Hi All,
Is there any plan for integrating ODP changes from Linaro group into
mainline?
--
Thanks & Regards
Neelakantam Gaddam
___
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev
Add support for dnat based on destnation port.
From 0dd41ed18d520c6d61bc23c5fefad5132aa9dadd Mon Sep 17 00:00:00 2001
From: "lg.yue"
Date: Wed, 1 Mar 2017 11:07:16 +0800
Subject: [PATCH 1/1] Implement DNAT based on destnation port
Signed-off-by: lg.yue
Userspace support for datapath original direction conntrack tuple.
Signed-off-by: Jarno Rajahalme
---
build-aux/extract-ofp-fields| 3 +
include/openvswitch/flow.h | 15 ++-
include/openvswitch/match.h | 16 +++
include/openvswitch/meta-flow.h | 136
OVS in-tree datapath compiles against Linux 4.10 kernel, so allow it.
Signed-off-by: Jarno Rajahalme
---
acinclude.m4 | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/acinclude.m4 b/acinclude.m4
index f4cbabd..3de635f 100644
--- a/acinclude.m4
+++
Add resubmit option to use the Conntrack original direction tuple
swapped with the corresponding packet header fields during the lookup.
This could allow the same ACL table be used for admitting return
and/or related traffic as is used for admitting the original direction
traffic.
Signed-off-by:
Make openvswitch.h better match upstream by adding a missing comment.
Signed-off-by: Jarno Rajahalme
---
datapath/linux/compat/include/linux/openvswitch.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/datapath/linux/compat/include/linux/openvswitch.h
Upstream patch:
commit dd41d33f0b033885211a5d6f3ee19e73238aa9ee
Author: Jarno Rajahalme
Date: Thu Feb 9 11:22:00 2017 -0800
openvswitch: Add force commit.
Stateful network admission policy may allow connections to one
direction and reject connections
Upstream commit:
commit f330a7fdbe1611104622faff7e614a246a7d20f0
Author: Florian Westphal
Date: Thu Aug 25 15:33:31 2016 +0200
netfilter: conntrack: get rid of conntrack timer
With stats enabled this eats 80 bytes on x86_64 per nf_conn entry, as
Eric
'ct_state' currently only needs 8 bits, so we can make room for a new
CT field introduced in the next patch.
Signed-off-by: Jarno Rajahalme
---
include/openvswitch/flow.h | 3 ++-
lib/flow.c | 3 ++-
lib/match.c| 8
lib/packets.h
Upstream commit:
commit 9dd7f8907c3705dc7a7a375d1c6e30b06e6daffc
Author: Jarno Rajahalme
Date: Thu Feb 9 11:21:59 2017 -0800
openvswitch: Add original direction conntrack tuple to sw_flow_key.
Add the fields of the conntrack original direction 5-tuple to
Supply the match mask to prerequisities checking when available. This
allows checking for zero-valued matches. Non-zero valued matches
imply the presense of corresponding mask bits, but for zero valued
matches we must explicitly check the mask, too.
This is required now only for conntrack
Upstream commit:
commit 09aa98ad496d6b11a698b258bc64d7f64c55d682
Author: Jarno Rajahalme
Date: Thu Feb 9 11:21:58 2017 -0800
openvswitch: Inherit master's labels.
We avoid calling into nf_conntrack_in() for expected connections, as
that would remove the
Since there is no data to copy nl_msg_put_unspec_uninit() may be used
directly, rather than via nl_msg_put_unspec().
Signed-off-by: Jarno Rajahalme
---
lib/netlink.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/lib/netlink.c b/lib/netlink.c
index
Upstream commit:
Refactoring conntrack labels initialization makes changes in later
patches easier to review.
Signed-off-by: Jarno Rajahalme
Acked-by: Pravin B Shelar
Acked-by: Joe Stringer
Signed-off-by: David S. Miller
Upstream commit:
commit b87cec3814ccc7f6afb0a1378ee7e5110d07cdd3
Author: Jarno Rajahalme
Date: Thu Feb 9 11:21:56 2017 -0800
openvswitch: Simplify labels length logic.
Since 23014011ba42 ("netfilter: conntrack: support a fixed size of 128
distinct
Upstream commit:
commit cb80d58fae76d8ea93555149b2b16e19b89a1f4f
Author: Jarno Rajahalme
Date: Thu Feb 9 11:21:55 2017 -0800
openvswitch: Unionize ovs_key_ct_label with a u32 array.
Make the array of labels in struct ovs_key_ct_label an union, adding a
Upstream commit:
commit 193e30967897f3a8b6f9f137ac30571d832c2c5c
Author: Jarno Rajahalme
Date: Thu Feb 9 11:21:54 2017 -0800
openvswitch: Do not trigger events for unconfirmed connections.
Receiving change events before the 'new' event for the connection has
Upstream commit:
commit 9ff464db50e437eef131f719cc2e9902eea9c607
Author: Jarno Rajahalme
Date: Thu Feb 9 11:21:53 2017 -0800
openvswitch: Use inverted tuple in ovs_ct_find_existing() if NATted.
The conntrack lookup for existing connections fails to invert
Upstream commit:
commit 5e17da634a21b1200853fe82ba67d6571f2beabe
Author: Jarno Rajahalme
Date: Thu Feb 9 11:21:52 2017 -0800
openvswitch: Fix comments for skb->_nfct
Fix comments referring to skb 'nfct' and 'nfctinfo' fields now that
they are combined
From: Florian Westphal
Upstream commit:
commit c74454fadd5ea6fc866ffe2c417a0dba56b2bf1c
Author: Florian Westphal
Date: Mon Jan 23 18:21:57 2017 +0100
netfilter: add and use nf_ct_set helper
Add a helper to assign a nf_conn entry and the
From: Florian Westphal
Upstream commit:
commit cb9c68363efb6d1f950ec55fb06e031ee70db5fc
Author: Florian Westphal
Date: Mon Jan 23 18:21:56 2017 +0100
skbuff: add and use skb_nfct helper
Followup patch renames skb->nfct and changes its
From: stephen hemminger
Upstream commit:
commit bc1f44709cf27fb2a5766cadafe7e2ad5e9cb221
Author: stephen hemminger
Date: Fri Jan 6 19:12:52 2017 -0800
net: make ndo_get_stats64 a void function
The network device
This patch set backports the recent upstream conntrack fixes and new
features to the OVS tree kernel module, and adds the OVS userspace
support.
