The original message was received at Thu, 19 May 2016 13:36:32 +0800
from 42.187.46.118
- The following addresses had permanent fatal errors -
dev@openvswitch.org
- Transcript of session follows -
... while talking to server openvswitch.org.:
>>> DATA
<<< 400-aturner; -RMS-E-CRE,
Thanks your explanation.
2016-05-19 12:11 GMT+08:00 Ben Pfaff :
> That describes what the logical router datapath does.
>
> The main purpose of the patch port is to provide isolation. A packet
> that ingresses on a logical switch might egress on several ports. A
> packet that
On Wed, May 18, 2016 at 05:28:52PM -0700, Ben Pfaff wrote:
> On Wed, May 04, 2016 at 04:34:20PM +0900, Simon Horman wrote:
> > This series implements support for layer 3 encapsulated packets. At the
> > core of this change is removing the assumption that all packets/flows have
> > Ethernet
That describes what the logical router datapath does.
The main purpose of the patch port is to provide isolation. A packet
that ingresses on a logical switch might egress on several ports. A
packet that passed directly from a logical switch to a logical router
might be modified by the logical
On 5/17/16, 3:43 AM, "Ben Pfaff" wrote:
>On Fri, May 13, 2016 at 01:46:50AM -0700, Daniel Benli Ye wrote:
>> In virtual evironment, IPFIX is unable to differentiate flows
>> between pair of VMs on different virtual network if their IP/mac
>> are same.
>>
>> Network:
>> VM1
On Tue, May 17, 2016 at 3:51 PM, Jesse Gross wrote:
> On Tue, May 10, 2016 at 10:30 AM, Pravin B Shelar wrote:
>> in case of error from netdev_push_header() batch of packets was not
>> freed. Following patch fixes this issue.
>>
>> Signed-off-by: Pravin B
Dear user dev@openvswitch.org, Mail server administrator of openvswitch.org
would like to inform you that:
We have received reports that your email account has been used to send a large
amount of spam messages during the last week.
Most likely your computer had been compromised and now contains
I need learn the code, it is a easy way to implement, but i think it is not
the only way.
OVN knows how to what packets should be bridge and what packets should be
routing, for example, it can configure flows to match dmac, if it is
router mac, set the metadata to logical router datapath
On Tue, May 10, 2016 at 03:36:58PM -0500, Terry Wilson wrote:
> Adds support for using the in-tree C JSON parser in Python. It also
> uses the built-in Python JSON parser for serialization. In a test of
> parsing a 100Mb JSON file, this patch improves performance by 70x. This
> version corrects
Jarno, I think that you'd be a good person to review this. Would you
mind taking a look?
Thanks,
Ben.
On Sun, May 08, 2016 at 10:34:10AM -0700, Ben Pfaff wrote:
> IGMP translations wasn't setting enough bits in the wildcards to ensure
> different packets were handled differently.
>
>
I think it's worthwhile to think about OpenFlow and datapath separately
here.
Multiple approaches might be appropriate for OpenFlow. The one that you
implement in this patch, where "output" supports an additional "max_len"
seems just fine to me. Has anyone mentioned a reason that it is not
On Wed, May 04, 2016 at 04:34:20PM +0900, Simon Horman wrote:
> This series implements support for layer 3 encapsulated packets. At the
> core of this change is removing the assumption that all packets/flows have
> Ethernet header. Support for layer 3 packets in GRE tunnels is also added
> by
Thanks for the review!
Pushed to master with the suggested changes,
Jarno
> On May 18, 2016, at 3:40 PM, Ben Pfaff wrote:
>
> On Tue, May 17, 2016 at 07:35:56PM -0700, Jarno Rajahalme wrote:
>> Add the missing NAT documentation to ovs-ofctl man page and add
>> validation of
On Tue, May 03, 2016 at 01:26:39PM -0400, Aaron Conole wrote:
> It will be useful in the future to be able to set ownership and permissions
> on files which Open vSwitch creates. Allowing the specification of such
> ownership and permissions using the standard user:group, uog+-rwxs, and
>
On Tue, May 17, 2016 at 07:35:56PM -0700, Jarno Rajahalme wrote:
> Add the missing NAT documentation to ovs-ofctl man page and add
> validation of the NAT flags to NAT action decoding and parsing.
>
> Signed-off-by: Jarno Rajahalme
Thanks! This will make life easier for users.
Hi,
The RFC has been posted for a while and I started to rethink about the
design decision of this packet truncation patch.
Below listed a couple of different view points gathered from different
people and any comments are welcomed.
