-
Notifications
You must be signed in to change notification settings - Fork 580
Fix mux_acl_rule
adding issue
#2356
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
yxieca
merged 1 commit into
sonic-net:master
from
bingwang-ms:fix_ingress_drop_table_creation_error
Jul 8, 2022
Merged
Fix mux_acl_rule
adding issue
#2356
yxieca
merged 1 commit into
sonic-net:master
from
bingwang-ms:fix_ingress_drop_table_creation_error
Jul 8, 2022
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Signed-off-by: bingwang <[email protected]>
/azp run |
Azure Pipelines successfully started running 1 pipeline(s). |
yxieca
approved these changes
Jun 27, 2022
yxieca
pushed a commit
that referenced
this pull request
Jun 28, 2022
What I did This PR is to cherry-pick #2356 to 202205 branch. The cherry-pick is clean, no conflict is found. This PR is to fix the issue of adding mux_acl_rule into IngressTableDrop. The error log is Jun 25 08:02:37.159020 svcstr-7050-acs-4 ERR swss#orchagent: :- validateAclRuleMatch: Match SAI_ACL_ENTRY_ATTR_FIELD_IN_PORTS in rule mux_acl_rule is not supported by table IngressTableDrop PR #2341 added support for different matching field in different stage (INGRESS/EGRESS). For example, SAI_ACL_ENTRY_ATTR_FIELD_IN_PORTS is only supported at INGRESS stage. However, PR #2341 only handled one path for creating ACL table, that is by CONFIG_DB entry. There is a case that addAclTable is directly called from other orch, such as MuxOrch. In that case, the stage dependent matcing field is not added. As a resule, we will see the above error logs. To address the issue, I moved the call of addStageMandatoryMatchFields from doAclTableTask to addAclTable to ensure addStageMandatoryMatchFields is always called. Please be noted that addMandatoryActions is called from both doAclTableTask and addAclTable to ensure the validation of ACL table is passing. Why I did it To fix ACL rule issue for mux. How I verified it Verified by running test_pfcwd Verified by checking syslog Signed-off-by: bingwang <[email protected]>
/azp run |
Azure Pipelines successfully started running 1 pipeline(s). |
preetham-singh
pushed a commit
to preetham-singh/sonic-swss
that referenced
this pull request
Aug 6, 2022
What I did This PR is to fix the issue of adding mux_acl_rule into IngressTableDrop. The error log is Jun 25 08:02:37.159020 svcstr-7050-acs-4 ERR swss#orchagent: :- validateAclRuleMatch: Match SAI_ACL_ENTRY_ATTR_FIELD_IN_PORTS in rule mux_acl_rule is not supported by table IngressTableDrop PR sonic-net#2341 added support for different matching field in different stage (INGRESS/EGRESS). For example, SAI_ACL_ENTRY_ATTR_FIELD_IN_PORTS is only supported at INGRESS stage. However, PR sonic-net#2341 only handled one path for creating ACL table, that is by CONFIG_DB entry. There is a case that addAclTable is directly called from other orch, such as MuxOrch. In that case, the stage dependent matcing field is not added. As a resule, we will see the above error logs. To address the issue, I moved the call of addStageMandatoryMatchFields from doAclTableTask to addAclTable to ensure addStageMandatoryMatchFields is always called. Please be noted that addMandatoryActions is called from both doAclTableTask and addAclTable to ensure the validation of ACL table is passing. Why I did it To fix ACL rule issue for mux. How I verified it Verified by running test_pfcwd Verified by checking syslog Signed-off-by: bingwang <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
What I did
This PR is to fix the issue of adding
mux_acl_rule
intoIngressTableDrop
.The error log is
PR #2341 added support for different matching field in different stage (INGRESS/EGRESS). For example,
SAI_ACL_ENTRY_ATTR_FIELD_IN_PORTS
is only supported atINGRESS
stage.However, PR #2341 only handled one path for creating ACL table, that is by CONFIG_DB entry.
There is a case that
addAclTable
is directly called from otherorch
, such asMuxOrch
. In that case, the stage dependent matcing field is not added. As a resule, we will see the above error logs.To address the issue, I moved the call of
addStageMandatoryMatchFields
fromdoAclTableTask
toaddAclTable
to ensureaddStageMandatoryMatchFields
is always called.Please be noted that
addMandatoryActions
is called from bothdoAclTableTask
andaddAclTable
to ensure the validation of ACL table is passing.Why I did it
To fix ACL rule issue for mux.
How I verified it
test_pfcwd
Details if related