Re: [ovs-dev] [ovs-dev, v2, 1 of 3] conntrack: Fix fragmentation checks.

2018-06-27 Thread 0-day Robot
Bleep bloop. Greetings Darrell Ball, I am a robot and I have tried out your patch. Thanks for your contribution. I encountered some error that I wasn't expecting. See the details below. git-am: fatal: corrupt patch at line 307 Repository lacks necessary blobs to fall back on 3-way merge. Cann

[ovs-dev] [patch v2 2/3] tests: Add more fragmentation tests.

2018-06-27 Thread Darrell Ball
Tests are added to cover out of order fragments, overlapping fragments and multiple extension headers in the case of IPv6. Signed-off-by: Darrell Ball --- tests/system-kmod-macros.at | 16 tests/system-traffic.at | 200 +++ tests/system-use

[ovs-dev] [patch v2 3/3] conntrack: Support global invalid packet stats.

2018-06-27 Thread Darrell Ball
Signed-off-by: Darrell Ball --- NEWS| 2 + lib/conntrack.c | 114 +--- lib/conntrack.h | 13 ++ lib/ct-dpif.c | 24 +++ lib/ct-dpif.h | 13 ++ lib/dpctl.c | 62 +++

[ovs-dev] [patch v2 1/3] conntrack: Fix fragmentation checks.

2018-06-27 Thread Darrell Ball
The ipv4 fragmentation check is broken and allows fragments through. There were fragile and poorly maintainable checks in extract_l3_ipv* designed to save a few cycles. The checks make assumptions about what sanity checks may have been done and could be skipped based on inferring from the value of

Re: [ovs-dev] [patch v1] ovn: Fix gateway load balancing.

2018-06-27 Thread Darrell Ball
I sent a more complete V2. Darrell On Wed, Jun 27, 2018 at 6:49 PM, Darrell Ball wrote: > Non-distributed and distributed gateway load balancing is broken. > Recent changes for port unreachable handling broke the associated > unsnat functionality. > > Fixes: 86558ac2e476 ("OVN: add UDP port un

[ovs-dev] [patch v2] ovn: Fix gateway load balancing.

2018-06-27 Thread Darrell Ball
Non-distributed and distributed gateway load balancing is broken. Recent changes for port unreachable handling broke the associated unsnat functionality. The fix approach is check for gateway contexts and accept packets directed to gateway router IPs. Fixes: 86558ac2e476 ("OVN: add UDP port unre

Re: [ovs-dev] [iovisor-dev] [RFC PATCH 00/11] OVS eBPF datapath.

2018-06-27 Thread Alexei Starovoitov
On Sat, Jun 23, 2018 at 05:16:32AM -0700, William Tu wrote: > > Discussion > == > We are still actively working on finishing the feature, currently > the basic forwarding and tunnel feature work, but still under > heavy debugging and development. The purpose of this RFC is to > get some e

[ovs-dev] [patch v1] ovn: Fix gateway load balancing.

2018-06-27 Thread Darrell Ball
Non-distributed and distributed gateway load balancing is broken. Recent changes for port unreachable handling broke the associated unsnat functionality. Fixes: 86558ac2e476 ("OVN: add UDP port unreachable support to OVN logical router.") Fixes: 159932c9e4ea ("OVN: add TCP port unreachable supp

[ovs-dev] [PATCH v2] checkpatch: fix patch separator line regex

2018-06-27 Thread Aaron Conole
The separator line always starts with three dashes on a line, optionally followed by either white-space, OR a single space and a filename. The regex would previously match on any three dashes in a row. This means that a patch (such as [1]) would trigger the parser state machine to advance beyond

Re: [ovs-dev] [PATCH v2] [RFC] ovn-controller: Experiment with restricting access to columns.

2018-06-27 Thread Han Zhou
On Wed, Jun 27, 2018 at 2:09 PM, Mark Michelson wrote: > On 06/26/2018 10:22 PM, Han Zhou wrote: > >> On Wed, Jun 20, 2018 at 11:04 PM, Ben Pfaff wrote: >> >>> >>> To make ovn-controller recompute incrementally, we need accurate >>> dependencies for each function that reads or writes a table. I

Re: [ovs-dev] [PATCH] json: Avoid signed integer overflow in parsing exponents.