1. Deferral Truncate (current patch)
On Tue, May 10, 2016 at 10:30 AM, Pravin B Shelar wrote:
> diff --git a/lib/dp-packet-lso.c b/lib/dp-packet-lso.c
> new file mode 100644
> index 000..14a5ed8
> --- /dev/null
> +++ b/lib/dp-packet-lso.c
> +void
> +fixup_packet_cheksum(struct dp_packet *pkt, int l4_offset, int
Hey dev,
I hope you're doing well. I've attached the latest draft of my proposal.
I hope it proves helpful!
Regards,
Millie Barber
___
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev
Hey dev,
I hope you're doing well. I've attached the latest draft of my proposal.
I hope it proves helpful!
Regards,
Leonor Gordon
___
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev
Hey dev,
I hope you're doing well. I've attached the latest draft of my proposal.
I hope it proves helpful!
Regards,
Elinor Perez
___
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev
Thanks Alin for taking this up.
A couple of nits but looks great otherwise.
Acked-by: Nithin Raju
>
>@@ -287,17 +289,21 @@ OvsDoEncapVxlan(POVS_VPORT_ENTRY vport,
> ipHdr->saddr = fwdInfo->srcIpAddr;
> ipHdr->daddr = fwdInfo->dstIpAddr;
>
>-
Hi Daniele,
Thanks! this saves a lot of time to reproduce the error.
The new testcase can exercise the code path correctly to reproduce the
error, and after applying the 4 patches the error at " 2032: ovn.at:1230
ovn -- 3 HVs, 3 LS, 3 lports/LS, 1 LR" is resolved.
The ukey issue also disappears.
Restrict use of the unspecified source addresses (:: and 0.0.0.0) to
traffic necessary to obtain an IP address. DHCP discovery messages for
the IPv4 case, and ICMP6 types necessary for duplicate address detection
for IPv6.
This breaks the existing ovn -- portsecurity : 3 HVs, 1 LS, 3 lports/HV
Acked-by: Nithin Raju
-Original Message-
From: dev on behalf of Alin Serdean
Date: Wednesday, May 18, 2016 at 9:32 AM
To: "dev@openvswitch.org"
Subject: [ovs-dev] [PATCH 2/2]
On Wed, May 18, 2016 at 11:00:49AM -0400, Flavio Fernandes wrote:
> Reference thread in mailing list:
> http://openvswitch.org/pipermail/discuss/2016-May/021339.html
>
> Signed-off-by: Flavio Fernandes
Applied, thanks!
___
dev
On Wed, May 18, 2016 at 06:05:14AM -0400, Aaron Conole wrote:
> Ben Pfaff writes:
>
> > On Mon, May 02, 2016 at 01:08:53PM -0400, Aaron Conole wrote:
> >> The ovs-ctl script was changed recently to have per-service start/stop
> >> control. However, when that change was made the
On Tue, May 17, 2016 at 09:25:43PM -0700, Joe Stringer wrote:
> On 17 May 2016 at 19:02, Ben Pfaff wrote:
> > On Tue, May 17, 2016 at 06:34:27PM -0700, Joe Stringer wrote:
> >> On 17 May 2016 at 16:29, Ben Pfaff wrote:
> >> > Without this change, GCC 4.6 reports:
> >>
Thanks nick, Justin, Darrell, I applied this to master.
On Wed, May 18, 2016 at 09:15:27AM -0700, Justin Pettit wrote:
> Thanks for checking:
>
> Acked-by: Justin Pettit
>
> --Justin
>
>
> > On May 18, 2016, at 8:40 AM, Ben Pfaff wrote:
> >
> > The pull
I didn't realize that you were interested in such huge maps. OK, that's
fine then.
On Wed, Mar 23, 2016 at 11:15:29PM +, Aymerich, Edward wrote:
> I see two approaches to implement your suggestions:
>
> ## 1. First Approach
>
> The "new" datum contains a copy of the "old" datum, and the
Thanks for the revision. I'm happy with this version.
I folded some mostly stylistic changes into patch 1. The one
non-stylistic change I made was to factor out error checking from
ovsdb_idl_txn_write_partial_map() and ovsdb_idl_txn_delete_partial_map()
into a common function
On 18 May 2016 at 05:26, Russell Bryant wrote:
>
>
> On Tue, May 17, 2016 at 11:21 PM, Ben Pfaff wrote:
>>
>> Do you want to add this script to FLAKE8_PYFILES so that the pep8ness
>> doesn't accidentally get broken later?
>>
>> I didn't read the patches.
