On Mon, Apr 04, 2016 at 05:58:28AM -0700, Russell Bryant wrote:
> This patch implements one approach to using ovn-controller to implement
> a software l2 gateway between logical and physical networks.
>
> A new logical port type called "gateway" is introduced here. It is very
> close to how
On Thu, Apr 07, 2016 at 11:39:32AM -0400, Russell Bryant wrote:
> If 'system-id' is missing from the Open_vSwitch database, ovn-controller
> will not work. Log a warning if that happens to make it clear that
> configuration is incomplete.
>
> Signed-off-by: Russell Bryant
> ---
Open vSwitch must ensure that flow translation takes a finite amount of
time. Until now it has implemented this by limiting the depth of
recursion. The initial limit, in version 1.0.1, was no recursion at all,
and then over the years it has increased to 8 levels, then 16, then 32,
and 64 for the
The "recurse" member of struct xlate_in and struct xlate_ctx is used for
two purposes: to determine the amount of indentation in "ofproto/trace"
output and to limit the depth of recursion. An upcoming commit will
separate these tasks, and so in preparation this commit renames "recurse"
to
I want to test dpdk vhost-user port on ovs to follow
https://software.intel.com/en-us/blogs/2015/06/09/building-vhost-user-for-ovs-today-using-dpdk-200;
I create ovs+dpdk environment followed INSTALL.DPDK.md; and create 2 VM2, try
to ping each other but show me “Destination Host Unreachable”;
Staged lookup indices assumed that cmap is efficient fealing with
duplicates. Duplicates are implemented as linked lists, however,
causing removal of rules to become (O^2) and highly cache-inefficient
with large number of duplicates.
This was problematic especially when many rules shared the
The test for figuring out if the last index had the same fields as the
actual rules map as broken, resulting into keeping an unnecessary
index around.
Signed-off-by: Jarno Rajahalme
---
lib/classifier.c | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git
The only vlog line was a left over from debugging.
Signed-off-by: Jarno Rajahalme
---
lib/classifier.c | 4
1 file changed, 4 deletions(-)
diff --git a/lib/classifier.c b/lib/classifier.c
index 4861672..1fbaa0c 100644
--- a/lib/classifier.c
+++ b/lib/classifier.c
@@ -25,9
This optimization applied when a staged lookup index would narrow down
to a single rule, which happens sometimes is simple test cases, but
presumably less often in more populated flow tables. The result of
this optimization allowed a bit more general megaflows, but the bit
patterns produced were
On 10/04/2016 12:23, "Ben Pfaff" wrote:
>On Fri, Apr 08, 2016 at 03:12:59AM +, Daniele Di Proietto wrote:
>>
>>
>> On 01/04/2016 09:52, "Jarno Rajahalme" wrote:
>>
>> >
>> >> On Mar 30, 2016, at 8:08 PM, Daniele Di Proietto
>> >>
> On Apr 13, 2016, at 5:17 PM, Ben Pfaff wrote:
>
> On Wed, Apr 13, 2016 at 05:17:13PM -0700, Ben Pfaff wrote:
>> On Wed, Apr 13, 2016 at 05:06:16PM -0700, Joe Stringer wrote:
>>> On 13 April 2016 at 16:12, Ben Pfaff wrote:
On Tue, Apr 12, 2016 at 10:56:50PM
Packets are supposed to be processed by one of the buckets for a select
type group with equal load sharing implemented. However, I am still not
able to get the equal load sharing. Only one bucket got executed. The
command of adding a select group with two buckets and the dump-groups
result are
2016-04-13 9:21 GMT-07:00 Traynor, Kevin :
> > -Original Message-
> > From: dev [mailto:dev-boun...@openvswitch.org] On Behalf Of Panu
> Matilainen
> > Sent: Wednesday, April 13, 2016 8:50 AM
> > To: Weglicki, MichalX ;
Thanks for the patch, I have a couple of comments:
DPDK 16.04 enables by default checksum offloads and TSO for vhostuser
device. While this seem to work ok, there seem to be a few problems with
this:
* OVS in userspace assumes that a packet is stored using a single mbuf
(it is not aware of
Dear user of openvswitch.org,
Your account was used to send a large amount of unsolicited commercial e-mail
during this week.
