• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

kubeovn / kube-ovn / 21031892891

15 Jan 2026 12:49PM UTC coverage: 22.711% (-0.02%) from 22.73%
21031892891

Pull #6159

github

changluyi
fix enable u2o may cause metallb underlay err

Signed-off-by: clyi <clyi@alauda.io>
Pull Request #6159: add metallb underlay v6 dualcase

0 of 62 new or added lines in 3 files covered. (0.0%)

2 existing lines in 2 files now uncovered.

12193 of 53688 relevant lines covered (22.71%)

0.26 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

0.0
/pkg/daemon/controller_linux.go
1
package daemon
2

3
import (
4
        "errors"
5
        "fmt"
6
        "net"
7
        "os"
8
        "os/exec"
9
        "path/filepath"
10
        "reflect"
11
        "slices"
12
        "strings"
13
        "sync"
14
        "syscall"
15

16
        ovsutil "github.com/digitalocean/go-openvswitch/ovs"
17
        nadv1 "github.com/k8snetworkplumbingwg/network-attachment-definition-client/pkg/apis/k8s.cni.cncf.io/v1"
18
        nadutils "github.com/k8snetworkplumbingwg/network-attachment-definition-client/pkg/utils"
19
        "github.com/kubeovn/felix/ipsets"
20
        "github.com/kubeovn/go-iptables/iptables"
21
        "github.com/vishvananda/netlink"
22
        "golang.org/x/sys/unix"
23
        v1 "k8s.io/api/core/v1"
24
        k8serrors "k8s.io/apimachinery/pkg/api/errors"
25
        "k8s.io/apimachinery/pkg/labels"
26
        utilruntime "k8s.io/apimachinery/pkg/util/runtime"
27
        "k8s.io/client-go/tools/cache"
28
        "k8s.io/klog/v2"
29
        k8sipset "k8s.io/kubernetes/pkg/proxy/ipvs/ipset"
30
        k8siptables "k8s.io/kubernetes/pkg/util/iptables"
31

32
        kubeovnv1 "github.com/kubeovn/kube-ovn/pkg/apis/kubeovn/v1"
33
        "github.com/kubeovn/kube-ovn/pkg/ovs"
34
        "github.com/kubeovn/kube-ovn/pkg/util"
35
)
36

37
const (
38
        kernelModuleIPTables  = "ip_tables"
39
        kernelModuleIP6Tables = "ip6_tables"
40
)
41

42
// ControllerRuntime represents runtime specific controller members
43
type ControllerRuntime struct {
44
        iptables         map[string]*iptables.IPTables
45
        iptablesObsolete map[string]*iptables.IPTables
46
        k8siptables      map[string]k8siptables.Interface
47
        k8sipsets        k8sipset.Interface
48
        ipsets           map[string]*ipsets.IPSets
49
        gwCounters       map[string]*util.GwIPtableCounters
50

51
        nmSyncer  *networkManagerSyncer
52
        ovsClient *ovsutil.Client
53

54
        flowCache      map[string]map[string][]string // key: bridgeName -> flowKey -> flow rules
55
        flowCacheMutex sync.RWMutex
56
        flowChan       chan struct{} // channel to trigger immediate flow sync
57
}
58

59
type LbServiceRules struct {
60
        IP          string
61
        Port        uint16
62
        Protocol    string
63
        BridgeName  string
64
        DstMac      string
65
        UnderlayNic string
66
}
67

68
func evalCommandSymlinks(cmd string) (string, error) {
×
69
        path, err := exec.LookPath(cmd)
×
70
        if err != nil {
×
71
                return "", fmt.Errorf("failed to search for command %q: %w", cmd, err)
×
72
        }
×
73
        file, err := filepath.EvalSymlinks(path)
×
74
        if err != nil {
×
75
                return "", fmt.Errorf("failed to read evaluate symbolic links for file %q: %w", path, err)
×
76
        }
×
77

78
        return file, nil
×
79
}
80

81
func isLegacyIptablesMode() (bool, error) {
×
82
        path, err := evalCommandSymlinks("iptables")
×
83
        if err != nil {
×
84
                return false, err
×
85
        }
×
86
        pathLegacy, err := evalCommandSymlinks("iptables-legacy")
×
87
        if err != nil {
×
88
                return false, err
×
89
        }
×
90
        return path == pathLegacy, nil
×
91
}
92

93
func (c *Controller) initRuntime() error {
×
94
        ok, err := isLegacyIptablesMode()
×
95
        if err != nil {
×
96
                klog.Errorf("failed to check iptables mode: %v", err)
×
97
                return err
×
98
        }
×
99
        if !ok {
×
100
                // iptables works in nft mode, we should migrate iptables rules
×
101
                c.iptablesObsolete = make(map[string]*iptables.IPTables, 2)
×
102
        }
×
103

104
        c.iptables = make(map[string]*iptables.IPTables)
×
105
        c.ipsets = make(map[string]*ipsets.IPSets)
×
106
        c.gwCounters = make(map[string]*util.GwIPtableCounters)
×
107
        c.k8siptables = make(map[string]k8siptables.Interface)
×
108
        c.k8sipsets = k8sipset.New()
×
109
        c.ovsClient = ovsutil.New()
×
110

×
111
        // Initialize OpenFlow flow cache (ovn-kubernetes style)
×
112
        c.flowCache = make(map[string]map[string][]string)
×
113
        c.flowChan = make(chan struct{}, 1)
×
114

