[ovs-dev] Bug#630325: Bug#630325: Bug#630325: openvswitch: FTBFS on big-endian architectures

Ben Pfaff blp at nicira.com
Wed Jun 15 19:55:50 UTC 2011


On Tue, Jun 14, 2011 at 10:05:35PM -0700, Ben Pfaff wrote:
> On Wed, Jun 15, 2011 at 02:04:39PM +0900, Simon Horman wrote:
> > On Tue, Jun 14, 2011 at 07:56:52PM -0700, Ben Pfaff wrote:
> > > On Wed, Jun 15, 2011 at 10:51:24AM +0900, Simon Horman wrote:
> > > > Unfortunately I'm not familiar enough with the output to determine
> > > > the problem without digging much further. Perhaps you have some ideas.
> > > > 
> > > > The detailed output from sparc is below.
> > > > I believe that the output is similar if not the same
> > > > on the other three architectures.
> > > 
> > > Yes, I looked at this today.  I'll send out a fix for it tomorrow.
> > > 
> > > It's a bug in the testsuite, I think, not in OVS itself.
> > 
> > Understood.
> > 
> > Could you CC me or this bug on the fix? Then I can push it into
> > an upload to Debian.Org and the buildds can verify the change.
> 
> Of course.  Will do.

Simon, looking closer, this was fixed on branch-1.1 by the following
commit, made on April 18.  (The fix is to sort the output of
dump-flows.)  This fix is already in OVS 1.1.1.  This bug is reported
against OVS 1.1.0, so it should be obsoleted by the OVS version
currently in Debian.  Indeed, when I look at the current buildd status
at https://buildd.debian.org/status/package.php?p=openvswitch&suite=sid
I don't see any relevant failures.

I think we can close this.

Thanks,

Ben.

--8<--------------------------cut here-------------------------->8--

From: Ben Pfaff <blp at nicira.com>
Date: Mon, 18 Apr 2011 10:11:43 -0700
Subject: [PATCH] ofp-util: Properly handle "tun_id"s in tun_id_from_cookie
 flows.

Just setting the tun_id field isn't enough--it's also necessary to set
the tun_id_mask.  Otherwise the call to cls_rule_zero_wildcarded_fields()
at the end of ofputil_cls_rule_from_match() will zero out the tun_id again.

This was broken by commit 8368c090cab "Implement arbitrary bitwise masks
for tun_id field" back in January.  (This makes me wonder whether we can
drop support for tun_id_from_cookie now.)

Reported-by: Dan Wendlandt <dan at nicira.com>
---
 lib/ofp-util.c   |    2 +-
 tests/ofproto.at |    8 ++++++--
 2 files changed, 7 insertions(+), 3 deletions(-)

diff --git a/lib/ofp-util.c b/lib/ofp-util.c
index cc448bc..5c95270 100644
--- a/lib/ofp-util.c
+++ b/lib/ofp-util.c
@@ -136,7 +136,7 @@ ofputil_cls_rule_from_match(const struct ofp_match *match,
     wc->nw_dst_mask = ofputil_wcbits_to_netmask(ofpfw >> OFPFW_NW_DST_SHIFT);
 
     if (flow_format == NXFF_TUN_ID_FROM_COOKIE && !(ofpfw & NXFW_TUN_ID)) {
-        rule->flow.tun_id = htonll(ntohll(cookie) >> 32);
+        cls_rule_set_tun_id(rule, htonll(ntohll(cookie) >> 32));
     }
 
     if (ofpfw & OFPFW_DL_DST) {
diff --git a/tests/ofproto.at b/tests/ofproto.at
index 9506756..fc7ff57 100644
--- a/tests/ofproto.at
+++ b/tests/ofproto.at
@@ -48,10 +48,14 @@ AT_CHECK([ovs-ofctl dump-flows br0 | STRIP_XIDS], [0], [NXST_FLOW reply:
 ])
 AT_CHECK([echo 'in_port=1,actions=0' | ovs-ofctl add-flows br0 -])
 AT_CHECK([ovs-ofctl add-flow br0 in_port=0,actions=1])
-AT_CHECK([ovs-ofctl dump-flows br0 | STRIP_XIDS | STRIP_DURATION], [0], [dnl
-NXST_FLOW reply:
+dnl Tests for a bug in which ofproto ignored tun_id in tun_id_from_cookie
+dnl flow_mod commands.
+AT_CHECK([ovs-ofctl add-flow -F tun_id_from_cookie br0 tun_id=1,actions=mod_vlan_vid:4])
+AT_CHECK([ovs-ofctl dump-flows br0 | STRIP_XIDS | STRIP_DURATION | sort], [0], [dnl
  cookie=0x0, duration=?s, table_id=0, n_packets=0, n_bytes=0, in_port=1 actions=output:0
  cookie=0x0, duration=?s, table_id=0, n_packets=0, n_bytes=0, in_port=65534 actions=output:1
+ cookie=0x100000000, duration=?s, table_id=0, n_packets=0, n_bytes=0, tun_id=0x1 actions=mod_vlan_vid:4
+NXST_FLOW reply:
 ])
 AT_CHECK([ovs-ofctl del-flows br0])
 AT_CHECK([ovs-ofctl dump-flows br0 | STRIP_XIDS], [0], [NXST_FLOW reply:
-- 
1.7.4.4







More information about the dev mailing list