2018-06-27 Thread Justin Pettit
> On Jun 25, 2018, at 11:23 AM, Ben Pfaff wrote: > > This can't cause a crash and doesn't seem relevant to normal operation. > > Reported-at: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9044 > Signed-off-by: Ben Pfaff Acked-by: Justin Pettit Thanks for fixing all these issues tha

Re: [ovs-dev] [PATCH] ofproto-dpif: Let the dpif report when a port is a duplicate.

2018-06-27 Thread Justin Pettit
> On Jun 21, 2018, at 3:53 PM, Ben Pfaff wrote: > > The port_add() function checks whether the port about to be added to the > dpif is already present and adds it only if it is not. This duplicates a > check also present (and necessary) in each dpif and races with it as well. > When a dpif has

[ovs-dev] [PATCH] gre: Fix GRE loading bug by separating ERSPAN from tunnel

2018-06-27 Thread Yifeng Sun
On kernel versions (for example, 3.10) where upstream provides GRE functionality but no ERSPAN, GRE can fail to initialize. Because there is no ERSPAN feature in kernel, openvswitch kernel module will try to register its own IPPROTO_GRE, instead of using the upstream GRE functionality. But GRE coul

Re: [ovs-dev] [PATCH] ofp-actions: Fix buffer overread in decode_LEARN_specs().

2018-06-27 Thread Justin Pettit
> On Jun 25, 2018, at 11:50 AM, Ben Pfaff wrote: > > The length check was wrong for immediate arguments to "learn" actions. > > Reported-at: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9047 > Signed-off-by: Ben Pfaff > --- > lib/ofp-actions.c | 2 +- > 1 file changed, 1 insertion(+),

Re: [ovs-dev] [PATCH] extract-ofp-errors: Fix undefined behavior shifting 'int' 16 places left.

2018-06-27 Thread Justin Pettit
> On Jun 23, 2018, at 10:29 AM, Ben Pfaff wrote: > > Shifting a 16-bit signed int 16 bits is technically undefined behavior. > This fixes the problem. (In practice this should be harmless in this > case.) > > Reported-at; https://oss-fuzz.com/v2/testcase-detail/4730143510626304 > Signed-off-b

Re: [ovs-dev] [PATCH] ofp-actions: Fix undefined behavior shifting 'int' 16 places left.

2018-06-27 Thread Justin Pettit
> On Jun 25, 2018, at 12:45 PM, Ben Pfaff wrote: > > Shifting a 16-bit signed int 16 bits is technically undefined behavior. > This fixes the problem. (In practice this should be harmless in this > case.) > > Reported-at: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9049 > Signed-off

Re: [ovs-dev] [PATCH] ofp-actions: Avoid buffer overread in BUNDLE action decoding.

2018-06-27 Thread Justin Pettit
> On Jun 25, 2018, at 1:07 PM, Ben Pfaff wrote: > > Reported-at: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9052 > Signed-off-by: Ben Pfaff Acked-by: Justin Pettit --Justin ___ dev mailing list d...@openvswitch.org https://mail.openvs

Re: [ovs-dev] [patch v2 1/2] conntrack: Fix fragmentation checks.

2018-06-27 Thread Justin Pettit
Thanks for the patch. It doesn't seem to apply cleanly against master. Can you please respin it? Also, the note about backporting it to 2.9 is helpful, but can you move it to a place where it won't be part of the commit message? --Justin > On Jun 25, 2018, at 11:33 AM, Darrell Ball wrote:

Re: [ovs-dev] [PATCH 2/3] ipsec: add CA-cert based authentication

2018-06-27 Thread Qiuyu Xiao
Hi Aaron, Thanks for your comments! On Wed, Jun 27, 2018 at 1:12 PM, Aaron Conole wrote: > > Qiuyu Xiao writes: > > > This patch adds CA-cert based authentication to the ovs-monitor-ipsec > > daemon. With CA-cert based authentication enabled, OVS approves IPsec > > tunnel if the peer has a cert