×
115
        if c.protocol == kubeovnv1.ProtocolIPv4 || c.protocol == kubeovnv1.ProtocolDual {
×
116
                ipt, err := iptables.NewWithProtocol(iptables.ProtocolIPv4)
×
117
                if err != nil {
×
118
                        klog.Error(err)
×
119
                        return err
×
120
                }
×
121
                c.iptables[kubeovnv1.ProtocolIPv4] = ipt
×
122
                if c.iptablesObsolete != nil {
×
123
                        ok, err := kernelModuleLoaded(kernelModuleIPTables)
×
124
                        if err != nil {
×
125
                                klog.Errorf("failed to check kernel module %s: %v", kernelModuleIPTables, err)
×
126
                        }
×
127
                        if ok {
×
128
                                if ipt, err = iptables.NewWithProtocolAndMode(iptables.ProtocolIPv4, "legacy"); err != nil {
×
129
                                        klog.Error(err)
×
130
                                        return err
×
131
                                }
×
132
                                c.iptablesObsolete[kubeovnv1.ProtocolIPv4] = ipt
×
133
                        }
134
                }
135
                c.ipsets[kubeovnv1.ProtocolIPv4] = ipsets.NewIPSets(ipsets.NewIPVersionConfig(ipsets.IPFamilyV4, IPSetPrefix, nil, nil))
×
136
                c.k8siptables[kubeovnv1.ProtocolIPv4] = k8siptables.New(k8siptables.ProtocolIPv4)
×
137
        }
138
        if c.protocol == kubeovnv1.ProtocolIPv6 || c.protocol == kubeovnv1.ProtocolDual {
×
139
                ipt, err := iptables.NewWithProtocol(iptables.ProtocolIPv6)
×
140
                if err != nil {
×
141
                        klog.Error(err)
×
142
                        return err
×
143
                }
×
144
                c.iptables[kubeovnv1.ProtocolIPv6] = ipt
×
145
                if c.iptablesObsolete != nil {
×
146
                        ok, err := kernelModuleLoaded(kernelModuleIP6Tables)
×
147
                        if err != nil {
×
148
                                klog.Errorf("failed to check kernel module %s: %v", kernelModuleIP6Tables, err)
×
149
                        }
×
150
                        if ok {
×
151
                                if ipt, err = iptables.NewWithProtocolAndMode(iptables.ProtocolIPv6, "legacy"); err != nil {
×
152
                                        klog.Error(err)
×
153
                                        return err
×
154
                                }
×
155
                                c.iptablesObsolete[kubeovnv1.ProtocolIPv6] = ipt
×
156
                        }
157
                }
158
                c.ipsets[kubeovnv1.ProtocolIPv6] = ipsets.NewIPSets(ipsets.NewIPVersionConfig(ipsets.IPFamilyV6, IPSetPrefix, nil, nil))
×
159
                c.k8siptables[kubeovnv1.ProtocolIPv6] = k8siptables.New(k8siptables.ProtocolIPv6)
×
160
        }
161

162
        if err = ovs.ClearU2OFlows(c.ovsClient); err != nil {
×
163
                util.LogFatalAndExit(err, "failed to clear obsolete u2o flows")
×
164
        }
×
165

166
        c.nmSyncer = newNetworkManagerSyncer()
×
167
        c.nmSyncer.Run(c.transferAddrsAndRoutes)
×
168

×
169
        return nil
×
170
}
171

172
func (c *Controller) handleEnableExternalLBAddressChange(oldSubnet, newSubnet *kubeovnv1.Subnet) error {
×
173
        var subnetName string
×
174
        var action string
×
175

×
176
        switch {
×
177
        case oldSubnet != nil && newSubnet != nil:
×
178
                subnetName = oldSubnet.Name
×
179
                if oldSubnet.Spec.EnableExternalLBAddress != newSubnet.Spec.EnableExternalLBAddress {
×
180
                        klog.Infof("EnableExternalLBAddress changed for subnet %s", newSubnet.Name)
×
181
                        if newSubnet.Spec.EnableExternalLBAddress {
×
182
                                action = "add"
×
183
                        } else {
×
184
                                action = "remove"
×
185
                        }
×
186
                }
187
        case oldSubnet != nil:
×
188
                subnetName = oldSubnet.Name
×
189
                if oldSubnet.Spec.EnableExternalLBAddress {
×
190
                        klog.Infof("EnableExternalLBAddress removed for subnet %s", oldSubnet.Name)
×
191
                        action = "remove"
×
192
                }
×
193
        case newSubnet != nil:
×
194
                subnetName = newSubnet.Name
×
195
                if newSubnet.Spec.EnableExternalLBAddress {
×
196
                        klog.Infof("EnableExternalLBAddress added for subnet %s", newSubnet.Name)
×
197
                        action = "add"
×
198
                }
×
199
        }
200

201
        if action != "" {
×
202
                services, err := c.servicesLister.List(labels.Everything())
×
203
                if err != nil {
×
204
                        klog.Errorf("failed to list services: %v", err)
×
205
                        return err
×
206
                }
×
207

208
                for _, svc := range services {
×
209
                        if svc.Annotations[util.ServiceExternalIPFromSubnetAnnotation] == subnetName {
×
210
                                klog.Infof("Service %s/%s has external LB address pool annotation from subnet %s, action: %s", svc.Namespace, svc.Name, subnetName, action)
×
211
                                switch action {
×
212
                                case "add":
×
213
                                        c.serviceQueue.Add(&serviceEvent{newObj: svc})
×
214
                                case "remove":
×
215
                                        c.serviceQueue.Add(&serviceEvent{oldObj: svc})
×
216
                                }
217
                        }
218
                }
219
        }
220
        return nil
×
221
}
222

223
// handleU2OInterconnectionMACChange handles U2O interconnection MAC address changes.
224
// When U2O (Underlay to Overlay) interconnection is enabled, the svc local flow's destination
225
// MAC must point to the LRP (Logical Router Port) MAC. Otherwise, without U2O enabled (no LRP exists),
226
// the flow would hit the rules created by build_lswitch_dnat_mod_dl_dst_rules instead.
NEW
227
func (c *Controller) handleU2OInterconnectionMACChange(oldSubnet, newSubnet *kubeovnv1.Subnet) error {
×
NEW
228
        if oldSubnet == nil || newSubnet == nil {
×
NEW
229
                return nil
×
NEW
230
        }
×
231

NEW
232
        oldMAC := oldSubnet.Status.U2OInterconnectionMAC
×
NEW
233
        newMAC := newSubnet.Status.U2OInterconnectionMAC
×
NEW
234

×
NEW
235
        if oldMAC == newMAC {
×
NEW
236
                return nil
×
NEW
237
        }
×
238

NEW
239
        if newMAC == "" && oldMAC == "" {
×
NEW
240
                return nil
×
NEW
241
        }
×
242

NEW
243
        klog.Infof("U2OInterconnectionMAC changed for subnet %s: %s -> %s",
×
NEW
244
                oldSubnet.Name, oldMAC, newMAC)
×
NEW
245

×
NEW
246
        // Find all services using this subnet and re-sync them
×
NEW
247
        services, err := c.servicesLister.List(labels.Everything())
×
NEW
248
        if err != nil {
×
NEW
249
                klog.Errorf("failed to list services: %v", err)
×
NEW
250
                return err
×
NEW
251
        }
×
252

