Bug 1979680

Summary: Backport openvswitch tracepoints
Product: Red Hat Enterprise Linux 8 Reporter: Aaron Conole <aconole>
Component: kernelAssignee: Aaron Conole <aconole>
kernel sub component: Networking QA Contact: Rick Alongi <ralongi>
Status: CLOSED ERRATA Docs Contact:
Severity: medium    
Priority: unspecified CC: atragler, brdeoliv, ctrautma, jiji, kzhang
Version: 8.5Keywords: FutureFeature, Triaged
Target Milestone: beta   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: kernel-4.18.0-329.el8 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-11-09 19:24:16 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Aaron Conole 2021-07-06 17:34:26 UTC
Description of problem:

Recently, commit c4ab7b56be0f ("openvswitch: add trace points") was accepted
to upstream net-next.  This is a request to backport to the RHEL kernel to
support debugging the kernel datapath.

See:
https://git.kernel.org/netdev/net-next/c/c4ab7b56be0f

Comment 3 Rick Alongi 2021-07-14 17:04:28 UTC
Hi Aaron.

Please let me know if this is something that can be tested for verification and, if so, what the steps would be.

Thanks,
Rick

Comment 5 Aaron Conole 2021-07-15 14:24:29 UTC
I've updated the ITM and DTM's since it is probably a miss to try for -20.

This can be tested - simply look for the trace events under:

   /sys/kernel/tracing/events/openvswitch/

After this patch, that directory should exist and be populated with the userspace
and action probes.

Comment 7 Rick Alongi 2021-07-26 13:11:39 UTC
Verified new functionality:

[root@netqe9 ~]# uname -r
4.18.0-323.el8.mr974_210715_1516.x86_64

[root@netqe9 ~]# modprobe openvswitch

[root@netqe9 ~]# grep openvswitch /proc/modules
openvswitch 180224 0 - Live 0xffffffffc0f88000
nf_conncount 16384 1 openvswitch, Live 0xffffffffc02e8000
nf_nat 45056 3 openvswitch,ipt_MASQUERADE,nft_chain_nat, Live 0xffffffffc092f000
nf_conntrack 172032 5 openvswitch,nf_conncount,ipt_MASQUERADE,xt_conntrack,nf_nat, Live 0xffffffffc0f5d000
nf_defrag_ipv6 20480 2 openvswitch,nf_conntrack, Live 0xffffffffc0929000
libcrc32c 16384 6 openvswitch,nf_nat,nf_conntrack,nf_tables,xfs,bnx2x, Live 0xffffffffc0200000

[root@netqe9 ~]# ls -lah /sys/kernel/tracing/events/openvswitch
total 0
drwxr-xr-x.   4 root root 0 Jul 26 07:30 .
drwxr-xr-x. 103 root root 0 Jul 26 07:28 ..
-rw-r--r--.   1 root root 0 Jul 26 07:30 enable
-rw-r--r--.   1 root root 0 Jul 26 07:30 filter
drwxr-xr-x.   2 root root 0 Jul 26 07:30 ovs_do_execute_action
drwxr-xr-x.   2 root root 0 Jul 26 07:30 ovs_dp_upcall

Comment 13 Rick Alongi 2021-08-12 15:39:53 UTC
Verified fix using compose RHEL-8.5.0-20210812.n.0:

[root@netqe9 ~]# uname -r
4.18.0-330.el8.x86_64

[root@netqe9 ~]# modprobe openvswitch
[root@netqe9 ~]# grep openvswitch /proc/modules
openvswitch 180224 0 - Live 0xffffffffc0db5000
nf_conncount 16384 1 openvswitch, Live 0xffffffffc055d000
nf_nat 45056 3 openvswitch,ipt_MASQUERADE,nft_chain_nat, Live 0xffffffffc095f000
nf_conntrack 172032 5 openvswitch,nf_conncount,ipt_MASQUERADE,xt_conntrack,nf_nat, Live 0xffffffffc0d8a000
nf_defrag_ipv6 20480 2 openvswitch,nf_conntrack, Live 0xffffffffc0935000
libcrc32c 16384 6 openvswitch,nf_nat,nf_conntrack,nf_tables,xfs,bnx2x, Live 0xffffffffc01b7000
[root@netqe9 ~]# ls -lah /sys/kernel/tracing/events/openvswitch
total 0
drwxr-xr-x.   4 root root 0 Aug 12 11:11 .
drwxr-xr-x. 103 root root 0 Aug 12  2021 ..
-rw-r--r--.   1 root root 0 Aug 12 11:11 enable
-rw-r--r--.   1 root root 0 Aug 12 11:11 filter
drwxr-xr-x.   2 root root 0 Aug 12 11:11 ovs_do_execute_action
drwxr-xr-x.   2 root root 0 Aug 12 11:11 ovs_dp_upcall
[root@netqe9 ~]#

Comment 15 errata-xmlrpc 2021-11-09 19:24:16 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: kernel security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2021:4356