Re: [ovs-dev] [PATCH 0/3] IPsec support for tunneling

2018-06-27 Thread Qiuyu Xiao
Hi Aaron, I made some changes to the interface of the ovs-monitor-ipsec configuration, that is why the tests all failed. I am waiting for Ansis' review for the patch. If he agrees the change, I will change the test script as well. That will fix this. BTW, 0-day robot is really cool! Sorry to trig

Re: [ovs-dev] [PATCH 2/3] ipsec: add CA-cert based authentication

2018-06-27 Thread Aaron Conole
Qiuyu Xiao writes: > This patch adds CA-cert based authentication to the ovs-monitor-ipsec > daemon. With CA-cert based authentication enabled, OVS approves IPsec > tunnel if the peer has a cert signed by a trusted CA and the identity of > the peer cert is as expected. Belows are the major change

Re: [ovs-dev] [PATCH 1/3] ipsec: reintroduce IPsec support for tunneling

2018-06-27 Thread Aaron Conole
Thanks for the patch. It's really cool to see IPSec being re-integrated. Just a few quick comments inline. Qiuyu Xiao writes: > From: Ansis Atteka > > This patch reintroduces ovs-monitor-ipsec daemon that > was previously removed by commit 2b02d770 ("openvswitch: > Allow external IPsec tunnel

Re: [ovs-dev] [PATCH 0/3] IPsec support for tunneling

2018-06-27 Thread Aaron Conole
Qiuyu Xiao writes: > This patch series reintroduce IPsec support for OVS tunneling and adds new > features to prepare for the OVN IPsec support. The new features are: > > 1) Add CA-cert based authentication support to ovs-monitor-ipsec. > 2) Enable ovs-pki to generate x.509 version 3 certificate.

Re: [ovs-dev] [ovs-dev, 2 of 3] ipsec: add CA-cert based authentication

2018-06-27 Thread 0-day Robot
Bleep bloop. Greetings Qiuyu Xiao, I am a robot and I have tried out your patch. Thanks for your contribution. I encountered some error that I wasn't expecting. See the details below. checkpatch: WARNING: Line is 80 characters long (recommended limit is 79) #60 FILE: Documentation/howto/ipsec

Re: [ovs-dev] [ovs-dev, 1 of 3] ipsec: reintroduce IPsec support for tunneling

2018-06-27 Thread 0-day Robot
Bleep bloop. Greetings Qiuyu Xiao, I am a robot and I have tried out your patch. Thanks for your contribution. I encountered some error that I wasn't expecting. See the details below. checkpatch: WARNING: Line is 85 characters long (recommended limit is 79) #372 FILE: debian/openvswitch-ipsec

[ovs-dev] [PATCH 3/3] ovs-pki: generate x.509 v3 certificate

2018-06-27 Thread Qiuyu Xiao
This patch modifies ovs-pki to generate x.509 version 3 certificate. Compared with the x.509 v1 certificate generated by ovs-pki, version 3 certificate adds subjectAltName field and sets its value the same as common name (CN). The main reason for this change is to enable strongSwan IKE daemon to ex

[ovs-dev] [PATCH 2/3] ipsec: add CA-cert based authentication

2018-06-27 Thread Qiuyu Xiao
This patch adds CA-cert based authentication to the ovs-monitor-ipsec daemon. With CA-cert based authentication enabled, OVS approves IPsec tunnel if the peer has a cert signed by a trusted CA and the identity of the peer cert is as expected. Belows are the major changes and the reasons: 1) Added

[ovs-dev] [PATCH 1/3] ipsec: reintroduce IPsec support for tunneling

2018-06-27 Thread Qiuyu Xiao
From: Ansis Atteka This patch reintroduces ovs-monitor-ipsec daemon that was previously removed by commit 2b02d770 ("openvswitch: Allow external IPsec tunnel management.") The reason for removal at the time was that there were IPsec flavoured tunnel types, like ipsec_gre, that consumed for thems