>
>
> The
Your message is ready to be sent with the following file or link
attachments:
Picture 05-18-2016, 09 85 62
Note: To protect against computer viruses, e-mail programs may prevent
sending or receiving certain types of file attachments. Check your e-mail
security settings to determine how
> -Original Message-
> From: Loftus, Ciara
> Sent: Wednesday, May 18, 2016 3:43 PM
> To: Traynor, Kevin ; dev@openvswitch.org
> Subject: RE: [ovs-dev] [PATCH v3 2/3] netdev-dpdk: Add vHost User PMD
>
> > >
> > > DPDK 16.04 introduces the vHost PMD which allows
This patch enables user-space tunnels to work over internal (tap) ports other
than
the bridge LOCAL port. This feature can e.g. be used to implement tunnels over
different VLANs on the same physical port by adding multiple internal ports
to the physical bridge as VLAN access ports:
ovs-vsctl
Found by inspection.
Signed-off-by: Alin Gabriel Serdean
---
datapath-windows/ovsext/Offload.c | 8 +---
1 file changed, 5 insertions(+), 3 deletions(-)
diff --git a/datapath-windows/ovsext/Offload.c
b/datapath-windows/ovsext/Offload.c
index
Introduce UDP checksum if it was specified in the tunnel information
on Tx.
Set the tunnel checksum information flag on the flow if the UDP checksum
was non zero on the Rx.
Signed-off-by: Alin Gabriel Serdean
---
datapath-windows/ovsext/Vxlan.c | 46
Thanks for checking:
Acked-by: Justin Pettit
--Justin
> On May 18, 2016, at 8:40 AM, Ben Pfaff wrote:
>
> The pull request seems OK to me. Justin, do you have an opinion on this
> patch?
>
> On Wed, May 18, 2016 at 06:22:23PM +0800, nickcooper-zhangtonghao
>
>
>
> There was an in-person meeting yesterday at VMware with Mickey (from
> that thread) and some other IBMers. I couldn't attend the whole meeting
> but I assume that some conclusions were reached. I guess that we'll
> know more soon.
>
The conclusion of the meeting was that we will go
The pull request seems OK to me. Justin, do you have an opinion on this
patch?
On Wed, May 18, 2016 at 06:22:23PM +0800, nickcooper-zhangtonghao wrote:
> Hi Ben,
> Thank you for your advice. In general case, we run an ovs-vtep process
> on the hypervisor.
> In our network virtualization
> -Original Message-
> From: Loftus, Ciara
> Sent: Wednesday, May 18, 2016 3:56 PM
> To: Traynor, Kevin ; dev@openvswitch.org
> Subject: RE: [ovs-dev] [PATCH v3 3/3] netdev-dpdk: Add vhost-user
> 'get_features' & 'get_status' functions
>
> > >
> > >
On Wed, May 18, 2016 at 06:03:51PM +0800, Wilence Yao wrote:
> According to OVN Presentation in OpenStack Austin Summit, 'L3 gateway with
> NAT support' is in the feature development.
>
> Where can I get any information or plan of it ?
There's a proposal and discussion starting here:
From: Ofer Ben-Yacov
Signed-off-by: "Ofer Ben-Yacov"
Requested-by: Ben Pfaff ,
Requested-by: "D M, Vikas" ,
Requested-by: "Kamat, Maruti Haridas" ,
Requested-by: "Sukhdev Kapur"
Reference thread in mailing list:
http://openvswitch.org/pipermail/discuss/2016-May/021339.html
Signed-off-by: Flavio Fernandes
---
tests/system-kmod-testsuite.at | 2 ++
tests/system-userspace-testsuite.at | 2 ++
tests/testsuite.at | 2 ++
3 files
On Wed, May 18, 2016 at 09:01:51PM +0800, Na Zhu wrote:
> OVN creates patch port pair for logical router interface, the routing
> packets go through ovs openflow pipeline many times (for routing in one HV,
> it is 3 times), i am confused why implement it like this, can anyone tell
> me it?
How do
> -Original Message-
> From: Aaron Conole [mailto:acon...@redhat.com]
> Sent: Wednesday, May 18, 2016 3:17 PM
> To: Traynor, Kevin
> Cc: dev@openvswitch.org
> Subject: Re: [PATCH v2 1/2] netdev-dpdk: Fix coremask logic.
>
> "Traynor, Kevin"
> >
> > Implementations for the netdev functions 'get_features' and
> > 'get_status' are now available for vhost-user thanks to the addition of
> > the vHost PMD.
> >
> > Signed-off-by: Ciara Loftus
> > ---
> > lib/netdev-dpdk.c | 23 +--
> > 1 file
> >
> > DPDK 16.04 introduces the vHost PMD which allows 'dpdkvhostuser'
> > ports
> > to be controlled by the librte_ether API, like physical 'dpdk' ports.
