Bug 1979680 - Backport openvswitch tracepoints
Summary: Backport openvswitch tracepoints
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: kernel
Version: 8.5
Hardware: All
OS: Linux
unspecified
medium
Target Milestone: beta
: ---
Assignee: Aaron Conole
QA Contact: Rick Alongi
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2021-07-06 17:34 UTC by Aaron Conole
Modified: 2021-11-10 06:06 UTC (History)
5 users (show)

Fixed In Version: kernel-4.18.0-329.el8
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-11-09 19:24:16 UTC
Type: Bug
Target Upstream Version:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Gitlab redhat/rhel/src/kernel rhel-8 merge_requests 974 0 None None None 2021-07-15 14:30:42 UTC
Red Hat Product Errata RHSA-2021:4356 0 None None None 2021-11-09 19:24:38 UTC

Description Aaron Conole 2021-07-06 17:34:26 UTC
Description of problem:

Recently, commit c4ab7b56be0f ("openvswitch: add trace points") was accepted
to upstream net-next.  This is a request to backport to the RHEL kernel to
support debugging the kernel datapath.

See:
https://git.kernel.org/netdev/net-next/c/c4ab7b56be0f

Comment 3 Rick Alongi 2021-07-14 17:04:28 UTC
Hi Aaron.

Please let me know if this is something that can be tested for verification and, if so, what the steps would be.

Thanks,
Rick

Comment 5 Aaron Conole 2021-07-15 14:24:29 UTC
I've updated the ITM and DTM's since it is probably a miss to try for -20.

This can be tested - simply look for the trace events under:

   /sys/kernel/tracing/events/openvswitch/

After this patch, that directory should exist and be populated with the userspace
and action probes.

Comment 7 Rick Alongi 2021-07-26 13:11:39 UTC
Verified new functionality:

[root@netqe9 ~]# uname -r
4.18.0-323.el8.mr974_210715_1516.x86_64

[root@netqe9 ~]# modprobe openvswitch

[root@netqe9 ~]# grep openvswitch /proc/modules
openvswitch 180224 0 - Live 0xffffffffc0f88000
nf_conncount 16384 1 openvswitch, Live 0xffffffffc02e8000
nf_nat 45056 3 openvswitch,ipt_MASQUERADE,nft_chain_nat, Live 0xffffffffc092f000
nf_conntrack 172032 5 openvswitch,nf_conncount,ipt_MASQUERADE,xt_conntrack,nf_nat, Live 0xffffffffc0f5d000
nf_defrag_ipv6 20480 2 openvswitch,nf_conntrack, Live 0xffffffffc0929000
libcrc32c 16384 6 openvswitch,nf_nat,nf_conntrack,nf_tables,xfs,bnx2x, Live 0xffffffffc0200000

[root@netqe9 ~]# ls -lah /sys/kernel/tracing/events/openvswitch
total 0
drwxr-xr-x.   4 root root 0 Jul 26 07:30 .
drwxr-xr-x. 103 root root 0 Jul 26 07:28 ..
-rw-r--r--.   1 root root 0 Jul 26 07:30 enable
-rw-r--r--.   1 root root 0 Jul 26 07:30 filter
drwxr-xr-x.   2 root root 0 Jul 26 07:30 ovs_do_execute_action
drwxr-xr-x.   2 root root 0 Jul 26 07:30 ovs_dp_upcall

Comment 13 Rick Alongi 2021-08-12 15:39:53 UTC
Verified fix using compose RHEL-8.5.0-20210812.n.0:

[root@netqe9 ~]# uname -r
4.18.0-330.el8.x86_64

[root@netqe9 ~]# modprobe openvswitch
[root@netqe9 ~]# grep openvswitch /proc/modules
openvswitch 180224 0 - Live 0xffffffffc0db5000
nf_conncount 16384 1 openvswitch, Live 0xffffffffc055d000
nf_nat 45056 3 openvswitch,ipt_MASQUERADE,nft_chain_nat, Live 0xffffffffc095f000
nf_conntrack 172032 5 openvswitch,nf_conncount,ipt_MASQUERADE,xt_conntrack,nf_nat, Live 0xffffffffc0d8a000
nf_defrag_ipv6 20480 2 openvswitch,nf_conntrack, Live 0xffffffffc0935000
libcrc32c 16384 6 openvswitch,nf_nat,nf_conntrack,nf_tables,xfs,bnx2x, Live 0xffffffffc01b7000
[root@netqe9 ~]# ls -lah /sys/kernel/tracing/events/openvswitch
total 0
drwxr-xr-x.   4 root root 0 Aug 12 11:11 .
drwxr-xr-x. 103 root root 0 Aug 12  2021 ..
-rw-r--r--.   1 root root 0 Aug 12 11:11 enable
-rw-r--r--.   1 root root 0 Aug 12 11:11 filter
drwxr-xr-x.   2 root root 0 Aug 12 11:11 ovs_do_execute_action
drwxr-xr-x.   2 root root 0 Aug 12 11:11 ovs_dp_upcall
[root@netqe9 ~]#

Comment 15 errata-xmlrpc 2021-11-09 19:24:16 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: kernel security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2021:4356


Note You need to log in before you can comment on or make changes to this bug.