Re: [ovs-dev] [PATCHv5] DNS: Add basic support for asynchronous DNS resolving

2018-06-27 Thread Yifeng Sun
Hi Shashank, libunbound also supports windows. I think this is one of reasons we selected libunbound. Best, Yifeng On Tue, Jun 26, 2018 at 7:27 PM, Shashank Ram wrote: > > > On Tue, Jun 26, 2018 at 7:08 PM Yifeng Sun wrote: > >> This patch is a simple implementation for the proposal discussed

[ovs-dev] [PATCH 0/3] IPsec support for tunneling

2018-06-27 Thread Qiuyu Xiao
This patch series reintroduce IPsec support for OVS tunneling and adds new features to prepare for the OVN IPsec support. The new features are: 1) Add CA-cert based authentication support to ovs-monitor-ipsec. 2) Enable ovs-pki to generate x.509 version 3 certificate. Ansis Atteka (1): ipsec: r

Re: [ovs-dev] Automated robotic reply. Re: [ovs-dev, v1] conntrack: Support global drop statistics.

2018-06-27 Thread Darrell Ball
Thanks Aaron I think this is a valid error. I had 2 patch series touching common lines from the same working branch; I intended to check the git context boundaries, but forgot :-) I will roll up the 2 series. Darrell On Wed, Jun 27, 2018 at 8:06 AM, Aaron Conole wrote: > Hi Darrell, > > 0-day

[ovs-dev] Operación comercial Internacional

2018-06-27 Thread Comercio exterior
--- Este correo electrónico ha sido comprobado en busca de virus por AVG. http://www.avg.com ___ dev mailing list d...@openvswitch.or

Re: [ovs-dev] [PATCH] mac-learning: Increase default mac table size to 8K from 2K

2018-06-27 Thread Ben Pfaff
On Wed, Jun 27, 2018 at 05:02:31PM +0200, Eelco Chaudron wrote: > > > On 27 Jun 2018, at 16:09, Ben Pfaff wrote: > > >On Wed, Jun 27, 2018 at 01:24:25PM +0200, Eelco Chaudron wrote: > >>In field deployments of OVS (mostly in combination with OpenStack) we > >>see that the 2K default MAC forwardi

Re: [ovs-dev] [PATCH v2 6/6] netdev-linux: monitor and offload LAG slaves to TC

2018-06-27 Thread John Hurley
On Wed, Jun 27, 2018 at 6:48 AM, Roi Dayan wrote: > > > On 26/06/2018 20:43, John Hurley wrote: >> A LAG slave cannot be added directly to an OvS bridge, nor can a OvS >> bridge port be added to a LAG dev. However, LAG masters can be added to >> OvS. >> >> Use TC blocks to indirectly offload slave

Re: [ovs-dev] Automated robotic reply. Re: [ovs-dev, v1] conntrack: Support global drop statistics.

2018-06-27 Thread Aaron Conole
Hi Darrell, 0-day Robot writes: > Bleep bloop. Greetings Darrell Ball, I am a robot and I have tried out your > patch. > Thanks for your contribution. > > I encountered some error that I wasn't expecting. See the details below. > > > checkpatch: > ERROR: Too many signoffs; are you missing Co-

Re: [ovs-dev] [PATCH nf-next v2] openvswitch: use nf_ct_get_tuplepr, invert_tuplepr

2018-06-27 Thread Pablo Neira Ayuso
On Mon, Jun 25, 2018 at 08:46:45PM -0700, Pravin Shelar wrote: > On Mon, Jun 25, 2018 at 8:55 AM, Florian Westphal wrote: > > These versions deal with the l3proto/l4proto details internally. > > It removes only caller of nf_ct_get_tuple, so make it static. > > > > After this, l3proto->get_l4proto(

Re: [ovs-dev] [PATCH] mac-learning: Increase default mac table size to 8K from 2K

2018-06-27 Thread Eelco Chaudron
On 27 Jun 2018, at 16:09, Ben Pfaff wrote: On Wed, Jun 27, 2018 at 01:24:25PM +0200, Eelco Chaudron wrote: In field deployments of OVS (mostly in combination with OpenStack) we see that the 2K default MAC forwarding table is too small. On average this tables is around 5k entries, hence this

[ovs-dev] Automated robotic reply. Re: [ovs-dev, v2] dpdk: Support both shared and per port mempools.