NEW
253
        for _, svc := range services {
×
NEW
254
                if svc.Annotations[util.ServiceExternalIPFromSubnetAnnotation] == oldSubnet.Name {
×
NEW
255
                        klog.Infof("Re-syncing service %s/%s due to U2OInterconnectionMAC change in subnet %s",
×
NEW
256
                                svc.Namespace, svc.Name, oldSubnet.Name)
×
NEW
257
                        c.serviceQueue.Add(&serviceEvent{newObj: svc})
×
NEW
258
                }
×
259
        }
NEW
260
        return nil
×
261
}
262

263
func (c *Controller) reconcileRouters(event *subnetEvent) error {
×
264
        subnets, err := c.subnetsLister.List(labels.Everything())
×
265
        if err != nil {
×
266
                klog.Errorf("failed to list subnets %v", err)
×
267
                return err
×
268
        }
×
269

270
        if event != nil {
×
271
                var ok bool
×
272
                var oldSubnet, newSubnet *kubeovnv1.Subnet
×
273
                if event.oldObj != nil {
×
274
                        if oldSubnet, ok = event.oldObj.(*kubeovnv1.Subnet); !ok {
×
275
                                klog.Errorf("expected old subnet in subnetEvent but got %#v", event.oldObj)
×
276
                                return nil
×
277
                        }
×
278
                }
279
                if event.newObj != nil {
×
280
                        if newSubnet, ok = event.newObj.(*kubeovnv1.Subnet); !ok {
×
281
                                klog.Errorf("expected new subnet in subnetEvent but got %#v", event.newObj)
×
282
                                return nil
×
283
                        }
×
284
                }
285

286
                if err = c.handleEnableExternalLBAddressChange(oldSubnet, newSubnet); err != nil {
×
287
                        klog.Errorf("failed to handle enable external lb address change: %v", err)
×
288
                        return err
×
289
                }
×
290

NEW
291
                if err = c.handleU2OInterconnectionMACChange(oldSubnet, newSubnet); err != nil {
×
NEW
292
                        klog.Errorf("failed to handle u2o interconnection mac change: %v", err)
×
NEW
293
                        return err
×
NEW
294
                }
×
295
                // handle policy routing
296
                rulesToAdd, rulesToDel, routesToAdd, routesToDel, err := c.diffPolicyRouting(oldSubnet, newSubnet)
×
297
                if err != nil {
×
298
                        klog.Errorf("failed to get policy routing difference: %v", err)
×
299
                        return err
×
300
                }
×
301
                // add new routes first
302
                for _, r := range routesToAdd {
×
303
                        if err = netlink.RouteReplace(&r); err != nil && !errors.Is(err, syscall.EEXIST) {
×
304
                                klog.Errorf("failed to replace route for subnet %s: %v", newSubnet.Name, err)
×
305
                                return err
×
306
                        }
×
307
                }
308
                // next, add new rules
309
                for _, r := range rulesToAdd {
×
310
                        if err = netlink.RuleAdd(&r); err != nil && !errors.Is(err, syscall.EEXIST) {
×
311
                                klog.Errorf("failed to add network rule for subnet %s: %v", newSubnet.Name, err)
×
312
                                return err
×
313
                        }
×
314
                }
315
                // then delete old network rules
316
                for _, r := range rulesToDel {
×
317
                        // loop to delete all matched rules
×
318
                        for {
×
319
                                if err = netlink.RuleDel(&r); err != nil {
×
320
                                        if !errors.Is(err, syscall.ENOENT) {
×
321
                                                klog.Errorf("failed to delete network rule for subnet %s: %v", oldSubnet.Name, err)
×
322
                                                return err
×
323
                                        }
×
324
                                        break
×
325
                                }
326
                        }
327
                }
328
                // last, delete old network routes
329
                for _, r := range routesToDel {
×
330
                        if err = netlink.RouteDel(&r); err != nil && !errors.Is(err, syscall.ENOENT) {
×
331
                                klog.Errorf("failed to delete route for subnet %s: %v", oldSubnet.Name, err)
×
332
                                return err
×
333
                        }
×
334
                }
335
        }
336

337
        node, err := c.nodesLister.Get(c.config.NodeName)
×
338
        if err != nil {
×
339
                klog.Errorf("failed to get node %s %v", c.config.NodeName, err)
×
340
                return err
×
341
        }
×
342
        nodeIPv4, nodeIPv6 := util.GetNodeInternalIP(*node)
×
343
        var joinIPv4, joinIPv6 string
×
344
        if len(node.Annotations) != 0 {
×
345
                joinIPv4, joinIPv6 = util.SplitStringIP(node.Annotations[util.IPAddressAnnotation])
×
346
        }
×
347

348
        joinCIDR := make([]string, 0, 2)
×
349
        cidrs := make([]string, 0, len(subnets)*2)
×
350
        for _, subnet := range subnets {
×
351
                // The route for overlay subnet cidr via ovn0 should not be deleted even though subnet.Status has changed to not ready
×
352
                if subnet.Spec.Vpc != c.config.ClusterRouter ||
×
353
                        (subnet.Spec.Vlan != "" && !subnet.Spec.LogicalGateway && (!subnet.Spec.U2OInterconnection || (subnet.Spec.EnableLb != nil && *subnet.Spec.EnableLb))) ||
×
354
                        !subnet.Status.IsValidated() {
×
355
                        continue
×
356
                }
357

358
                for cidrBlock := range strings.SplitSeq(subnet.Spec.CIDRBlock, ",") {
×
359
                        if _, ipNet, err := net.ParseCIDR(cidrBlock); err != nil {
×
360
                                klog.Errorf("%s is not a valid cidr block", cidrBlock)
×
361
                        } else {
×
362
                                if nodeIPv4 != "" && util.CIDRContainIP(cidrBlock, nodeIPv4) {
×
363
                                        continue
×
364
                                }
365
                                if nodeIPv6 != "" && util.CIDRContainIP(cidrBlock, nodeIPv6) {
×
366
                                        continue
×
367
                                }
368
                                cidrs = append(cidrs, ipNet.String())
×
369
                                if subnet.Name == c.config.NodeSwitch {
×
370
                                        joinCIDR = append(joinCIDR, ipNet.String())
×
371
                                }
×
372
                        }
373
                }
374
        }
375

376
        gateway, ok := node.Annotations[util.GatewayAnnotation]
×
377
        if !ok {
×
378
                err = fmt.Errorf("gateway annotation for node %s does not exist", node.Name)
×
379
                klog.Error(err)
×
380
                return err
×
381
        }
×
382
        nic, err := netlink.LinkByName(util.NodeNic)
×
383
        if err != nil {
×
384
                klog.Errorf("failed to get nic %s", util.NodeNic)
×
385
                return fmt.Errorf("failed to get nic %s", util.NodeNic)
×
386
        }
×
387