Obviously, your computer was compromised and now runs a trojaned proxy server.
We recommend you to follow our instructions in order to keep your computer safe.
Best
On Wed, Apr 13, 2016 at 05:17:13PM -0700, Ben Pfaff wrote:
> On Wed, Apr 13, 2016 at 05:06:16PM -0700, Joe Stringer wrote:
> > On 13 April 2016 at 16:12, Ben Pfaff wrote:
> > > On Tue, Apr 12, 2016 at 10:56:50PM -0700, Joe Stringer wrote:
> > >> On 12 April 2016 at 21:13, Ben Pfaff
On Wed, Apr 13, 2016 at 05:06:16PM -0700, Joe Stringer wrote:
> On 13 April 2016 at 16:12, Ben Pfaff wrote:
> > On Tue, Apr 12, 2016 at 10:56:50PM -0700, Joe Stringer wrote:
> >> On 12 April 2016 at 21:13, Ben Pfaff wrote:
> >> > On Tue, Apr 12, 2016 at 11:38:38AM
On 13 April 2016 at 16:12, Ben Pfaff wrote:
> On Tue, Apr 12, 2016 at 10:56:50PM -0700, Joe Stringer wrote:
>> On 12 April 2016 at 21:13, Ben Pfaff wrote:
>> > On Tue, Apr 12, 2016 at 11:38:38AM -0700, William Tu wrote:
>> >> Should we expose "truncate" to the
On Tue, Apr 05, 2016 at 05:08:00PM +0530, Numan Siddique wrote:
> Even I was thinking to identify a minimal set of dhcp options and
> support them. If the requirement arises for more dhcp options, we can
> raise a bug. In order to support more dhcp options we just need to
> define them in
On Mon, Apr 04, 2016 at 05:11:01PM +0530, Numan Siddique wrote:
> To support native dhcp in ovn
> - A new column 'dhcp-options' is added in 'Logical_Switch' north db.
> - A logical flow is added for each logical port to handle dhcp packets
>if the CMS has defined dhcp options in this column.
On Tue, Apr 12, 2016 at 10:56:50PM -0700, Joe Stringer wrote:
> On 12 April 2016 at 21:13, Ben Pfaff wrote:
> > On Tue, Apr 12, 2016 at 11:38:38AM -0700, William Tu wrote:
> >> Should we expose "truncate" to the ovs-ofctl action list?
> >>
> >> I was thinking about this ovs-ofctl
Thanks for working on this. The original patch, as opposed to the
followup quoted below) doesn't seem to have made it to the mailing list
archive or to patchwork. Can you resend it?
On Wed, Apr 13, 2016 at 12:49:28PM +0200, Miguel Angel Ajo Pelayo wrote:
> I verified the 10% / 80% changes with
Acked-by: Sairam Venugopal
On 4/13/16, 3:33 PM, "Nithin Raju" wrote:
>Got left out during the previous round of refactoring.
>
>Signed-off-by: Nithin Raju
>---
> datapath-windows/ovsext/Vport.c | 8
> 1 file changed, 8
Got left out during the previous round of refactoring.
Signed-off-by: Nithin Raju
---
datapath-windows/ovsext/Vport.c | 8
1 file changed, 8 insertions(+)
diff --git a/datapath-windows/ovsext/Vport.c b/datapath-windows/ovsext/Vport.c
index 4da2b42..882b41f 100644
On Wed, Apr 13, 2016 at 09:54:14AM -0700, Joe Stringer wrote:
> On 12 April 2016 at 22:00, Ben Pfaff wrote:
> > It's pretty easy to forget to update the pointer to an ofpact when
> > finishing it. This commit forces the caller to pass a pointer-to-pointer
> > instead, and uses that
This patch adds support for Connection Tracking in Hyper-V. The patch has been
ported over from userspace implementation. The current version of the patch
supports zone, mark and label fields for TCP traffic. Other protocols will be
added in subsequent patches.
Sairam Venugopal (1):
Enable support for Stateful Firewall in Hyper-V by adding a Connection
Tracking module. The module has been ported over from the userspace
implementation patch of a similar name.