Patch 1/22 is an unrelated datapath backport, and patch 22/22 allows
compiling against Linux 4.10.
Each new feature is introduced in two different
Han and Jarno, thank you all, I tried the below cmds, they can work.
sudo ovs-ofctl -Oopenflow13 add-group br-sfc "group_id=100 type=select
selection_method=dp_hash bucket=output:1 bucket=output:2"
sudo ovs-ofctl -Oopenflow13 add-flow br-sfc
"table=0,ip,nw_src=192.168.2.0/24,actions=group:100"
Signed-off-by: Alin Gabriel Serdean
>
Would you mind changing the commit message to say something like "geneve option
header should be in little endian".
[Alin Serdean] Not at all. Thanks for the review ☺.
Daniele Di Proietto writes:
> On 26/01/2017 12:35, "Ansis Atteka" wrote:
>>
>>
>>On 26 January 2017 at 21:24, Aaron Conole
>> wrote:
>>
>>Daniele Di Proietto writes:
>>
>>> On 25/01/2017 00:01, "Ansis
Good catch. Thanks Alin for the fixing this! Wondering why I didn't caught
it earlier.
Acked-by: Yin Lin
On Fri, Feb 17, 2017 at 4:44 AM, Alin Serdean <
aserd...@cloudbasesolutions.com> wrote:
> At the moment on Windows we suport only LE platforms.
>
> The option header is
> On Feb 27, 2017, at 10:42 PM, Han Zhou wrote:
>
> On Mon, Feb 27, 2017 at 7:42 PM, Yang, Yi Y wrote:
>>
>> Hi, all
>>
>> Can we use ovs to implement load balancer? Our target is to let ovs
> distribute the traffic to different service VMs based on 5
Great!
Thanks Mark, Ian and Sergio for helping me out. Appreciate the help!
On Tue, Feb 28, 2017, 11:05 PM Kavanagh, Mark B
wrote:
> >
> >> >
> >> >Thanks Mark.
> >>
> >> Hey again Kapil,
> >>
> >> So it looks like the issue that you're experiencing is the result of
>
>> >
>> >Thanks Mark.
>>
>> Hey again Kapil,
>>
>> So it looks like the issue that you're experiencing is the result of a bug
>> in DPDK v16.07, which was subsequently fixed in v16.11
>>
>> If you apply the following commit to your DPDK codebase, it will resolve
>> the issue.
>>
>> commit
> >
> >Thanks Mark.
>
> Hey again Kapil,
>
> So it looks like the issue that you're experiencing is the result of a bug
> in DPDK v16.07, which was subsequently fixed in v16.11
>
> If you apply the following commit to your DPDK codebase, it will resolve
> the issue.
>
> commit
Date 2017-02-28, 17-17.45 CET
Participants: Ben P, Ben M-C, Jiri B, Jan, Georg
Summary:
* Ericsson's 1st user-space patch series for L3 tunneling out since Feb
03. Please review!
https://mail.openvswitch.org/pipermail/ovs-dev/2017-February/328391.html
AP (Ben P/Jarno): Start review
>
>Thanks Mark.
Hey again Kapil,
So it looks like the issue that you're experiencing is the result of a bug in
DPDK v16.07, which was subsequently fixed in v16.11
If you apply the following commit to your DPDK codebase, it will resolve the
issue.
commit
The dpdk_mp_get() function can return a NULL pointer which leads to a
segfault when a mempool cannot be created. The lack of a return value
check for the function netdev_dpdk_mempool_configure() when called in
netdev_dpdk_reconfigure() can result in a segfault also as
a NULL pointer for the
Hi,
I hope you're doing well.
I was wondering if you had a chance to review my previous email that I sent
to you.
Kindly let me know your interest so that i can get back to you with counts
and pricing available.
Best Regards,
Daisy Finn
From: Daisy Finn
Hi Ilya,
Comments below.
BR,
Billy.
> -Original Message-
> From: Ilya Maximets [mailto:i.maxim...@samsung.com]
> Sent: Tuesday, February 28, 2017 12:49 PM
> To: O Mahony, Billy ; d...@openvswitch.org
> Cc: Daniele Di Proietto
> Subject:
All tests pass with Python 3.5 so list it as supported.
Signed-off-by: Russell Bryant
---
python/setup.py | 1 +
1 file changed, 1 insertion(+)
diff --git a/python/setup.py b/python/setup.py
index 19c1f18..a85b3d1 100644
--- a/python/setup.py
+++ b/python/setup.py
@@ -75,6
>
>Hi Mark,
>Is there any patch I can expect for this issue?
Hi Kapil,
I flagged the issue to our onsite DPDK memory expert (Sergio, cc'd). Sergio
worked with us on the issue, and wrote a simple DPDK application in an attempt
to reproduce the issue, and localize it to DPDK.
Unfortunately, the
Good Day,
I am seeking your kind assistance,I want both of us to work out a modality to
safeguard the fund instead of it being left to be confiscated by the
Government. The fund is legitimate, the transaction is also safe. At no point
are you being used to launder ill gotten wealth or being
39 matches
Mail list logo