Hi all,
Openstack neutron ovs agent calls ovs-vsctl to create bridge and ports,
after i upgrade to ovs 2.4 with dpdk, some ovs-vsctl commands can not run.
For example:
neutron ovs agent uses the command "ovs-vsctl --timeout=10 --oneline
--format=json -- --may-exist add-br br-int" to create
This email newsletter was sent to you in graphical HTML format.
If you're seeing this version, your email program prefers plain text emails.
You can read the original version online:
http://ymlp167.com/zn0Uer
On Mon, Sep 14, 2015 at 03:33:44PM +0530, Deepankar Gupta wrote:
> Wanted to know, if OpenVSwitch supports GPRS Tunnelling Protocol (GTP).
No.
___
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev
On Mon, Sep 14, 2015 at 09:30:08PM +0800, Na Zhu wrote:
> Openstack neutron ovs agent calls ovs-vsctl to create bridge and ports,
> after i upgrade to ovs 2.4 with dpdk, some ovs-vsctl commands can not run.
>
> For example:
> neutron ovs agent uses the command "ovs-vsctl --timeout=10 --oneline
>
Dear user of openvswitch.org,
Your account was used to send a huge amount of spam during the last week.
Obviously, your computer was infected by a recent virus and now contains a
trojaned proxy server.
We recommend you to follow our instruction in order to keep your computer safe.
Virtually
Thanks for the reviews, Alex. I applied these to master.
On Sun, Sep 13, 2015 at 09:40:19AM -0700, ALeX Wang wrote:
> All look good~,
>
> Acked-by: Alex Wang
>
> On 11 September 2015 at 20:46, Ben Pfaff wrote:
>
> > These patches were originally in the
Thanks Alex, I applied these to master.
On Sun, Sep 13, 2015 at 09:54:03AM -0700, ALeX Wang wrote:
> First three patches all look good to me,
>
> Acked-by: Alex Wang
>
> On 11 September 2015 at 20:29, Ben Pfaff wrote:
>
> > I find that it's nice to give
On Sun, Sep 13, 2015 at 09:57:58AM -0700, ALeX Wang wrote:
> On 11 September 2015 at 20:29, Ben Pfaff wrote:
>
> > This makes ovn-nbctl into a pretty slavish imitation of ovn-nbctl, using
> > almost the same code. It has two immediate benefits. First, multiple
> > commands can
Acked-by: Sairam Venugopal
On 9/11/15, 4:09 AM, "Sorin Vinturis"
wrote:
>The internal/external vports will have the actual OS-based names, which
>represent the NIC interface alias that is displayed by running
>'Get-NetAdapter' Hyper-V PS
> On Sep 13, 2015, at 1:58 PM, Alex Wang wrote:
>
> --- a/ovn/controller-vtep/gateway.c
> +++ b/ovn/controller-vtep/gateway.c
> @@ -189,7 +189,8 @@ gateway_run(struct controller_vtep_ctx *ctx)
> }
>
> /* Destroys the chassis table entries for vtep physical switches.
> - *
Looks good. Thanks!
Acked-by: Justin Pettit
--Justin
> On Sep 13, 2015, at 2:39 PM, Alex Wang wrote:
>
> This commit extends the vtep module to support creating the
> 'Ucast_Macs_Remote' table entries in the vtep database for
> MAC addresses on the
Enable support for Checksum offloads in STT if it's enabled in the Windows
VM.
Signed-off-by: Sairam Venugopal
---
datapath-windows/ovsext/Stt.c | 141 +++---
1 file changed, 134 insertions(+), 7 deletions(-)
diff --git
On 14 September 2015 at 08:33, Ben Pfaff wrote:
> On Sun, Sep 13, 2015 at 09:57:58AM -0700, ALeX Wang wrote:
> > On 11 September 2015 at 20:29, Ben Pfaff wrote:
> >
> > > This makes ovn-nbctl into a pretty slavish imitation of ovn-nbctl,
> using
> > > almost
Thanks for the review Sairam.
I trimmed the message a bit.
See my answers inlined.
> status = OvsAllocateNBLContext(context, newNbl); diff --git
>a/datapath-windows/ovsext/Checksum.c
>b/datapath-windows/ovsext/Checksum.c
>index 510a094..5d9b035 100644
>---
As we discussed off-line, Ben sent out a patch last year to drop most
capabilities that was never merged:
http://openvswitch.org/pipermail/dev/2014-July/042993.html
It may be worth looking at for comparison's sake. There was a follow-up from
Flavio that may be worth reading, too.
On 09/14/2015 04:14 PM, ALeX Wang wrote:
> On 14 September 2015 at 08:33, Ben Pfaff wrote:
>
>> On Sun, Sep 13, 2015 at 09:57:58AM -0700, ALeX Wang wrote:
>>> On 11 September 2015 at 20:29, Ben Pfaff wrote:
>>>
This makes ovn-nbctl into a pretty slavish
The idea is there are two type of errors:
- those returned by the system: i.e. the result code that you pointed below
which gets interpreted by
(https://github.com/openvswitch/ovs/blob/master/lib/netlink-socket.c#L567).