The current version of the module supports ct - zone, mark and label for
TCP packets. Support for other packet formats
> +/* dhcp options */
> +shash_init(_opt_symtab);
> +dhcp_opt_expr_symtab_add_field(_opt_symtab, "offerip", 0,
> + DHCP_OPT_TYPE_IP4);
> +dhcp_opt_expr_symtab_add_field(_opt_symtab, "netmask", 1,
> +
It reminds me another similar issue:
http://openvswitch.org/pipermail/dev/2016-March/067313.html
Is there some way to avoid or make it harder to forgetting to update the
pointer once ofpbuf_put_uninit reallocate to newly allocated memory?
Regards,
William
On Tue, Apr 12, 2016 at 10:00 PM, Ben
On Wed, Apr 13, 2016 at 10:35 AM, Guru Shetty wrote:
>
>
> On 28 March 2016 at 00:10, Han Zhou wrote:
>
>> For non-local datapaths, if there are no patch ports attached, it
>> means the lflows and port bindings would never be needed on the
>> Chassis. Skipping
On 13 April 2016 at 00:04, Amrane Ait Zeouay wrote:
> Hi,
> I want to add a field to the struct flow, and i checked the FAQ 'How do I
> add support for a new field or header?' but i didn't understand it, what i
> want to do is add a field in the flow and then when it will
On 28 March 2016 at 00:10, Han Zhou wrote:
> For non-local datapaths, if there are no patch ports attached, it
> means the lflows and port bindings would never be needed on the
> Chassis. Skipping the processing for such lflows and port bindings
> can save significant amount
From: RYAN D. MOATS
Provide a point to start collecting documentation on OVSDB
and seed it with experiences from making use of change
tracking.
Signed-off-by: RYAN D. MOATS
---
ovsdb/README.md | 38 ++
1 files
On 12 April 2016 at 22:00, Ben Pfaff wrote:
> It's pretty easy to forget to update the pointer to an ofpact when
> finishing it. This commit forces the caller to pass a pointer-to-pointer
> instead, and uses that to automatically update the pointer. There still
> could be cases
On 12 April 2016 at 21:15, Ben Pfaff wrote:
> On Tue, Apr 12, 2016 at 11:36:55AM -0700, Joe Stringer wrote:
>> Signed-off-by: Joe Stringer
>> ---
>> tests/system-traffic.at | 4 ++--
>> 1 file changed, 2 insertions(+), 2 deletions(-)
>>
>> diff --git
On Tue, Apr 12, 2016 at 9:13 PM, Ben Pfaff wrote:
> On Tue, Apr 12, 2016 at 11:38:38AM -0700, William Tu wrote:
>> Should we expose "truncate" to the ovs-ofctl action list?
>>
>> I was thinking about this ovs-ofctl syntax:
>> actions='output(max_len=64, port=1), output:2'
>>
>>
On 12 April 2016 at 21:19, Ben Pfaff wrote:
> On Tue, Apr 12, 2016 at 02:23:47PM -0700, Joe Stringer wrote:
>> On 4 April 2016 at 14:56, Joe Stringer wrote:
>> > Previously, whenever a set_field() action was executed, the entire field
>> > would become masked and the
Hi,
We are researching with IPv6 tunneling support on openvswitch. We can only use
a released version of openvswitch (not the experimental
master branch). We saw that IPv6 tunnel creation fails in branch-2.5, which
dates back to a commit and log suggests that there were some issues
that could
> -Original Message-
> From: dev [mailto:dev-boun...@openvswitch.org] On Behalf Of Panu Matilainen
> Sent: Wednesday, April 13, 2016 8:50 AM
> To: Weglicki, MichalX ; dev@openvswitch.org
> Subject: Re: [ovs-dev] [PATCH] Update relevant artifacts to add support
Hi Ben,
I have rebased (due to conflicts) the series and am set to resubmit;
however I'd like to get closure on this issue before I do.