388
        allRoutes, err := getNicExistRoutes(nil, gateway)
×
389
        if err != nil {
×
390
                klog.Error(err)
×
391
                return err
×
392
        }
×
393
        nodeNicRoutes, err := getNicExistRoutes(nic, gateway)
×
394
        if err != nil {
×
395
                klog.Error(err)
×
396
                return err
×
397
        }
×
398
        toAdd, toDel := routeDiff(nodeNicRoutes, allRoutes, cidrs, joinCIDR, joinIPv4, joinIPv6, gateway, net.ParseIP(nodeIPv4), net.ParseIP(nodeIPv6))
×
399
        for _, r := range toDel {
×
400
                if err = netlink.RouteDel(&netlink.Route{Dst: r.Dst}); err != nil {
×
401
                        klog.Errorf("failed to del route %v", err)
×
402
                }
×
403
        }
404

405
        for _, r := range toAdd {
×
406
                r.LinkIndex = nic.Attrs().Index
×
407
                if err = netlink.RouteReplace(&r); err != nil {
×
408
                        klog.Errorf("failed to replace route %v: %v", r, err)
×
409
                }
×
410
        }
411

412
        return nil
×
413
}
414

NEW
415
func genLBServiceRules(service *v1.Service, bridgeName, underlayNic, dstMac string) []LbServiceRules {
×
416
        var lbServiceRules []LbServiceRules
×
417
        for _, ingress := range service.Status.LoadBalancer.Ingress {
×
418
                for _, port := range service.Spec.Ports {
×
419
                        lbServiceRules = append(lbServiceRules, LbServiceRules{
×
420
                                IP:          ingress.IP,
×
421
                                Port:        uint16(port.Port), // #nosec G115
×
422
                                Protocol:    string(port.Protocol),
×
NEW
423
                                DstMac:      dstMac,
×
424
                                UnderlayNic: underlayNic,
×
425
                                BridgeName:  bridgeName,
×
426
                        })
×
427
                }
×
428
        }
429
        return lbServiceRules
×
430
}
431

432
func (c *Controller) diffExternalLBServiceRules(oldService, newService *v1.Service, isSubnetExternalLBEnabled bool) (lbServiceRulesToAdd, lbServiceRulesToDel []LbServiceRules, err error) {
×
433
        var oldlbServiceRules, newlbServiceRules []LbServiceRules
×
434

×
435
        if oldService != nil && oldService.Annotations[util.ServiceExternalIPFromSubnetAnnotation] != "" {
×
NEW
436
                oldBridgeName, underlayNic, dstMac, err := c.getExtInfoBySubnet(oldService.Annotations[util.ServiceExternalIPFromSubnetAnnotation])
×
437
                if err != nil {
×
438
                        klog.Errorf("failed to get provider network by subnet %s: %v", oldService.Annotations[util.ServiceExternalIPFromSubnetAnnotation], err)
×
439
                        return nil, nil, err
×
440
                }
×
441

NEW
442
                oldlbServiceRules = genLBServiceRules(oldService, oldBridgeName, underlayNic, dstMac)
×
443
        }
444

445
        if isSubnetExternalLBEnabled && newService != nil && newService.Annotations[util.ServiceExternalIPFromSubnetAnnotation] != "" {
×
NEW
446
                newBridgeName, underlayNic, dstMac, err := c.getExtInfoBySubnet(newService.Annotations[util.ServiceExternalIPFromSubnetAnnotation])
×
447
                if err != nil {
×
448
                        klog.Errorf("failed to get provider network by subnet %s: %v", newService.Annotations[util.ServiceExternalIPFromSubnetAnnotation], err)
×
449
                        return nil, nil, err
×
450
                }
×
NEW
451
                newlbServiceRules = genLBServiceRules(newService, newBridgeName, underlayNic, dstMac)
×
452
        }
453

454
        for _, oldRule := range oldlbServiceRules {
×
455
                found := slices.Contains(newlbServiceRules, oldRule)
×
456
                if !found {
×
457
                        lbServiceRulesToDel = append(lbServiceRulesToDel, oldRule)
×
458
                }
×
459
        }
460

461
        for _, newRule := range newlbServiceRules {
×
462
                found := slices.Contains(oldlbServiceRules, newRule)
×
463
                if !found {
×
464
                        lbServiceRulesToAdd = append(lbServiceRulesToAdd, newRule)
×
465
                }
×
466
        }
467

468
        return lbServiceRulesToAdd, lbServiceRulesToDel, nil
×
469
}
470

NEW
471
func (c *Controller) getExtInfoBySubnet(subnetName string) (string, string, string, error) {
×
472
        subnet, err := c.subnetsLister.Get(subnetName)
×
473
        if err != nil {
×
474
                klog.Errorf("failed to get subnet %s: %v", subnetName, err)
×
NEW
475
                return "", "", "", err
×
NEW
476
        }
×
477

NEW
478
        dstMac := subnet.Status.U2OInterconnectionMAC
×
NEW
479
        if dstMac == "" {
×
NEW
480
                dstMac = util.MasqueradeExternalLBAccessMac
×
NEW
481
                klog.Infof("Subnet %s has no U2OInterconnectionMAC, using default MAC %s", subnetName, dstMac)
×
NEW
482
        } else {
×
NEW
483
                klog.Infof("Using U2OInterconnectionMAC %s for subnet %s", dstMac, subnetName)
×
UNCOV
484
        }
×
485

486
        vlanName := subnet.Spec.Vlan
×
487
        if vlanName == "" {
×
NEW
488
                return "", "", "", errors.New("vlan not specified in subnet")
×
489
        }
×
490

491
        vlan, err := c.vlansLister.Get(vlanName)
×
492
        if err != nil {
×
493
                klog.Errorf("failed to get vlan %s: %v", vlanName, err)
×
NEW
494
                return "", "", "", err
×
495
        }
×
496

497
        providerNetworkName := vlan.Spec.Provider
×
498
        if providerNetworkName == "" {
×
NEW
499
                return "", "", "", errors.New("provider network not specified in vlan")
×
500
        }
×
501

502
        pn, err := c.providerNetworksLister.Get(providerNetworkName)
×
503
        if err != nil {
×
504
                klog.Errorf("failed to get provider network %s: %v", providerNetworkName, err)
×
NEW
505
                return "", "", "", err
×
506
        }
×
507

