On 17 Jan 2025, at 15:25, Adrian Moreno wrote:
> Drop events are generated from the kernel, not ovs-vswitchd so instead
> of relying on nla decoding, copy the skb's device name directly into the
> event.
>
> Signed-off-by: Adrian Moreno <[email protected]>
This patch is giving me odd errors:
1897177.728659707 33 handler206 1058347 ens2f0np0
(system@ovs-system) 0 1496 132 0
1897177.728660453 3 handler172 1058313 ens2f0np0
(system@ovs-system) 0 1496 132 0
1897177.728666183 33 handler206 1058347 ens2f0np0
(system@ovs-system) 0 1496 132 0
Exception ignored on calling ctypes callback function: <function
RingBuf.open_ring_buffer.<locals>.ringbuf_cb_ at 0x7f6e5dc59670>
Traceback (most recent call last):
File "/usr/lib/python3.9/site-packages/bcc/table.py", line 1266, in
ringbuf_cb_
ret = callback(ctx, data, size)
File
"/root/Documents/reviews/OVS_main_DPDK_v24.11.1/ovs_github/utilities/usdt-scripts/./upcall_monitor.py",
line 328, in print_event
port = event.dev_name.decode("utf-8")
UnicodeDecodeError: 'utf-8' codec can't decode byte 0xd8 in position 0: invalid
continuation byte
Exception ignored on calling ctypes callback function: <function
RingBuf.open_ring_buffer.<locals>.ringbuf_cb_ at 0x7f6e5dc59670>
Traceback (most recent call last):
File "/usr/lib/python3.9/site-packages/bcc/table.py", line 1266, in
ringbuf_cb_
ret = callback(ctx, data, size)
I guess the buffer is wrapping, and the entries are not zeroed out, causing
problems in the USDT case. Adding the below solved it for me:
diff --git a/utilities/usdt-scripts/upcall_monitor.py
b/utilities/usdt-scripts/upcall_monitor.py
index 104225cad..3ba17952b 100755
--- a/utilities/usdt-scripts/upcall_monitor.py
+++ b/utilities/usdt-scripts/upcall_monitor.py
@@ -179,6 +179,7 @@ int do_trace(struct pt_regs *ctx) {
event->cpu = bpf_get_smp_processor_id();
event->pid = bpf_get_current_pid_tgid();
event->result = 0;
+ event->dev_name[0] = 0;
bpf_get_current_comm(&event->comm, sizeof(event->comm));
Other than the above, no other comments.
> ---
> utilities/usdt-scripts/upcall_monitor.py | 10 +++++++++-
> 1 file changed, 9 insertions(+), 1 deletion(-)
>
> diff --git a/utilities/usdt-scripts/upcall_monitor.py
> b/utilities/usdt-scripts/upcall_monitor.py
> index 8943fd205..104225cad 100755
> --- a/utilities/usdt-scripts/upcall_monitor.py
> +++ b/utilities/usdt-scripts/upcall_monitor.py
> @@ -133,6 +133,7 @@ import sys
> # Actual eBPF source code
> #
> ebpf_source = """
> +#include <linux/netdevice.h>
> #include <linux/skbuff.h>
>
> #define MAX_PACKET <MAX_PACKET_VAL>
> @@ -148,6 +149,7 @@ struct event_t {
> u64 key_size;
> char comm[TASK_COMM_LEN];
> char dpif_name[32];
> + char dev_name[16];
> unsigned char pkt[MAX_PACKET];
> unsigned char key[MAX_KEY];
> };
> @@ -237,6 +239,7 @@ int kretprobe__ovs_dp_upcall(struct pt_regs *ctx)
> u64 pid = bpf_get_current_pid_tgid();
> struct inflight_upcall *upcall;
> int ret = PT_REGS_RC(ctx);
> + struct net_device *dev;
> u64 size;
>
> upcall = inflight_upcalls.lookup(&pid);
> @@ -265,6 +268,9 @@ int kretprobe__ovs_dp_upcall(struct pt_regs *ctx)
> event->pkt_size = upcall->skb->len;
> event->upcall_type = upcall->upcall_type;
> event->key_size = 0;
> + bpf_probe_read(&dev, sizeof(upcall->skb->dev),
> + ((char *)upcall->skb + offsetof(struct sk_buff, dev)));
> + bpf_probe_read_kernel(&event->dev_name, 16, dev->name);
>
> size = upcall->skb->len - upcall->skb->data_len;
> if (size > MAX_PACKET) {
> @@ -318,7 +324,9 @@ def print_event(ctx, data, size):
> nla, key_dump = decode_nlm(
> bytes(event.key)[: min(event.key_size, options.flow_key_size)]
> )
> - if "OVS_KEY_ATTR_IN_PORT" in nla:
> + if event.dev_name:
> + port = event.dev_name.decode("utf-8")
> + elif "OVS_KEY_ATTR_IN_PORT" in nla:
> port_no = struct.unpack("=I", nla["OVS_KEY_ATTR_IN_PORT"])[0]
> port = dp_map.get_port_name(dp.partition("@")[-1], port_no)
> else:
> --
> 2.48.1
>
> _______________________________________________
> dev mailing list
> [email protected]
> https://mail.openvswitch.org/mailman/listinfo/ovs-dev
_______________________________________________
dev mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-dev