I have no strong feelings either way - I can manually scan the string
for .. or use the realpath code I've put here. Since this only happens
at initialization
> -Original Message-
> From patchwork Fri Apr 1 13:06:05 2016
> Content-Type: text/plain; charset="utf-8"
> MIME-Version: 1.0
> Content-Transfer-Encoding: 7bit
> Subject: [ovs-dev] tunneling: Fix for concomitant IPv4 and IPv6 tunnels
> From: Thadeu Lima de Souza Cascardo
Hi,
I am seeing an issue while testing the ovn native dhcp implementation.
When the dhcp reply packet from ovn-controller is resumed by ovs-vswitchd,
the packet is getting dropped in the egress pipeline - ACL stage.
I see the below messages in the vswitchd.log
--
This Message was undeliverable due to the following reason:
Your message was not delivered because the destination computer was
not reachable within the allowed queue period. The amount of time
a message is queued before it is returned depends on local configura-
tion parameters.
Most likely
This patch provides the modifications required in netdev-dpdk.c and
vswitch.xml to enable ingress policing for DPDK interfaces.
This patch implements the necessary netdev functions to netdev-dpdk.c as
well as various helper functions required for ingress policing.
The vswitch.xml has been
Add generic policer functions to avoid code duplication.
Policing can be implemented on both egress and ingress paths.
Currently the QoS egress-policer implementation uses it's own specific run
and packet handle policer functions. This patch makes the policer functions
generic so that they can be
This patchset adds generic policer functions and ingress_policing functionality
to OVS with DPDK.
Patch 1 introduces generic policer functions to avoid code duplication when
processing either ingress or egress traffic with a policer.
Patch 2 adds ingress policing functionality and details to
Optimizing tunneling performance in userspace datapath by offloading the
rx checksum validation on tunnel packets to the NIC when it is supported.
This patch improves the bidirectional VxLAN tunneling performance by 8% and
decapsulation performance by 24%. However it introduces 1% performance
Hi Jesse,
Thank you for looking into the patch. I will send out v2 patch after
incorporating your comments.
Regards
_Sugesh
> -Original Message-
> From: Jesse Gross [mailto:je...@kernel.org]
> Sent: Monday, April 11, 2016 5:33 PM
> To: Chandran, Sugesh
> Cc:
In order to use dpdk ports in ovs they have to be bound to a DPDK
compatible driver before ovs is started.
This patch adds the possibility to hotplug (or hot-unplug) a device
after ovs has been started. The implementation adds an appctl command:
netdev-dpdk/port-clt
After the user attaches a new
Adding more detail that helps find what went wrong.
Signed-off-by: Ryan Moats
---
tests/ovn.at | 8
1 file changed, 8 insertions(+)
diff --git a/tests/ovn.at b/tests/ovn.at
index 22121e1..786479f 100644
--- a/tests/ovn.at
+++ b/tests/ovn.at
@@ -1177,14 +1177,17 @@
As a side effect, tunnel context is persisted.
Signed-off-by: Ryan Moats
---
ovn/controller/encaps.c | 162
ovn/controller/ovn-controller.c | 5 ++
2 files changed, 120 insertions(+), 47 deletions(-)
diff --git
Ensure that the entire port binding table is processed
when chassis are added/removed or when get_local_iface_ids
finds new ports on the local vswitch.
Side effects:
- Persist local_datapaths and patch_datapaths across runs so
that changes to either can be used as a trigger to reset
Prior versions of the patch set used change tracking
incorrectly - this change set fixes that, but it
results in larger patchsets, as persisting structures
and adding incremental processing end up combined
into the same patch.
Specific processing steps havs been extracted into
helper methods to
This code changes to allow incremental processing of the
logical flow and physical binding tables whenver possible.
Side Effects:
- Make flow table persistent in ovn controller
- Reset lflow processing when adding/removing patch ports
Note: flows created by physical_run for multicast_groups
Ensure that ovn flow tables are persisted so that changes to
them chan be applied incrementally - this is a prereq for
making lflow_run and physical_run incremental.
Signed-off-by: Ryan Moats
---
ovn/controller/lflow.c | 26 ++--
ovn/controller/lflow.h |
This is preparatory to making physical_run and lflow_run process
incrementally as changes to the data in these structures control
that processing.
Signed-off-by: Ryan Moats
---
ovn/controller/lport.c | 216 +---
Good day!
We considered your resume to be very attractive and we thought the vacant
position in our company could be interesting for you.