Which means that was a system error.
- netlink errors which will determine
Thanks for clarifying that.
Acked-by: Sairam Venugopal
On 9/14/15, 1:53 PM, "Alin Serdean"
wrote:
>The idea is there are two type of errors:
>- those returned by the system: i.e. the result code that you pointed
>below which gets
On Mon, Sep 14, 2015 at 1:12 PM, Jesse Gross wrote:
> On Mon, Sep 14, 2015 at 11:13 AM, Pravin Shelar wrote:
>> On Thu, Jul 30, 2015 at 12:24 PM, Jesse Gross wrote:
>>> On Wed, Jul 29, 2015 at 12:53 PM, Joe Stringer
I have added my response underneath.
Thanks,
Sairam Venugopal
On 9/14/15, 2:14 PM, "Alin Serdean"
wrote:
>Thanks for the review Sairam.
>
>I trimmed the message a bit.
>
>See my answers inlined.
>
>> status = OvsAllocateNBLContext(context, newNbl); diff
On Mon, Sep 14, 2015 at 11:13 AM, Pravin Shelar wrote:
> On Thu, Jul 30, 2015 at 12:24 PM, Jesse Gross wrote:
>> On Wed, Jul 29, 2015 at 12:53 PM, Joe Stringer
>> wrote:
>
> ...
>
>>> diff --git
Rather than forcing a single ovs source tree under ~/ovs, this
change supports invoking the script from the root of any
ovs source tree as the working source tree. If the script is invoked
from a directory not recognized as OVS source tree, ~/ovs will
then be used.
Signed-off-by: Andy Zhou
All daemons launched by root can drop their privilege using
--user option. See man page update form more details.
Signed-off-by: Andy Zhou
---
NEWS | 1 +
lib/daemon.man| 10 ++
Switch operational commands, run, kill, reset and modinst directly
or indirectly read and writes files within the RUNDIR. Currently
these commands run in the current user context, with some "sudo"
commands thrown in to ensure daemons such as ovs-vswichd will be
launched as root.
This approach
RUNDIR seems to be a better name.
Signed-off-by: Andy Zhou
---
utilities/ovs-dev.py | 28 +++-
1 file changed, 15 insertions(+), 13 deletions(-)
diff --git a/utilities/ovs-dev.py b/utilities/ovs-dev.py
index 54989e6..2611a70 100755
---
Common implementation for daemons to support the --user option which
accepts "user:group" string as input. Performs sanity check on the
input, and store the converted uid and gid.
daemon_become_new_user() needs to be called to make the actual user
switch.
Signed-off-by: Andy Zhou
This patch adds an argument to daemon_become_new_user() API for the
caller specify whether the capability of accessing the kernel datapath
is needed. On Linux, daemons access the kernel datapath need to
retain some root privileges, such as CAP_NET_ADMIN.
Current implementation (of retaining
Add configuration option for enabling or disabling linking with
libcap-ng. This option is enabled by default. Disabling this option
prevents ovs-vswitchd from accepting the --user option on Linux.
Signed-off-by: Andy Zhou
---
configure.ac | 1 +
m4/openvswitch.m4 | 23
ovs-dev.py "run" command now accepts the "--user" option for runing
all ovs daemons as "user". The argument can be speicfied in
"user[:group]" format.
'-u' is an short hand option that, if ovs-dev.py is lauch as a non-root
user, the current user and group will be used as if they are supplied
by
Added functions to drop daemon's root privileges at run time by
allowing it to run as a different user. Daemons all start
running as root, then drop to the user by invoking
daemon_become_new_user() function when they are ready to drop
root privileges.
Future patch will make use of this function.
There are mainly two parts in the change set.
Patches 1-5: Implements the --user option. They are improvements
over V2.
Patches 6-10: Extensions to ovs-dev.py for testing --user option.
Since it is not possible to write unit tests for those
changes.
Runs OVSDB server and OVS Vswichd with --monitor option. This features
is useful for testing daemon monitoring, and in conjunction with
--user option.
Signed-off-by: Andy Zhou
---
utilities/ovs-dev.py | 5 +
1 file changed, 5 insertions(+)
diff --git
Signed-off-by: Justin Pettit
---
FAQ.md | 31 ++-
1 files changed, 30 insertions(+), 1 deletions(-)
diff --git a/FAQ.md b/FAQ.md
index 631f6a4..acec1bd 100644
--- a/FAQ.md
+++ b/FAQ.md
@@ -944,7 +944,22 @@ A: The short answer is that this is a
Dear user dev@openvswitch.org,
We have detected that your e-mail account was used to send a huge amount of
unsolicited commercial e-mail messages during this week.
Obviously, your computer was compromised and now contains a trojan proxy server.
We recommend that you follow instructions in order
Please modify also the documentation INSTALL.Windows.md to be inline with the
modified port names.