2018-06-27 Thread 0-day Robot
Bleep bloop. Greetings Ian Stokes, I am a robot and I have tried out your patch. Thanks for your contribution. I encountered some error that I wasn't expecting. See the details below. checkpatch: WARNING: Comment with 'xxx' marker #506 FILE: lib/netdev-dpdk.c:591: * XXX: this is a re

Re: [ovs-dev] Automated robotic reply. Re: *

2018-06-27 Thread Aaron Conole
0-day Robot writes: > Bleep bloop. Greetings Eelco Chaudron, I am a robot and I have tried out > your patch > with message ID > Thanks for your contribution. I'm disabling the distcheck output until the tests can run consistently on the system. ___

Re: [ovs-dev] [PATCH] mac-learning: Increase default mac table size to 8K from 2K

2018-06-27 Thread Ben Pfaff
On Wed, Jun 27, 2018 at 01:24:25PM +0200, Eelco Chaudron wrote: > In field deployments of OVS (mostly in combination with OpenStack) we > see that the 2K default MAC forwarding table is too small. > > On average this tables is around 5k entries, hence this patch to > increase the default value to

[ovs-dev] [PATCH v2] dpdk: Support both shared and per port mempools.

2018-06-27 Thread Ian Stokes
This commit re-introduces the concept of shared mempools as the default memory model for DPDK devices. Per port mempools are still available but must be enabled explicitly by a user. OVS previously used a shared mempool model for ports with the same MTU and socket configuration. This was replaced

Re: [ovs-dev] IEEE 802.1Q in Openvswitch !

2018-06-27 Thread Ben Pfaff
On Wed, Jun 27, 2018 at 03:11:07PM +0530, rakesh kumar wrote: > Thanks Ben, > > > *OVS doesn't do anything special with it. It treats it like any > otherfield.* > > Could you please elaborate the above mentioned point. > > My intention here was to know how OVS Queue the traffic(*Packets*) at

Re: [ovs-dev] Automated robotic reply. Re: [ovs-dev, v1] dpdk: Support both shared and per port mempools.

2018-06-27 Thread Ben Pfaff
On Wed, Jun 27, 2018 at 10:52:06AM +0100, Ian Stokes wrote: > On 6/25/2018 7:56 PM, 0-day Robot wrote: > >Bleep bloop. Greetings Ian Stokes, I am a robot and I have tried out your > >patch. > >Thanks for your contribution. > > > >I encountered some error that I wasn't expecting. See the details

Re: [ovs-dev] [PATCH] checkpatch: fix scissors line regex

2018-06-27 Thread Ben Pfaff
On Wed, Jun 27, 2018 at 09:17:16AM -0400, Aaron Conole wrote: > Ben Pfaff writes: > > > On Tue, Jun 26, 2018 at 08:58:38AM -0400, Aaron Conole wrote: > >> The scissors line is always three dashes on a line. The regex would > >> previously match on any three dashes in a row. > >> > >> This means

Re: [ovs-dev] [PATCH] checkpatch: fix scissors line regex

2018-06-27 Thread Aaron Conole
Ben Pfaff writes: > On Tue, Jun 26, 2018 at 08:58:38AM -0400, Aaron Conole wrote: >> The scissors line is always three dashes on a line. The regex would >> previously match on any three dashes in a row. >> >> This means that a patch (such as [1]) would trigger the parser state >> machine to adv

Re: [ovs-dev] [PATCH v8 06/13] dp-packet: Handle multi-seg mbufs in helper funcs.

