On 31/07/2015 01:30, "Joe Stringer" <joestrin...@nicira.com> wrote:

>On 30 July 2015 at 11:37, Daniele Di Proietto <diproiet...@vmware.com>
>wrote:
>> I get a warning in the OVS log that causes this test to fail.
>>
>> It appears that when br0 is removed (in OVS_KMOD_VSWITCHD_STOP)
>> OVS gets a rtnetlink message (because br0 had an address in the
>> routing table), but route_table_parse() fails, because
>> if_indextoname() returns an error (the device is not there anymore).
>>
>> Adding
>>
>> AT_CHECK([ip addr del dev br0 "10.1.1.100/24"])
>>
>> before OVS_KMOD_VSWITCHD_STOP solves the problem for me.
>> Could you add that? What do you think?
>
>I guess that just deleting the datapath before cleaning up the OVS
>side is a bit aggressive. We could probably do this, or we should
>remove the bridge from ovs via ovs-vsctl first. I can roll that into
>the next version.

On my system (debian Jessie) if the bridge has an address, even deleting it
via ovs-vsctl triggers the warning.

>
>
>> Also, I think that instead of creating the veth pair for
>> the tunnel underlay manually, we could use another OVS
>> bridge.  This has two advantages:
>>
>> * The code is shorter
>> * Tunnelling in userspace requires an OVS bridge as
>>   underlay.
>>
>> This is a summary of the changes I'm proposing:
>>
>> diff --git a/tests/kmod-traffic.at b/tests/kmod-traffic.at
>> index 169078d..346d464 100644
>> --- a/tests/kmod-traffic.at
>> +++ b/tests/kmod-traffic.at
>> @@ -110,20 +110,18 @@ AT_SETUP([kmod - ping over vxlan tunnel])
>>  AT_SKIP_IF([! ip link help 2>&1 | grep vxlan >/dev/null])
>>
>>  OVS_KMOD_VSWITCHD_START(
>> -   [set-fail-mode br0 standalone --])
>> +   [set-fail-mode br0 standalone --dnl
>> +    add-br br-ovs-p0])
>>  dnl Ensure that vport_* can be removed on exit.
>>  ON_EXIT([modprobe -r vport_vxlan])
>>  ON_EXIT([ovs-dpctl del-dp ovs-system])
>>
>>  ADD_NAMESPACES(at_ns0)
>>
>> +ADD_VETH(p0, at_ns0, br-ovs-p0, "172.31.1.1/24")
>>  dnl Set up underlay link from host into the namespace using veth pair.
>> -AT_CHECK([ip link add p0 type veth peer name host-p0])
>> -AT_CHECK([ip addr add dev host-p0 "172.31.1.100/24"])
>> -AT_CHECK([ip link set dev host-p0 up])
>> -AT_CHECK([ip link set p0 netns at_ns0])
>> -AT_CHECK([ip netns exec at_ns0 ip addr add dev p0 "172.31.1.1/24"])
>> -AT_CHECK([ip netns exec at_ns0 ip link set dev p0 up])
>> +AT_CHECK([ip addr add dev br-ovs-p0 "172.31.1.100/24"])
>> +AT_CHECK([ip link set dev br-ovs-p0 up])
>>
>>  dnl Set up remote end of tunnel inside the namespace.
>>  ADD_NATIVE_TUNNEL([vxlan], [at_vxlan1], [at_ns0], [172.31.1.1],
>> [172.31.1.100],
>> @@ -152,5 +150,8 @@ AT_CHECK([cat ping.output | grep "transmitted" | sed
>> 's/time.*ms$/time 0ms/'], [
>>  3 packets transmitted, 3 received, 0% packet loss, time 0ms
>>  ])
>>
>> +AT_CHECK([ip addr del dev br0 "10.1.1.100/24"])
>> +AT_CHECK([ip addr del dev br-ovs-p0 "172.31.1.100/24"])
>> +
>>  OVS_KMOD_VSWITCHD_STOP
>>  AT_CLEANUP
>>
>>
>> I'll leave it up to you, I can also make this change in my next series.
>>
>> Acked-by: Daniele Di Proietto <diproiet...@vmware.com>
>
>This looks like a reasonable change. I'll test it out and roll it in
>with a v2, thanks.

_______________________________________________
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev

Reply via email to