
1 file changed, 4 insertions(+)
diff --git a/tools/testing
a different location.
Signed-off-by: Aaron Conole
---
.../testing/selftests/net/openvswitch/openvswitch.sh | 11 +++
1 file changed, 11 insertions(+)
diff --git a/tools/testing/selftests/net/openvswitch/openvswitch.sh
b/tools/testing/selftests/net/openvswitch/openvswitch.sh
index a2c106104fb8
Normally a spawned process under OVS is given a SIGTERM when the test
ends as part of cleanup. However, in case the process is still lingering
for some reason, we also send a SIGKILL to force it down faster.
Signed-off-by: Aaron Conole
---
tools/testing/selftests/net/openvswitch/openvswitch.sh
Normally, the openvswitch selftests don't keep error files around, but
if debugging, there is an option to keep these files. The 'clean'
target should be informed that they exist to ensure they are deleted
properly.
Signed-off-by: Aaron Conole
---
tools/testing/selftests/net/openvswitch
, and also increase the opportunity to not miss processing
the upcall queue.
Signed-off-by: Aaron Conole
---
tools/testing/selftests/net/openvswitch/openvswitch.sh | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/testing/selftests/net/openvswitch/openvswitch.sh
b/tools
the amount of details logged to the debug log by trapping all
'info' logs, and all 'ovs_sbx' commands.
Signed-off-by: Aaron Conole
---
tools/testing/selftests/net/openvswitch/openvswitch.sh | 10 +++---
1 file changed, 7 insertions(+), 3 deletions(-)
diff --git a/tools/testing/selftests/net
/ \
-- \
make -C tools/testing/selftests/net/openvswitch \
TARGETS=openvswitch TEST_PROGS=openvswitch.sh run_tests
Aaron Conole (7):
selftests: openvswitch: add test case error directories to clean list
selftests: openvswitch: be more verbose with selftest debugging
selftests
Felix Huettner via dev writes:
> Previously the kernel did not provide a netlink interface to flush/list
> only conntrack entries matching a specific zone. With [1] and [2] it is now
> possible to flush and list conntrack entries filtered by zone. Older
> kernels not yet supporting this feature
Paolo Valerio writes:
> The patch, when 'persistent' flag is specified, makes the IP selection
> in a range persistent across reboots.
>
> Signed-off-by: Paolo Valerio
> ---
> NEWS | 3 ++-
> lib/conntrack.c | 27 +--
> lib/conntrack.h | 1 +
>
Xavier Simonart writes:
> When a ct element was cleaned, the cmap could be shrinked, potentially
> causing some elements to be skipped in the flush iteration.
>
> Signed-off-by: Xavier Simonart
> ---
This only applies to netdev datapaths, so might be good to mention it in
the commit message.
Aaron Conole writes:
> Eelco Chaudron writes:
>
>> On 2 Feb 2024, at 11:31, Adrian Moreno wrote:
>>
>>> On 2/1/24 10:02, Eelco Chaudron wrote:
>>>>
>>>>
>>>> On 31 Jan 2024, at 18:03, Aaron Conole wrote:
>>>>
>&g
3 deletions(-)
Series:
Acked-by: Aaron Conole
___
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev
3 deletions(-)
Series:
Acked-by: Aaron Conole
___
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev
3 deletions(-)
Series:
Acked-by: Aaron Conole
___
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev
3 deletions(-)
Series:
Acked-by: Aaron Conole
___
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev
, this series provides a selftest in 2/2 that can be used to
determine if the OVS module is allowing unbounded access. It can be
safely omitted where the ovs selftest framework isn't available.
Aaron Conole (2):
net: openvswitch: limit the number of recursions from action sets
selftests
Add a test case into the netlink checks that will show the number of
nested action recursions won't exceed 16. Going to 17 on a small
clone call isn't enough to exhaust the stack on (most) systems, so
it should be safe to run even on systems that don't have the fix
applied.
Signed-off-by: Aaron
Signed-off-by: Aaron Conole
---
v1->v2: Switch to tracking the stack depth by using a depth argument rather than
a per-cpu counter.
net/openvswitch/flow_netlink.c | 49 +++---
1 file changed, 33 insertions(+), 16 deletions(-)
diff --git a/net/openvswitch/flo
Eric Dumazet writes:
> On Tue, Feb 6, 2024 at 3:55 PM Aaron Conole wrote:
>>
>>
>> Oops - I didn't consider it.