2018-06-27 Thread Eelco Chaudron
On 27 Jun 2018, at 12:09, Lam, Tiago wrote: > On 26/06/2018 11:31, Eelco Chaudron wrote: >> >> >> On 22 Jun 2018, at 21:04, Lam, Tiago wrote: >> >>> On 18/06/2018 12:50, Eelco Chaudron wrote: On 11 Jun 2018, at 18:21, Tiago Lam wrote: > Most helper functions in dp-packet

[ovs-dev] Automated robotic reply. Re: *

2018-06-27 Thread 0-day Robot
Bleep bloop. Greetings Eelco Chaudron, I am a robot and I have tried out your patch with message ID Thanks for your contribution. I encountered a 'make distcheck' failure. See the details below. 2613: mcast - check multicasts to trunk ports are not duplicated ok 2614: mcast - delete the port md

[ovs-dev] [PATCH] mac-learning: Increase default mac table size to 8K from 2K

2018-06-27 Thread Eelco Chaudron
In field deployments of OVS (mostly in combination with OpenStack) we see that the 2K default MAC forwarding table is too small. On average this tables is around 5k entries, hence this patch to increase the default value to the next power of 2, i.e. 8K. This increase in size does not automaticall

Re: [ovs-dev] [PATCH v8 08/13] dp-packet: Handle multi-seg mubfs in shift() func.

2018-06-27 Thread Lam, Tiago
On 26/06/2018 13:28, Eelco Chaudron wrote: > > > On 22 Jun 2018, at 21:04, Lam, Tiago wrote: > >> On 18/06/2018 12:55, Eelco Chaudron wrote: >>> >>> >>> On 11 Jun 2018, at 18:21, Tiago Lam wrote: >>> In its current implementation dp_packet_shift() is also unaware of multi-seg mbufs (th

Re: [ovs-dev] [PATCH v8 06/13] dp-packet: Handle multi-seg mbufs in helper funcs.

2018-06-27 Thread Lam, Tiago
On 26/06/2018 11:31, Eelco Chaudron wrote: > > > On 22 Jun 2018, at 21:04, Lam, Tiago wrote: > >> On 18/06/2018 12:50, Eelco Chaudron wrote: >>> >>> >>> On 11 Jun 2018, at 18:21, Tiago Lam wrote: >>> Most helper functions in dp-packet assume that the data held by a dp_packet is contigu

Re: [ovs-dev] [PATCH v8 00/13] Support multi-segment mbufs

2018-06-27 Thread Lam, Tiago
On 26/06/2018 14:23, Eelco Chaudron wrote: > > > On 22 Jun 2018, at 21:02, Lam, Tiago wrote: > >> Hi Eelco, >> >> On 18/06/2018 12:18, Eelco Chaudron wrote: >>> >>> >>> On 11 Jun 2018, at 18:21, Tiago Lam wrote: >>> >> >> [snip] >> Performance notes = In order to t

Re: [ovs-dev] Automated robotic reply. Re: [ovs-dev, v1] dpdk: Support both shared and per port mempools.

2018-06-27 Thread Ian Stokes
On 6/25/2018 7:56 PM, 0-day Robot wrote: Bleep bloop. Greetings Ian Stokes, I am a robot and I have tried out your patch. Thanks for your contribution. I encountered some error that I wasn't expecting. See the details below. checkpatch: == Checking d0b5c881a538 ("dpdk: Support both shared a

Re: [ovs-dev] IEEE 802.1Q in Openvswitch !

2018-06-27 Thread rakesh kumar
Thanks Ben, *OVS doesn't do anything special with it. It treats it like any otherfield.* Could you please elaborate the above mentioned point. My intention here was to know how OVS Queue the traffic(*Packets*) at port which are coming from datapath(kernel space), it would really help me if yo

Re: [ovs-dev] [PATCH v1] dpdk: Support both shared and per port mempools.

2018-06-27 Thread Ian Stokes
On 6/26/2018 9:30 PM, Aaron Conole wrote: Hi Ian, Ian Stokes writes: This commit re-introduces the concept of shared mempools as the default memory model for DPDK devices. Per port mempools are still available but must be enabled explicitly by a user. OVS previously used a shared mempool mod