We cooperate with different countries and currently we have many clients in the
world.Part-time and full-time employment are both currently important.
We
Hi,
> -Original Message-
> From: Jesse Gross [mailto:je...@kernel.org]
> Sent: Friday, March 25, 2016 7:57 PM
> To: Wojciechowicz, RobertX
> Cc: ovs dev
> Subject: Re: [ovs-dev] [PATCH RFC] netdev-dpdk: Expand RSS hash
> calculation
Hi,
On Wed, 13 Apr 2016 08:37:21 +0300, shmulik.ladk...@ravellosystems.com wrote:
> debian/control is git controlled, no reason for it to be in the git
> ignore list.
Please ignore; Seems debian/control gets over-written when building
openvswitch-datapath-module using debian/rules.modules.
I verified the 10% / 80% changes with netperf, it's unable to sustain 10Mbps
without at least a 8Mbit burst. I've seen recommendations from cisco to use
policing bursts of around 150 to 200%, but I guess that depends on the path
latency or even the implementation.
My netperf tests were in-host.
On 04/13/2016 11:38 AM, Panu Matilainen wrote:
On 04/13/2016 11:33 AM, Panu Matilainen wrote:
On 04/13/2016 11:16 AM, Weglicki, MichalX wrote:
-Original Message-
From: Panu Matilainen [mailto:pmati...@redhat.com]
Sent: Wednesday, April 13, 2016 8:50 AM
To: Weglicki, MichalX
The purpose of this implementation is to improve the performance
of wildcard matching in user-space.
This RFC patch shows the basic functionality, some aspects were not
covered yet.
I would like to get some feedback on whether people think integrating
the DPDK ACL table in this manner is
Following changes are applied:
- INSTALL.DPDK.md: CONFIG_RTE_BUILD_COMBINE_LIBS step has been
removed because it is no longer present in DPDK configuration
(combined library is created by default),
- INSTALL.DPDK.md: VHost Cuse configuration is updated,
- netdev-dpdk.c: Link speed
-Original Message-
From: Panu Matilainen [mailto:pmati...@redhat.com]
Sent: Wednesday, April 13, 2016 9:38 AM
To: Weglicki, MichalX ; dev@openvswitch.org
Subject: Re: [ovs-dev] [PATCH] Update relevant artifacts to add support for
DPDK 16.04.
On 04/13/2016
On 04/13/2016 11:33 AM, Panu Matilainen wrote:
On 04/13/2016 11:16 AM, Weglicki, MichalX wrote:
-Original Message-
From: Panu Matilainen [mailto:pmati...@redhat.com]
Sent: Wednesday, April 13, 2016 8:50 AM
To: Weglicki, MichalX ; dev@openvswitch.org
Subject:
On 04/13/2016 11:16 AM, Weglicki, MichalX wrote:
-Original Message-
From: Panu Matilainen [mailto:pmati...@redhat.com]
Sent: Wednesday, April 13, 2016 8:50 AM
To: Weglicki, MichalX ; dev@openvswitch.org
Subject: Re: [ovs-dev] [PATCH] Update relevant artifacts
-Original Message-
From: Panu Matilainen [mailto:pmati...@redhat.com]
Sent: Wednesday, April 13, 2016 8:50 AM
To: Weglicki, MichalX ; dev@openvswitch.org
Subject: Re: [ovs-dev] [PATCH] Update relevant artifacts to add support for
DPDK 16.04.
On 04/12/2016
On 04/12/2016 05:05 PM, mweglicx wrote:
[...]
diff --git a/lib/netdev-dpdk.c b/lib/netdev-dpdk.c
index e09b471..2295e53 100644
--- a/lib/netdev-dpdk.c
+++ b/lib/netdev-dpdk.c
@@ -1740,31 +1740,31 @@ netdev_dpdk_get_features(const struct netdev *netdev_,
link = dev->link;
Hi,
I want to add a field to the struct flow, and i checked the FAQ 'How do I
add support for a new field or header?' but i didn't understand it, what i
want to do is add a field in the flow and then when it will be parsed it
will call an external function, the field is not in the packet it's just
69 matches
Mail list logo