>>
>> Given that, maybe the best approach would not to rely on per-cpu
>> counter. I'll respin in the next series with a depth counter
Eric Dumazet writes:
> On Tue, Feb 6, 2024 at 2:11 PM Aaron Conole wrote:
>>
>> The ovs module allows for some actions to recursively contain an action
>> list for complex scenarios, such as sampling, checking lengths, etc.
>> When these actions are copied i
Add a test case into the netlink checks that will show the number of
nested action recursions won't exceed 16. Going to 17 on a small
clone call isn't enough to exhaust the stack on (most) systems, so
it should be safe to run even on systems that don't have the fix
applied.
Signed-off-by: Aaron
Signed-off-by: Aaron Conole
---
net/openvswitch/flow_netlink.c | 33 -
1 file changed, 28 insertions(+), 5 deletions(-)
diff --git a/net/openvswitch/flow_netlink.c b/net/openvswitch/flow_netlink.c
index 88965e2068ac..ba5cfa67a720 100644
--- a/net/openvswitch/flow
, this series provides a selftest in 2/2 that can be used to
determine if the OVS module is allowing unbounded access. It can be
safely omitted where the ovs selftest framework isn't available.
Aaron Conole (2):
net: openvswitch: limit the number of recursions from action sets
selftests
Eelco Chaudron writes:
> On 2 Feb 2024, at 11:31, Adrian Moreno wrote:
>
>> On 2/1/24 10:02, Eelco Chaudron wrote:
>>>
>>>
>>> On 31 Jan 2024, at 18:03, Aaron Conole wrote:
>>>
>>>> Eelco Chaudron writes:
>>>>
>>>
Adrian Moreno writes:
> On 2/1/24 10:02, Eelco Chaudron wrote:
>> On 31 Jan 2024, at 18:03, Aaron Conole wrote:
>>
>>> Eelco Chaudron writes:
>>>
>>>> On 25 Jan 2024, at 21:55, Aaron Conole wrote:
>>>>
>>>>> From: Kevin S
Eelco Chaudron writes:
> On 1 Feb 2024, at 18:28, Aaron Conole wrote:
>
>> Eelco Chaudron writes:
>>
>>> On 31 Jan 2024, at 18:03, Aaron Conole wrote:
>>>
>>>> Eelco Chaudron writes:
>>>>
>>>>> On 25 Jan 2024, at 21:55,
Eelco Chaudron writes:
> On 31 Jan 2024, at 18:03, Aaron Conole wrote:
>
>> Eelco Chaudron writes:
>>
>>> On 25 Jan 2024, at 21:55, Aaron Conole wrote:
>>>
>>>> From: Kevin Sprague
>>>>
>>>> During normal operations,
Eelco Chaudron writes:
> On 25 Jan 2024, at 21:55, Aaron Conole wrote:
>
>> From: Kevin Sprague
>>
>> During normal operations, it is useful to understand when a particular flow
>> gets removed from the system. This can be useful when debugging performance
>>
@faucet.nz/
> Link: https://mail.openvswitch.org/pipermail/ovs-dev/2024-January/410476.html
> Suggested-by: Aaron Conole
> Signed-off-by: Brad Cowie
> ---
I tested this on a patched kernel and as well as an unpatched kernel and
got the following:
6.5.5-200: TEST: ip4-nat-related: ICMP related matches
Ilya Maximets writes:
> On 1/25/24 21:55, Aaron Conole wrote:
>> All supported versions of Fedora do package libbpf, so it
>> makes sense to enable USDT support.
>>
>> Signed-off-by: Aaron Conole
>> ---
>> v8: Include the correct devel package a
Simon Horman writes:
> On Thu, Jan 25, 2024 at 12:05:29PM -0500, Aaron Conole wrote:
>> From: Kevin Sprague
>>
>> During normal operations, it is useful to understand when a particular flow
>> gets removed from the system. This can be useful when debugging performanc
Simon Horman writes:
> On Thu, Jan 25, 2024 at 12:05:30PM -0500, Aaron Conole wrote:
>> All supported versions of Fedora do package libbpf, so it
>> makes sense to enable USDT support.