508
        underlayNic := pn.Spec.DefaultInterface
×
509
        for _, item := range pn.Spec.CustomInterfaces {
×
510
                if slices.Contains(item.Nodes, c.config.NodeName) {
×
511
                        underlayNic = item.Interface
×
512
                        break
×
513
                }
514
        }
NEW
515
        bridgeName := util.ExternalBridgeName(providerNetworkName)
×
NEW
516
        klog.Infof("Provider network: %s, Underlay NIC: %s, DstMac: %s", providerNetworkName, underlayNic, dstMac)
×
NEW
517
        return bridgeName, underlayNic, dstMac, nil
×
518
}
519

520
func (c *Controller) reconcileServices(event *serviceEvent) error {
×
521
        if event == nil {
×
522
                return nil
×
523
        }
×
524
        var ok bool
×
525
        var oldService, newService *v1.Service
×
526
        if event.oldObj != nil {
×
527
                if oldService, ok = event.oldObj.(*v1.Service); !ok {
×
528
                        klog.Errorf("expected old service in serviceEvent but got %#v", event.oldObj)
×
529
                        return nil
×
530
                }
×
531
        }
532

533
        if event.newObj != nil {
×
534
                if newService, ok = event.newObj.(*v1.Service); !ok {
×
535
                        klog.Errorf("expected new service in serviceEvent but got %#v", event.newObj)
×
536
                        return nil
×
537
                }
×
538
        }
539

540
        // check is the lb service IP related subnet's EnableExternalLBAddress
541
        isSubnetExternalLBEnabled := false
×
542
        if newService != nil && newService.Annotations[util.ServiceExternalIPFromSubnetAnnotation] != "" {
×
543
                subnet, err := c.subnetsLister.Get(newService.Annotations[util.ServiceExternalIPFromSubnetAnnotation])
×
544
                if err != nil {
×
545
                        klog.Errorf("failed to get subnet %s: %v", newService.Annotations[util.ServiceExternalIPFromSubnetAnnotation], err)
×
546
                        return err
×
547
                }
×
548
                isSubnetExternalLBEnabled = subnet.Spec.EnableExternalLBAddress
×
549
        }
550

551
        lbServiceRulesToAdd, lbServiceRulesToDel, err := c.diffExternalLBServiceRules(oldService, newService, isSubnetExternalLBEnabled)
×
552
        if err != nil {
×
553
                klog.Errorf("failed to get ip port difference: %v", err)
×
554
                return err
×
555
        }
×
556

557
        if len(lbServiceRulesToAdd) > 0 {
×
558
                for _, rule := range lbServiceRulesToAdd {
×
559
                        klog.Infof("Adding LB service rule: %+v", rule)
×
560
                        if err := c.AddOrUpdateUnderlaySubnetSvcLocalFlowCache(rule.IP, rule.Port, rule.Protocol, rule.DstMac, rule.UnderlayNic, rule.BridgeName); err != nil {
×
561
                                klog.Errorf("failed to update underlay subnet svc local openflow cache: %v", err)
×
562
                                return err
×
563
                        }
×
564
                }
565
        }
566

567
        if len(lbServiceRulesToDel) > 0 {
×
568
                for _, rule := range lbServiceRulesToDel {
×
569
                        klog.Infof("Delete LB service rule: %+v", rule)
×
570
                        c.deleteUnderlaySubnetSvcLocalFlowCache(rule.BridgeName, rule.IP, rule.Port, rule.Protocol)
×
571
                }
×
572
        }
573

574
        return nil
×
575
}
576

577
func getNicExistRoutes(nic netlink.Link, gateway string) ([]netlink.Route, error) {
×
578
        var routes, existRoutes []netlink.Route
×
579
        var err error
×
580
        for gw := range strings.SplitSeq(gateway, ",") {
×
581
                if util.CheckProtocol(gw) == kubeovnv1.ProtocolIPv4 {
×
582
                        routes, err = netlink.RouteList(nic, netlink.FAMILY_V4)
×
583
                } else {
×
584
                        routes, err = netlink.RouteList(nic, netlink.FAMILY_V6)
×
585
                }
×
586
                if err != nil {
×
587
                        return nil, err
×
588
                }
×
589
                existRoutes = append(existRoutes, routes...)
×
590
        }
591
        return existRoutes, nil
×
592
}
593

594
func routeDiff(nodeNicRoutes, allRoutes []netlink.Route, cidrs, joinCIDR []string, joinIPv4, joinIPv6, gateway string, srcIPv4, srcIPv6 net.IP) (toAdd, toDel []netlink.Route) {
×
595
        // joinIPv6 is not used for now
×
596
        _ = joinIPv6
×
597

×
598
        for _, route := range nodeNicRoutes {
×
599
                if route.Scope == netlink.SCOPE_LINK || route.Dst == nil || route.Dst.IP.IsLinkLocalUnicast() {
×
600
                        continue
×
601
                }
602

603
                found := slices.Contains(cidrs, route.Dst.String())
×
604
                if !found {
×
605
                        toDel = append(toDel, route)
×
606
                }
×
607
                conflict := false
×
608
                for _, ar := range allRoutes {
×
609
                        if ar.Dst != nil && ar.Dst.String() == route.Dst.String() && ar.LinkIndex != route.LinkIndex {
×
610
                                // route conflict
×
611
                                conflict = true
×
612
                                break
×
613
                        }
614
                }
615
                if conflict {
×
616
                        toDel = append(toDel, route)
×
617
                }
×
618
        }
619
        if len(toDel) > 0 {
×
620
                klog.Infof("routes to delete: %v", toDel)
×
621
        }
×
622

623
        ipv4, ipv6 := util.SplitStringIP(gateway)
×
624
        gwV4, gwV6 := net.ParseIP(ipv4), net.ParseIP(ipv6)
×
625
        for _, c := range cidrs {
×
626
                var src, gw net.IP
×
627
                switch util.CheckProtocol(c) {
×
628
                case kubeovnv1.ProtocolIPv4:
×
629
                        src, gw = srcIPv4, gwV4
×
630
                case kubeovnv1.ProtocolIPv6:
×
631
                        src, gw = srcIPv6, gwV6
×
632
                }
633