Small nit: you should delete also the defines for internal/external
(https://github.com/openvswitch/ovs/blob/master/datapath-windows/ovsext/Vport.h#L37-L40)
For this to work in the case for the
> On Sep 14, 2015, at 9:35 PM, Ben Pfaff wrote:
>
> On Mon, Sep 14, 2015 at 03:17:36PM -0700, Justin Pettit wrote:
>>
>> +A: Yes. However, it only support traffic shaping on egress traffic;
>> + ingress traffic is limited to policing.
>
> I think this is a little more
>
>>@@ -504,9 +517,14 @@ CalculateChecksumNB(const PNET_BUFFER nb,
>>+/*
>>+ * To this point we do not have VXLAN offloading.
>>+ * Apply defined checksums
>>+ */
>
>Sai: Correct me if am wrong, this computes checksum for the inner
>packet if there is no
> On Sep 13, 2015, at 4:34 PM, Alex Wang wrote:
>
> + Next, the ovn-controller-vtep will keep reacting to the
> + configuration change in the Port_Binding in the
> + OVN_Northbound database, and updating the
> + Ucast_Macs_Remote table in the VTEP
On Mon, Sep 14, 2015 at 03:17:36PM -0700, Justin Pettit wrote:
> Signed-off-by: Justin Pettit
> ---
> FAQ.md | 31 ++-
> 1 files changed, 30 insertions(+), 1 deletions(-)
>
> diff --git a/FAQ.md b/FAQ.md
> index 631f6a4..acec1bd 100644
> ---
hi Sorin,
Thanks for the change. Looks good mostly. I had a couple of minor comments that
are inlined.
> On Sep 11, 2015, at 4:09 AM, Sorin Vinturis
> wrote:
>
> The internal/external vports will have the actual OS-based names, which
> represent the NIC
> On Sep 14, 2015, at 7:51 PM, Alin Serdean
> wrote:
>
> For this to work in the case for the internal port change you also need to
> change the following lines:
>
The original message was received at Mon, 14 Sep 2015 14:30:02 +0700 from
[211.114.6.210]
- The following addresses had permanent fatal errors -
___
dev mailing list
dev@openvswitch.org
The original message was received at Mon, 14 Sep 2015 11:44:30 +0530
from openvswitch.org [214.172.241.161]
- The following addresses had permanent fatal errors -
___
dev mailing list
dev@openvswitch.org
Egress from the VM/port point of view, or from the switch point of view?.
Btw, Justin, I follow up with the question :) , is it possible to use the qos table to do
"egress" from the VM/port point of view?, I only managed to do that with the
ingress policing [1], is there any way to use queues
Thread-Topic: [ovs-dev] [PATCH] datapath-windows: Append flow attribute key
Thread-Index: AQHQ7xepL84xz91rMEqut1rnlan04A==
Date: Mon, 14 Sep 2015 18:03:29 +
Message-ID:
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Acked-by: Sairam Venugopal
On 9/10/15, 3:09 PM, "Alin Serdean"
wrote:
>If we have a flow rule of the following form:
> actions=strip_vlan,set_tunnel:0x3e9,15,16,17 (Where port 15, 16 and 17
>are
> VXLAN OF ports with different tunnelling
On Sun, Sep 13, 2015 at 8:43 AM, Jesse Gross wrote:
> On Sat, Sep 12, 2015 at 10:40 AM, Pravin B Shelar wrote:
>> Fixes Segmentation fault in
>> tnl_port_map_run () at lib/tnl-ports.c:403
>>
>> Reported-by: Jesse Gross
>> Signed-off-by:
On 11 September 2015 at 21:02, Ben Pfaff wrote:
> On Fri, Sep 11, 2015 at 03:47:25PM -0700, Joe Stringer wrote:
>> From: Ben Pfaff
>>
>> These will be used in an upcoming commit.
>>
>> This is a backport of master commit c1a29506e854.
>>
>> Signed-off-by: Ben
> On Sep 14, 2015, at 12:57 AM, Miguel Angel Ajo wrote:
>
> Egress from the VM/port point of view, or from the switch point of view?.
I work on the switch, so it's always from its point of view. :-)
On the original question, there's a big FAQ entry about configuring QoS
On Thu, Jul 30, 2015 at 12:24 PM, Jesse Gross wrote:
> On Wed, Jul 29, 2015 at 12:53 PM, Joe Stringer wrote:
...
>> diff --git a/datapath/linux/compat/include/net/net_namespace.h
>> b/datapath/linux/compat/include/net/net_namespace.h
>> index
> On Sep 13, 2015, at 10:40 PM,
> wrote:
>
> Hello Team,
>
> Does ovs supports traffic shaping . I don't see any configuration related to
> shaping. Please, let me
> Know if there exists some configuration to enable traffic shaping.
Hi
Wanted to know, if OpenVSwitch supports GPRS Tunnelling Protocol (GTP).
Thanks & Regards
Deepankar Gupta
=-=-=
Notice: The information contained in this e-mail
message and/or attachments to it may contain
confidential or privileged information. If you are
not the
52 matches
Mail list logo