That one is more worrisome. I believe that's an indication that packets are getting dropped on the way to ovs-vswitchd. If you're using the software kernel datapath, do you see the "lost" count going up in "ovs-dpctl show"? Are you only seeing this when you first kick on the netperf tests? What tests are you running?
Ben's working on some additional performance improvements on the userspace classifier, which should help. I'm working on giving each port its own kernel-userspace queue (currently there's a statically defined 16), which should provide better isolation and less contention when there are many ports. --Justin On Dec 19, 2012, at 11:18 PM, Farrukh Aftab Khan <farrukh.k...@xflowresearch.com> wrote: > I was also getting the following warnings: > > Jan 1 00:31:07 (none) daemon.warn ovs-vswitchd: 00017|dpif|WARN|system@br0: > recv failed (No buffer space available) > > > > I looked up some old posts from OVS discuss > (http://www.mail-archive.com/discuss@openvswitch.org/msg03385.html), where > Ben had provided a patch for increasing the buffer space to 1MB to resolve > this issue. It is already 1 MB in OVS-1.7.1. So should I increase it further? > Is this something to be concerned about? Any heads up would be appreciated. > > Regards. > - > Farrukh Aftab Khan > > > On Thu, Dec 20, 2012 at 12:08 PM, Farrukh Aftab Khan > <farrukh.k...@xflowresearch.com> wrote: > Thanks for the explanation Justin. > I have lowered their log levels and I don't these warnings anymore. Thanks > for the help. > > Regards. > - > Farrukh Aftab Khan > xFlow Research Inc. > > > On Wed, Dec 19, 2012 at 10:14 PM, Justin Pettit <jpet...@nicira.com> wrote: > OVS logs these when the CPU usage spikes. That message stating the poll > interval was over 29 times the weighted mean interval triggered the coverage > counters below it. It shouldn't print that again unless there's another > sudden spike in CPU usage that would delay the time through the poll loop. > This was all put in to help diagnose performance issues from a long time ago. > We've talked about removing them or at least lowering their log level. > They're harmless, though. If you really don't want to see them right now, > you could lower the appropriate log levels. > > --Justin > > > On Dec 19, 2012, at 4:17 AM, Farrukh Aftab Khan > <farrukh.k...@xflowresearch.com> wrote: > > > Hello, > > > > I am using OVS-1.7.1 on embedded Linux (kernel-2.6.32.27). I am generating > > traffic at high data rate using 'netperf' and I get the following warnings: > > > > 1970-01-01T00:18:54Z|00029|timeval|WARN|51 ms poll interval (0 ms user, 50 > > ms system) is over 29 times the weighted mean interval 2 ms (2424 samples) > > 1970-01-01T00:18:54Z|00030|timeval|WARN|context switches: 0 voluntary, 1 > > involuntary > > 1970-01-01T00:18:54Z|00031|coverage|INFO|Event coverage (epoch 2424/entire > > run), hash=eb85f2f9: > > 1970-01-01T00:18:54Z|00032|coverage|INFO|ofproto_dpif_xlate 1 / > > 1259 > > 1970-01-01T00:18:54Z|00033|coverage|INFO|hmap_expand 22 / > > 22399 > > 1970-01-01T00:18:54Z|00034|coverage|INFO|netdev_get_stats 12 / > > 2616 > > 1970-01-01T00:18:54Z|00035|coverage|INFO|poll_fd_wait 41 / > > 98932 > > 1970-01-01T00:18:54Z|00036|coverage|INFO|util_xalloc 1157 / > > 899297 > > 1970-01-01T00:18:54Z|00037|coverage|INFO|netlink_received 17 / > > 8725 > > 1970-01-01T00:18:54Z|00038|coverage|INFO|netlink_sent 17 / > > 8529 > > 1970-01-01T00:18:54Z|00039|coverage|INFO|bridge_reconfigure 0 / > > 13 > > 1970-01-01T00:18:54Z|00040|coverage|INFO|ofproto_flush 0 / > > 4 > > 1970-01-01T00:18:54Z|00041|coverage|INFO|ofproto_update_port 0 / > > 32 > > 1970-01-01T00:18:54Z|00042|coverage|INFO|dpif_port_add 0 / > > 8 > > 1970-01-01T00:18:54Z|00043|coverage|INFO|dpif_flow_flush 0 / > > 8 > > 1970-01-01T00:18:54Z|00044|coverage|INFO|dpif_purge 0 / > > 4 > > 1970-01-01T00:18:54Z|00045|coverage|INFO|flow_extract 0 / > > 79 > > 1970-01-01T00:18:54Z|00046|coverage|INFO|hmap_pathological 0 / > > 1 > > 1970-01-01T00:18:54Z|00047|coverage|INFO|mac_learning_learned 0 / > > 14 > > 1970-01-01T00:18:54Z|00048|coverage|INFO|mac_learning_expired 0 / > > 12 > > 1970-01-01T00:18:54Z|00049|coverage|INFO|poll_zero_timeout 0 / > > 32 > > 1970-01-01T00:18:54Z|00050|coverage|INFO|pstream_open 0 / > > 9 > > 1970-01-01T00:18:54Z|00051|coverage|INFO|stream_open 0 / > > 1 > > 1970-01-01T00:18:54Z|00052|coverage|INFO|netdev_set_policing 0 / > > 66 > > 1970-01-01T00:18:54Z|00053|coverage|INFO|netdev_get_ifindex 0 / > > 10 > > 1970-01-01T00:18:54Z|00054|coverage|INFO|netdev_get_hwaddr 0 / > > 9 > > 1970-01-01T00:18:54Z|00055|coverage|INFO|netdev_set_hwaddr 0 / > > 5 > > 1970-01-01T00:18:54Z|00056|coverage|INFO|netdev_ethtool 0 / > > 31 > > 1970-01-01T00:18:54Z|00057|coverage|INFO|nln_changed 0 / > > 64 > > 1970-01-01T00:18:54Z|00058|coverage|INFO|52 events never hit > > > > These warnings are only generated when traffic hits the bridge at a high > > rate. Is it normal for OVS to show these warnings/information messages when > > dealing with high data rate traffic? Is there a way to hide or minimize > > them? > > > > Regards. > > - > > Farrukh Aftab Khan > > > > _______________________________________________ > > discuss mailing list > > discuss@openvswitch.org > > http://openvswitch.org/mailman/listinfo/discuss > > > _______________________________________________ discuss mailing list discuss@openvswitch.org http://openvswitch.org/mailman/listinfo/discuss