From: wenxu
There is currently no support for the multicast/broadcast aspects
of VXLAN in ovs. In the datapath flow the tun_dst must specific.
But in the IP_TUNNEL_INFO_BRIDGE mode the tun_dst can not be specific.
And the packet can forward through the fdb table of vxlan devcice. In
this mode
Hello OVS team,
I have a ovs-vswitched crash of ovs version 2.8.2. I don't have the flow
which has lead to this crash, but from the backtrace I could see that the
crash is because of double locking. The ofproto_mutex lock is acquired in
handle_packet_out() and the same lock is being tried to
On 3/29/2019 4:01 PM, Yifeng Sun wrote:
Hi Greg,
I tried 4.20.17 on 16.04 and it is still working.
Do you mind sharing your .config file? Maybe there is some config
differences between our test machines?
Really? Huh, well now I suspect I did something wrong. Let me recheck
and get back.
Hi Greg,
I tried 4.20.17 on 16.04 and it is still working.
Do you mind sharing your .config file? Maybe there is some config
differences between our test machines?
Thanks,
Yifeng
On Fri, Mar 29, 2019 at 3:28 PM Gregory Rose wrote:
>
>
>
> On 3/29/2019 3:16 PM, Yifeng Sun wrote:
> > Hi Greg, I
On 3/29/2019 3:16 PM, Yifeng Sun wrote:
Hi Greg, I tried new kernel 4.20.17 on ubuntu 8.10 but everything works fine.
Do you mind telling me what Linux were you using?
Thanks,
Yifeng
It was a Ubuntu Xenial 16.04 with the custom built 4.20.17 kernel from
kernel.org. I'm not sure what
Hi Greg, I tried new kernel 4.20.17 on ubuntu 8.10 but everything works fine.
Do you mind telling me what Linux were you using?
Thanks,
Yifeng
On Fri, Mar 29, 2019 at 9:21 AM Yifeng Sun wrote:
>
> Hi Greg, thanks for the review. I will check on it.
> Yifeng
>
> On Fri, Mar 29, 2019 at 8:19 AM
If there is low maximum connection count configuration and less than 10
connections in a bucket, the calculation of the maximum number of
connections to clean for the bucket could be zero, leading to these
connections not being cleaned until and if the connection count in the
bucket increases.
Looks good to me Lorenzo.
Acked-by: Mark Michelson
On 3/29/19 11:58 AM, Lorenzo Bianconi wrote:
Add the possibility to configure a static IPv4 and/or IPv6 address
and get MAC address dynamically allocated. This can be done using the
following commands:
$ovn-nbctl ls-add sw0
$ovn-nbctl set
On Wed, Mar 27, 2019 at 9:43 PM wrote:
>
> From: wenxu
>
> There is currently no support for the multicast/broadcast aspects
> of VXLAN in ovs. In the datapath flow the tun_dst must specific.
> But in the IP_TUNNEL_INFO_BRIDGE mode the tun_dst can not be specific.
> And the packet can forward
From: Numan Siddique
Previous commit added a new OVS action 'check_pkt_larger'. This
patch supports that action in OVN. The syntax to use this would be
reg0[0] = check_pkt_larger(LEN)
Upcoming commit will make use of this action in ovn-northd and
will generate an ICMPv4 packet if the packet
From: Numan Siddique
This patch adds 2 stages in router pipeline after ARP_RESOLVE
and adds the logical flows to check the packet length and
generate ICMPv4 packet.
* S_ROUTER_IN_CHK_PKT_LEN - Which checks the packet length using
check_pkt_larger OVN action
From: Numan Siddique
This action is similar to the existing 'icmp4' OVN action except that
that this action is expected to be used to generate an ICMPv4 packet
in response to an error in original IP packet. When this action
injects the icmpv4 packet, it also copies the original IP datagram
From: Numan Siddique
In order to support OVN specific fields (which are not yet
supported in OpenvSwitch to set or modify values) a generic
OVN field support is added in this patch. These OVN fields
gets translated to controller actions.
This patch adds only one field for now - icmp4.frag_mtu.
From: Numan Siddique
This patch adds a new action 'check_pkt_larger' which checks if the
packet is larger than the given size and stores the result in the
destination register.
Usage: check_pkt_larger(len)->REGISTER
Eg. match=...,actions=check_pkt_larger(1442)->NXM_NX_REG0[0],next;
This patch
From: Numan Siddique
This is an RFC series to address the MTU issues for OVN reported
here [1].
To address this issue, a new OVS action - check_pkt_larger is added.
A new datapath action is also added - check_pkt_len.
v4 -> v5
--
* Addressed the review comments for patch 2 - " ovn: Add
Hi.
I made few tests on PVP with bonded PHY setup and found no significant
difference in maximum performance with low and medium number of flows
(8 - 8192). In case of big number of flows (64K - 256K) I see performance
drop in about 2-3%. I think that because of prefetching of a second cacheline,
Bleep bloop. Greetings Lorenzo Bianconi, I am a robot and I have tried out
your patch.
Thanks for your contribution.
I encountered some error that I wasn't expecting. See the details below.
checkpatch:
WARNING: Line is 82 characters long (recommended limit is 79)
#238 FILE:
good catch Liujiaxin
I sent an alternative patch here
https://mail.openvswitch.org/pipermail/ovs-dev/2019-March/357710.html
Do it make sense to you ?
Darrell
On Fri, Mar 29, 2019 at 2:49 AM Liujiaxin
wrote:
> From: Liujiaxin
>
> if pre_count less than 10 and n_conn_limit less than
If there is low maximum connection count configuration and less than 10
connections in a bucket, the calculation of the maximum number of
connections to clean for the bucket could be zero, leading to these
connections not being cleaned until and if the connection count in the
bucket increases.
Add the possibility to configure a static IPv4 and/or IPv6 address
and get MAC address dynamically allocated. This can be done using the
following commands:
$ovn-nbctl ls-add sw0
$ovn-nbctl set Logical-Switch sw0 other_config:subnet=192.168.0.0/24
$ovn-nbctl set Logical-switch sw0
On 3/15/2019 7:20 PM, Yifeng Sun wrote:
This patch introduces changes needed by OVS to support latest
Linux kernels (4.19.x and 4.20.x). Recent kernels changed many
APIs used by OVS. One major change is that struct nf_conntrack_l3proto
became unvisible outside of kernel, so the needed
New email
*
Your Imagination, Our Workmanship
Services We Provided
* Interior Design & Renovation.
* Epoxy Flooring.
* External & Internal Painting.
* Waterproofing.
Toa Payoh Seu Teck Sean Tong
Despite the challenging demands, you were patient with
Apply Now!!!
___
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev
Apply Now!!!
___
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev
From: Liujiaxin
if pre_count less than 10 and n_conn_limit less than CONNTRACK_BUCKETS * 10,
the limit for sweep_bucket will be 0, so the expired connections in bucket can
not be clean.
set the minimum limit to 10.
Signed-off-by: Liujiaxin
---
lib/conntrack.c | 3 ++-
1 file changed, 2
--
Dear Friend,
I have emailed you earlier on without any response from you, I have an
investment/business proposal to discuss with you in which your
partnership and trust is highly required, please get back to me for more
details.
Regards,
Adama Toure
26 matches
Mail list logo