634
                found := false
×
635
                for _, ar := range allRoutes {
×
636
                        if ar.Dst != nil && ar.Dst.String() == c {
×
637
                                if slices.Contains(joinCIDR, c) {
×
638
                                        // Only compare Dst for join subnets
×
639
                                        found = true
×
640
                                        klog.V(3).Infof("[routeDiff] joinCIDR route already exists in allRoutes: %v", ar)
×
641
                                        break
×
642
                                } else if (ar.Src == nil && src == nil) || (ar.Src != nil && src != nil && ar.Src.Equal(src)) {
×
643
                                        // For non-join subnets, both Dst and Src must be the same
×
644
                                        found = true
×
645
                                        klog.V(3).Infof("[routeDiff] route already exists in allRoutes: %v", ar)
×
646
                                        break
×
647
                                }
648
                        }
649
                }
650
                if found {
×
651
                        continue
×
652
                }
653
                for _, r := range nodeNicRoutes {
×
654
                        if r.Dst == nil || r.Dst.String() != c {
×
655
                                continue
×
656
                        }
657
                        if (src == nil && r.Src == nil) || (src != nil && r.Src != nil && src.Equal(r.Src)) {
×
658
                                found = true
×
659
                                break
×
660
                        }
661
                }
662
                if !found {
×
663
                        var priority int
×
664
                        scope := netlink.SCOPE_UNIVERSE
×
665
                        proto := netlink.RouteProtocol(syscall.RTPROT_STATIC)
×
666
                        if slices.Contains(joinCIDR, c) {
×
667
                                if util.CheckProtocol(c) == kubeovnv1.ProtocolIPv4 {
×
668
                                        src = net.ParseIP(joinIPv4)
×
669
                                } else {
×
670
                                        src, priority = nil, 256
×
671
                                }
×
672
                                gw, scope = nil, netlink.SCOPE_LINK
×
673
                                proto = netlink.RouteProtocol(unix.RTPROT_KERNEL)
×
674
                        }
675
                        _, cidr, _ := net.ParseCIDR(c)
×
676
                        toAdd = append(toAdd, netlink.Route{
×
677
                                Dst:      cidr,
×
678
                                Src:      src,
×
679
                                Gw:       gw,
×
680
                                Protocol: proto,
×
681
                                Scope:    scope,
×
682
                                Priority: priority,
×
683
                        })
×
684
                }
685
        }
686
        if len(toAdd) > 0 {
×
687
                klog.Infof("routes to add: %v", toAdd)
×
688
        }
×
689
        return toAdd, toDel
×
690
}
691

692
func getRulesToAdd(oldRules, newRules []netlink.Rule) []netlink.Rule {
×
693
        var toAdd []netlink.Rule
×
694

×
695
        for _, rule := range newRules {
×
696
                var found bool
×
697
                for _, r := range oldRules {
×
698
                        if r.Family == rule.Family && r.Priority == rule.Priority && r.Table == rule.Table && reflect.DeepEqual(r.Src, rule.Src) {
×
699
                                found = true
×
700
                                break
×
701
                        }
702
                }
703
                if !found {
×
704
                        toAdd = append(toAdd, rule)
×
705
                }
×
706
        }
707

708
        return toAdd
×
709
}
710

711
func getRoutesToAdd(oldRoutes, newRoutes []netlink.Route) []netlink.Route {
×
712
        var toAdd []netlink.Route
×
713

×
714
        for _, route := range newRoutes {
×
715
                var found bool
×
716
                for _, r := range oldRoutes {
×
717
                        if r.Equal(route) {
×
718
                                found = true
×
719
                                break
×
720
                        }
721
                }
722
                if !found {
×
723
                        toAdd = append(toAdd, route)
×
724
                }
×
725
        }
726

727
        return toAdd
×
728
}
729

730
func (c *Controller) diffPolicyRouting(oldSubnet, newSubnet *kubeovnv1.Subnet) (rulesToAdd, rulesToDel []netlink.Rule, routesToAdd, routesToDel []netlink.Route, err error) {
×
731
        oldRules, oldRoutes, err := c.getPolicyRouting(oldSubnet)
×
732
        if err != nil {
×
733
                klog.Error(err)
×
734
                return rulesToAdd, rulesToDel, routesToAdd, routesToDel, err
×
735
        }
×
736
        newRules, newRoutes, err := c.getPolicyRouting(newSubnet)
×
737
        if err != nil {
×
738
                klog.Error(err)
×
739
                return rulesToAdd, rulesToDel, routesToAdd, routesToDel, err
×
740
        }
×
741

742
        rulesToAdd = getRulesToAdd(oldRules, newRules)
×
743
        rulesToDel = getRulesToAdd(newRules, oldRules)
×
744
        routesToAdd = getRoutesToAdd(oldRoutes, newRoutes)
×
745
        routesToDel = getRoutesToAdd(newRoutes, oldRoutes)
×
746

×
747
        return rulesToAdd, rulesToDel, routesToAdd, routesToDel, err
×
748
}
749

750
func (c *Controller) getPolicyRouting(subnet *kubeovnv1.Subnet) ([]netlink.Rule, []netlink.Route, error) {
×
751
        if subnet == nil || subnet.Spec.ExternalEgressGateway == "" || subnet.Spec.Vpc != c.config.ClusterRouter {
×
752
                return nil, nil, nil
×
753
        }
×
754
        if subnet.Spec.GatewayType == kubeovnv1.GWCentralizedType {
×
755
                node, err := c.nodesLister.Get(c.config.NodeName)
×
756
                if err != nil {
×
757
                        klog.Errorf("failed to get node %s: %v", c.config.NodeName, err)
×
758
                        return nil, nil, err
×
759
                }
×
760
                isGatewayNode := util.GatewayContains(subnet.Spec.GatewayNode, c.config.NodeName) ||
×
761
                        (subnet.Spec.GatewayNode == "" && util.MatchLabelSelectors(subnet.Spec.GatewayNodeSelectors, node.Labels))
×
762
                if !isGatewayNode {
×
763
                        return nil, nil, nil
×
764
                }
×
765
        }
766

767
        protocols := make([]string, 1, 2)
×
768
        if protocol := util.CheckProtocol(subnet.Spec.ExternalEgressGateway); protocol == kubeovnv1.ProtocolDual {
×
769
                protocols[0] = kubeovnv1.ProtocolIPv4
×
770
                protocols = append(protocols, kubeovnv1.ProtocolIPv6)
×
771
        } else {
×
772
                protocols[0] = protocol
×
773
        }
×
774

775
        cidr := strings.Split(subnet.Spec.CIDRBlock, ",")
×
776
        egw := strings.Split(subnet.Spec.ExternalEgressGateway, ",")
×
777