>>
>> Signed-off-by: Aaron Conole
>> ---
>> rhel/openvswitch-fedora.
Han Zhou writes:
> On Thu, Jan 25, 2024 at 12:55 PM Aaron Conole wrote:
>>
>> From: Kevin Sprague
>>
>> During normal operations, it is useful to understand when a particular flow
>> gets removed from the system. This can be useful when debugging performan
-scripts/flow_reval_monitor.py)
which serves as a demonstration of how the new USDT probe might be used
going forward.
Signed-off-by: Kevin Sprague
Co-authored-by: Aaron Conole
Signed-off-by: Aaron Conole
---
Documentation/topics/usdt-probes.rst | 1 +
ofproto/ofproto-dpif-upcall.c
Resurrecting a feature from 2022, introduce a probe that indicates
why a particular flow may be selected for eviction during revalidation
and includes the flow information.
The second patch tells fedora builds to include the USDT probe support
on Fedora systems.
Aaron Conole (1):
rhel: Enable
All supported versions of Fedora do package libbpf, so it
makes sense to enable USDT support.
Signed-off-by: Aaron Conole
---
v8: Include the correct devel package as a dependency
rhel/openvswitch-fedora.spec.in | 8
1 file changed, 8 insertions(+)
diff --git a/rhel/openvswitch
All supported versions of Fedora do package libbpf, so it
makes sense to enable USDT support.
Signed-off-by: Aaron Conole
---
rhel/openvswitch-fedora.spec.in | 5 +
1 file changed, 5 insertions(+)
diff --git a/rhel/openvswitch-fedora.spec.in b/rhel/openvswitch-fedora.spec.in
index
Resurrecting a feature from 2022, introduce a probe that indicates
why a particular flow may be selected for eviction during revalidation
and includes the flow information.
The second patch tells fedora builds to include the USDT probe support
on Fedora systems.
Aaron Conole (1):
rhel: Enable
-scripts/flow_reval_monitor.py)
which serves as a demonstration of how the new USDT probe might be used
going forward.
Signed-off-by: Kevin Sprague
Co-authored-by: Aaron Conole
Signed-off-by: Aaron Conole
---
Documentation/topics/usdt-probes.rst | 1 +
ofproto/ofproto-dpif-upcall.c
Dumitru Ceara writes:
> On 1/23/24 00:11, Mike Pattrick wrote:
>> The OVN test suite identified a bug in dp_packet_ol_send_prepare() where
>> a BFD packet flagged as double encapsulated would trigger a seg fault.
>> The problem surfaced because bfd_put_packet was reusing a packet
>> allocated on
Dumitru Ceara writes:
> On 1/17/24 21:40, Mark Michelson wrote:
>> On 1/16/24 11:23, Numan Siddique wrote:
>>> On Tue, Jan 16, 2024 at 8:09 AM Dumitru Ceara wrote:
This picks up the following OVS changes:
00d3d4a7d375 ("checkpatch: Avoid catastrophic backtracking.")
Eelco Chaudron writes:
> On 16 Jan 2024, at 0:24, Ilya Maximets wrote:
>
>> On 1/10/24 12:25, Eelco Chaudron wrote:
>>> Currently the 'Spent an unreasonably long Xms dumping flows' message
>>> is set to the INFO level. However, based on this, we are also
>>> drastically limiting the number of
storical context.
>
> Reported-at:
> https://lists.linuxfoundation.org/pipermail/ovs-discuss/2023-June/052523.html
> Suggested-by: Martin Kennelly
> Co-Authored-By: Aaron Conole
> Signed-off-by: Aaron Conole
> Signed-off-by: Eelco Chaudro
Eelco Chaudron writes:
> Add new coverage counters that might help debugging flow_limit
> related issues.
>
> Signed-off-by: Eelco Chaudron
> ---
Thanks, applied.
___
dev mailing list
d...@openvswitch.org
Eelco Chaudron writes:
> Currently the 'Spent an unreasonably long Xms dumping flows' message
> is set to the INFO level. However, based on this, we are also
> drastically limiting the number of flows in the datapath, and this
> would warrant a WARNING level.
>
> Acked-by: Simon Horman
>
1 - 100 of 1995 matches
Mail list logo