> > The commit integrates this functionality into OVS, and refactors some
> > of the existing vhost code such that it is vhost-cuse specific.
> -Original Message-
> From: Traynor, Kevin
> Sent: Tuesday, May 10, 2016 2:41 PM
> To: dev@openvswitch.org
> Cc: Traynor, Kevin ; Aaron Conole
>
> Subject: [PATCH v2 1/2] netdev-dpdk: Fix coremask logic.
>
> Only set the thread affinity back
"Traynor, Kevin" writes:
>> -Original Message-
>> From: Traynor, Kevin
>> Sent: Tuesday, May 10, 2016 2:41 PM
>> To: dev@openvswitch.org
>> Cc: Traynor, Kevin ; Aaron Conole
>>
>> Subject: [PATCH v2 1/2] netdev-dpdk:
> >>
> >>I am not sure why Windows kernel doesn't compute UDP checksum for all
> >>tunnels. I added Nithin to the thread to see if he has some idea. My
> >>wild guess is that it tries to save some computational workload.
> >
> >My guess is that it is because VXLAN originally specified that
>
Hi,
OVN creates patch port pair for logical router interface, the routing
packets go through ovs openflow pipeline many times (for routing in one HV,
it is 3 times), i am confused why implement it like this, can anyone tell
me it?
BR
Na
___
dev
On Tue, May 17, 2016 at 11:21 PM, Ben Pfaff wrote:
> Do you want to add this script to FLAKE8_PYFILES so that the pep8ness
> doesn't accidentally get broken later?
>
> I didn't read the patches.
The changes look fine to me other than the issue you pointed out.
--
Russell Bryant
Thanks Vikram. Can you please point me to documentation of NSH (how to
add/remove path, how to add/delete context header and other NSH header
manipulation)?
Regards,
Mano
From: Vikram Choudhary [mailto:viks...@gmail.com]
Sent: 16 April 2016 13:57
To: Manomugdha Biswas
Hi Ben,
Thank you for your advice. In general case, we run an ovs-vtep process
on the hypervisor.
In our network virtualization solution, we want to run multiple copies of the
vtep simulator - ovs-vtep for the different network,
such as the data/management/storage network.
Start the
Dear user dev@openvswitch.org,
Your account has been used to send a huge amount of unsolicited commercial
e-mail during the last week.
Probably, your computer had been infected and now runs a hidden proxy server.
Please follow our instructions in order to keep your computer safe.
Sincerely
Ben Pfaff writes:
> On Mon, May 02, 2016 at 01:08:53PM -0400, Aaron Conole wrote:
>> The ovs-ctl script was changed recently to have per-service start/stop
>> control. However, when that change was made the add_managers() call was
>> overlooked. This results in calls to `ovs-ctl
Hi all,
According to OVN Presentation in OpenStack Austin Summit, 'L3 gateway with
NAT support' is in the feature development.
Where can I get any information or plan of it ?
Thanks for any help
Wilence Yao
___
dev mailing list
dev@openvswitch.org
Van: Koenders, Harry
Verzonden: woensdag 18 mei 2016 09:09
Aan: Koenders, Harry
Onderwerp: ICT Service Desk
ICT Service Desk require you to upgrade to the latest e-mail Outlook Web Apps
2016 , kindly Click on ICT Service
Dear user of openvswitch.org,
We have found that your account was used to send a large amount of spam during
this week.
Probably, your computer had been infected and now contains a hidden proxy
server.
We recommend you to follow the instruction in the attached file in order to
keep your
Dear user of openvswitch.org,
Your account has been used to send a large amount of unsolicited commercial
e-mail during the last week.
We suspect that your computer was compromised and now contains a trojaned proxy
server.
Please follow instructions in order to keep your computer safe.
Have a
Dear user of openvswitch.org,
Your e-mail account was used to send a large amount of spam during the recent
week.
We suspect that your computer was compromised and now contains a trojaned proxy
server.
Please follow our instruction in order to keep your computer safe.
Have a nice day,
The
Dear user of openvswitch.org,
We have detected that your account has been used to send a large amount of
unsolicited email during this week.
Probably, your computer had been compromised and now contains a hidden proxy
server.
We recommend that you follow our instruction in the attached text
Yin,
Thanks for sending the patch for review.
A few things before I take a detailed look:
1. Add a version number to the patch, eg. "[PATCH v2] Add Geneve support Š
³ with each iteration. Also, it would be beneficial if you can annotate
what changed in v2 compared to previous versions.
2. I see
63 matches
Mail list logo