×
778
        // rules
×
779
        var rules []netlink.Rule
×
780
        rule := netlink.NewRule()
×
781
        rule.Table = int(subnet.Spec.PolicyRoutingTableID)
×
782
        rule.Priority = int(subnet.Spec.PolicyRoutingPriority)
×
783
        if subnet.Spec.GatewayType == kubeovnv1.GWDistributedType {
×
784
                pods, err := c.podsLister.List(labels.Everything())
×
785
                if err != nil {
×
786
                        klog.Errorf("list pods failed, %+v", err)
×
787
                        return nil, nil, err
×
788
                }
×
789

790
                for _, pod := range pods {
×
791
                        if pod.Status.PodIP == "" ||
×
792
                                pod.Annotations[util.LogicalSwitchAnnotation] != subnet.Name {
×
793
                                continue
×
794
                        }
795

796
                        for i := range protocols {
×
797
                                rule.Family, _ = util.ProtocolToFamily(protocols[i])
×
798

×
799
                                var ip net.IP
×
800
                                var maskBits int
×
801
                                if len(pod.Status.PodIPs) == 2 && protocols[i] == kubeovnv1.ProtocolIPv6 {
×
802
                                        ip = net.ParseIP(pod.Status.PodIPs[1].IP)
×
803
                                        maskBits = 128
×
804
                                } else if util.CheckProtocol(pod.Status.PodIP) == protocols[i] {
×
805
                                        ip = net.ParseIP(pod.Status.PodIP)
×
806
                                        maskBits = 32
×
807
                                        if rule.Family == netlink.FAMILY_V6 {
×
808
                                                maskBits = 128
×
809
                                        }
×
810
                                }
811

812
                                rule.Src = &net.IPNet{IP: ip, Mask: net.CIDRMask(maskBits, maskBits)}
×
813
                                rules = append(rules, *rule)
×
814
                        }
815
                }
816
        } else {
×
817
                for i := range protocols {
×
818
                        rule.Family, _ = util.ProtocolToFamily(protocols[i])
×
819
                        if len(cidr) == len(protocols) {
×
820
                                _, rule.Src, _ = net.ParseCIDR(cidr[i])
×
821
                        }
×
822
                        rules = append(rules, *rule)
×
823
                }
824
        }
825

826
        // routes
827
        var routes []netlink.Route
×
828
        for i := range protocols {
×
829
                routes = append(routes, netlink.Route{
×
830
                        Protocol: netlink.RouteProtocol(syscall.RTPROT_STATIC),
×
831
                        Table:    int(subnet.Spec.PolicyRoutingTableID),
×
832
                        Gw:       net.ParseIP(egw[i]),
×
833
                })
×
834
        }
×
835

836
        return rules, routes, nil
×
837
}
838

839
func (c *Controller) handleUpdatePod(key string) error {
×
840
        namespace, name, err := cache.SplitMetaNamespaceKey(key)
×
841
        if err != nil {
×
842
                utilruntime.HandleError(fmt.Errorf("invalid resource key: %s", key))
×
843
                return nil
×
844
        }
×
845
        klog.Infof("handle qos update for pod %s/%s", namespace, name)
×
846

×
847
        pod, err := c.podsLister.Pods(namespace).Get(name)
×
848
        if err != nil {
×
849
                if k8serrors.IsNotFound(err) {
×
850
                        return nil
×
851
                }
×
852
                klog.Error(err)
×
853
                return err
×
854
        }
855

856
        if err := util.ValidatePodNetwork(pod.Annotations); err != nil {
×
857
                klog.Errorf("validate pod %s/%s failed, %v", namespace, name, err)
×
858
                c.recorder.Eventf(pod, v1.EventTypeWarning, "ValidatePodNetworkFailed", err.Error())
×
859
                return err
×
860
        }
×
861

862
        podName := pod.Name
×
863
        if pod.Annotations[fmt.Sprintf(util.VMAnnotationTemplate, util.OvnProvider)] != "" {
×
864
                podName = pod.Annotations[fmt.Sprintf(util.VMAnnotationTemplate, util.OvnProvider)]
×
865
        }
×
866

867
        // set default nic bandwidth
868
        //  ovsIngress and ovsEgress are derived from the pod's egress and ingress rate annotations respectively, their roles are reversed from the OVS interface perspective.
869
        ifaceID := ovs.PodNameToPortName(podName, pod.Namespace, util.OvnProvider)
×
870
        ovsIngress := pod.Annotations[util.EgressRateAnnotation]
×
871
        ovsEgress := pod.Annotations[util.IngressRateAnnotation]
×
872
        err = ovs.SetInterfaceBandwidth(podName, pod.Namespace, ifaceID, ovsIngress, ovsEgress)
×
873
        if err != nil {
×
874
                klog.Error(err)
×
875
                return err
×
876
        }
×
877
        err = ovs.ConfigInterfaceMirror(c.config.EnableMirror, pod.Annotations[util.MirrorControlAnnotation], ifaceID)
×
878
        if err != nil {
×
879
                klog.Error(err)
×
880
                return err
×
881
        }
×
882
        // set linux-netem qos
883
        err = ovs.SetNetemQos(podName, pod.Namespace, ifaceID, pod.Annotations[util.NetemQosLatencyAnnotation], pod.Annotations[util.NetemQosLimitAnnotation], pod.Annotations[util.NetemQosLossAnnotation], pod.Annotations[util.NetemQosJitterAnnotation])
×
884
        if err != nil {
×
885
                klog.Error(err)
×
886
                return err
×
887
        }
×
888

889
        // set multus-nic bandwidth
890
        attachNets, err := nadutils.ParsePodNetworkAnnotation(pod)
×
891
        if err != nil {
×
892
                if _, ok := err.(*nadv1.NoK8sNetworkError); ok {
×
893
                        return nil
×
894
                }
×
895
                klog.Error(err)
×
896
                return err
×
897
        }
898
        for _, multiNet := range attachNets {
×
899
                provider := fmt.Sprintf("%s.%s.%s", multiNet.Name, multiNet.Namespace, util.OvnProvider)
×
900
                if pod.Annotations[fmt.Sprintf(util.VMAnnotationTemplate, provider)] != "" {
×
901
                        podName = pod.Annotations[fmt.Sprintf(util.VMAnnotationTemplate, provider)]
×
902
                }
×
903
                if pod.Annotations[fmt.Sprintf(util.AllocatedAnnotationTemplate, provider)] == "true" {
×
904
                        ifaceID = ovs.PodNameToPortName(podName, pod.Namespace, provider)
×
905

