This is the link to the patch in Open vSwitch's Patchwork:
https://patchwork.ozlabs.org/project/openvswitch/patch/20210616103214.35669-1-b.peterm...@syseleven.de/
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.n
I sent in a patch "[PATCH] Python: Fix Idl.run change_seqno update"
see https://mail.openvswitch.org/pipermail/ovs-dev/2021-June/384014.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928031
Title
We saw the AttributeErrors "has no attribute 'sb_idl'" too and as pointed out
already, wait_for_change doesn't finish.
It calls ovs's idl.run which is supposed to return True if there was a change,
but there are cases where it doesn't.
See [1]: in the run() function messages are read in a loop. I
Tested with kernel 4.4.0-123.147. Issue is fixed there.
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1763454
Title
(I used my team account cloudstackers-7 before, now with my own one)
The bounds check may not be necessary, because
replace_map_fd_with_map_ptr is called before do_check and the relevant
check is already in replace_map_fd_with_map_ptr. But it's not obvious,
so at least a comment in do_check may be
I revised the patch a little bit. It needs an additional bounds check
for insn_idx. And another seen=true line needs to removed. See the newly
attached patch.
** Patch added: "Revised BPF verifier fix"
https://bugs.launchpad.net/ubuntu/+source/linux-meta-lts-xenial/+bug/1763352/+attachment/511
This issue is most likely caused by the BPF verifier changes from
ubuntu-genial commit 68dd63b26223880d1b431b6bf54e45d93d04361a.
The BPF uses a map and bpf_map_update_elem crashes because the map
pointer is invalid.
The map pointer is invalid because the BPF instruction to load the
pointer into t
Public bug reported:
Using Ubuntu 16.04 LTS with 4.4.0 kernel on x86_64
After kernel update from 4.4.0-116 to 4.4.0-119 running an eBPF tool to log
slow ext4 I/O (bcc-tool ext4slower) causes a kernel panic in
bpf_map_update_elem.
Steps to reproduce:
* install bcc-tools 0.5.0-1 (https://github.