×
906
                        err = ovs.SetInterfaceBandwidth(podName, pod.Namespace, ifaceID, pod.Annotations[fmt.Sprintf(util.EgressRateAnnotationTemplate, provider)], pod.Annotations[fmt.Sprintf(util.IngressRateAnnotationTemplate, provider)])
×
907
                        if err != nil {
×
908
                                klog.Error(err)
×
909
                                return err
×
910
                        }
×
911
                        err = ovs.ConfigInterfaceMirror(c.config.EnableMirror, pod.Annotations[fmt.Sprintf(util.MirrorControlAnnotationTemplate, provider)], ifaceID)
×
912
                        if err != nil {
×
913
                                klog.Error(err)
×
914
                                return err
×
915
                        }
×
916
                        err = ovs.SetNetemQos(podName, pod.Namespace, ifaceID, pod.Annotations[fmt.Sprintf(util.NetemQosLatencyAnnotationTemplate, provider)], pod.Annotations[fmt.Sprintf(util.NetemQosLimitAnnotationTemplate, provider)], pod.Annotations[fmt.Sprintf(util.NetemQosLossAnnotationTemplate, provider)], pod.Annotations[fmt.Sprintf(util.NetemQosJitterAnnotationTemplate, provider)])
×
917
                        if err != nil {
×
918
                                klog.Error(err)
×
919
                                return err
×
920
                        }
×
921
                }
922
        }
923

924
        return nil
×
925
}
926

927
func (c *Controller) loopEncapIPCheck() {
×
928
        node, err := c.nodesLister.Get(c.config.NodeName)
×
929
        if err != nil {
×
930
                klog.Errorf("failed to get node %s %v", c.config.NodeName, err)
×
931
                return
×
932
        }
×
933

934
        if nodeTunnelName := node.GetAnnotations()[util.TunnelInterfaceAnnotation]; nodeTunnelName != "" {
×
935
                iface, err := findInterface(nodeTunnelName)
×
936
                if err != nil {
×
937
                        klog.Errorf("failed to find iface %s, %v", nodeTunnelName, err)
×
938
                        return
×
939
                }
×
940
                if iface.Flags&net.FlagUp == 0 {
×
941
                        klog.Errorf("iface %v is down", nodeTunnelName)
×
942
                        return
×
943
                }
×
944
                addrs, err := iface.Addrs()
×
945
                if err != nil {
×
946
                        klog.Errorf("failed to get iface addr. %v", err)
×
947
                        return
×
948
                }
×
949
                if len(addrs) == 0 {
×
950
                        klog.Errorf("iface %s has no ip address", nodeTunnelName)
×
951
                        return
×
952
                }
×
953
                if iface.Name != c.config.tunnelIface {
×
954
                        klog.Infof("use %s as tunnel interface", iface.Name)
×
955
                        c.config.tunnelIface = iface.Name
×
956
                }
×
957

958
                // if assigned iface in node annotation is down or with no ip, the error msg should be printed periodically
959
                if c.config.Iface == nodeTunnelName {
×
960
                        klog.V(3).Infof("node tunnel interface %s not changed", nodeTunnelName)
×
961
                        return
×
962
                }
×
963
                c.config.Iface = nodeTunnelName
×
964
                klog.Infof("Update node tunnel interface %v", nodeTunnelName)
×
965

×
966
                c.config.DefaultEncapIP = strings.Split(addrs[0].String(), "/")[0]
×
967
                if err = c.config.setEncapIPs(); err != nil {
×
968
                        klog.Errorf("failed to set encap ip %s for iface %s", c.config.DefaultEncapIP, c.config.Iface)
×
969
                        return
×
970
                }
×
971
        }
972
}
973

974
func (c *Controller) ovnMetricsUpdate() {
×
975
        c.setOvnSubnetGatewayMetric()
×
976

×
977
        resetSysParaMetrics()
×
978
        c.setIPLocalPortRangeMetric()
×
979
        c.setCheckSumErrMetric()
×
980
        c.setDNSSearchMetric()
×
981
        c.setTCPTwRecycleMetric()
×
982
        c.setTCPMtuProbingMetric()
×
983
        c.setConntrackTCPLiberalMetric()
×
984
        c.setBridgeNfCallIptablesMetric()
×
985
        c.setIPv6RouteMaxsizeMetric()
×
986
        c.setTCPMemMetric()
×
987
}
×
988

989
func resetSysParaMetrics() {
×
990
        metricIPLocalPortRange.Reset()
×
991
        metricCheckSumErr.Reset()
×
992
        metricDNSSearch.Reset()
×
993
        metricTCPTwRecycle.Reset()
×
994
        metricTCPMtuProbing.Reset()
×
995
        metricConntrackTCPLiberal.Reset()
×
996
        metricBridgeNfCallIptables.Reset()
×
997
        metricTCPMem.Reset()
×
998
        metricIPv6RouteMaxsize.Reset()
×
999
}
×
1000

1001
func rotateLog() {
×
1002
        output, err := exec.Command("logrotate", "/etc/logrotate.d/openvswitch").CombinedOutput()
×
1003
        if err != nil {
×
1004
                klog.Errorf("failed to rotate openvswitch log %q", output)
×
1005
        }
×
1006
        output, err = exec.Command("logrotate", "/etc/logrotate.d/ovn").CombinedOutput()
×
1007
        if err != nil {
×
1008
                klog.Errorf("failed to rotate ovn log %q", output)
×
1009
        }
×
1010
        output, err = exec.Command("logrotate", "/etc/logrotate.d/kubeovn").CombinedOutput()
×
1011
        if err != nil {
×
1012
                klog.Errorf("failed to rotate kube-ovn log %q", output)
×
1013
        }
×
1014
}
1015

1016
func kernelModuleLoaded(module string) (bool, error) {
×
1017
        data, err := os.ReadFile("/proc/modules")
×
1018
        if err != nil {
×
1019
                klog.Errorf("failed to read /proc/modules: %v", err)
×
1020
                return false, err
×
1021
        }
×
1022

1023
        for line := range strings.SplitSeq(string(data), "\n") {
×
1024
                if fields := strings.Fields(line); len(fields) != 0 && fields[0] == module {
×
1025
                        return true, nil
×
1026
                }
×
1027
        }
1028

1029
        return false, nil
×
1030
}
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc