On 5 Nov 2019, at 23:16, William Tu wrote:
The RFC patch enables shared umem support. It requires kernel change
and
libbpf change, I will post it in another thread. I tested with
multiple
afxdp ports using skb mode. For example:
ovs-vsctl -- set interface afxdp-p0 options:n_rxq=1 type="af
In kernels older than 4.8, struct tcf_t didn't have the firstuse.
If openvswitch is compiled with the compat pkt_cls.h then there is
a struct size mismatch between openvswitch and the kernel which cause
parsing netlink actions to fail.
After this commit parsing the netlink actions pass even if comp
On 2019-11-05 11:04 PM, Ben Pfaff wrote:
> On Mon, Nov 04, 2019 at 10:11:05AM +0200, Roi Dayan wrote:
>> In kernels older than 4.8, struct tcf_t didn't have the firstuse.
>> If openvswitch is compiled with the compat pkt_cls.h then there is
>> a struct size mismatch between openvswitch and the k
On Mon, Nov 4, 2019 at 7:44 PM ychen wrote:
>
>
>
> we can easily reproduce this phenomenon by using tcp socket stream sending
> from ovs internal port.
>
>
>
>
> At 2019-10-30 19:49:16, "ychen" wrote:
>
> Hi,
>when we use docker to establish tcp session, we found that the packet
> which mu
Bleep bloop. Greetings Russell Bryant, I am a robot and I have tried out your
patch.
Thanks for your contribution.
I encountered some error that I wasn't expecting. See the details below.
checkpatch:
WARNING: Line is 184 characters long (recommended limit is 79)
#746 FILE: p-set-addresses:198
Hi,Ben,
I am agreed that ,under normal circumstances, there is no need to
allow left server back to origin server . But I met some strange situation. For
example ,sometimes, one server may be with two diffrent UUIDs recorded by
Leader server.
I think if the left server
On Tue, Nov 5, 2019 at 5:37 PM Darrell Ball wrote:
>
>
> On Tue, Nov 5, 2019 at 4:32 PM Yi Yang (杨燚)-云服务集团
> wrote:
>
>> Hi, folks
>>
>>
>>
>> We need to do SNAT for many internal IPs by just using several public IPs,
>> we also need to do DNAT by some other public IPs for exposing webservice,
>
On Tue, Nov 5, 2019 at 4:32 PM Yi Yang (杨燚)-云服务集团
wrote:
> Hi, folks
>
>
>
> We need to do SNAT for many internal IPs by just using several public IPs,
> we also need to do DNAT by some other public IPs for exposing webservice,
> openflow rules look like the below:
>
>
>
> table=0,ip,nw_src=172.1
Duplicate all of the IPv4 load balancing test cases for IPv6.
All of these are passing without any changes needed in OVN code, but
this will help ensure that we do not have any IPv6 load balancing
regressions in the future.
Signed-off-by: Russell Bryant
---
tests/system-ovn.at | 876
On 11/5/2019 3:14 PM, Ben Pfaff wrote:
On Tue, Nov 05, 2019 at 02:14:24PM -0800, Greg Rose wrote:
The missing inline keyword before the definition of the
rpl_nf_ct_tmpl_free() function causes spurious warnings about the
function not being used on some older kernels. Add the keyword
to suppres
On Tue, Nov 05, 2019 at 02:57:46PM -0800, William Tu wrote:
> +/* ODP_SUPPORT_FIELDS */
> +str_value = xasprintf("%"PRIuSIZE, odp.max_vlan_headers);
> +smap_add(cap, "max_vlan_headers", str_value);
> +free(str_value);
I think that you can shorten the above to:
smap_add_format(c
Hi, folks
We need to do SNAT for many internal IPs by just using several public IPs,
we also need to do DNAT by some other public IPs for exposing webservice,
openflow rules look like the below:
table=0,ip,nw_src=172.17.0.0/16,…,actions=ct(commit,table=0,zone=1,nat(src=
220.0.0.3,220.0.0.7,
Currently the shared umem feature is not supported in libbpf.
The patch removes the refcount check in libbpf to enable use of
shared umem. Also, a umem can be shared by multiple netdevs,
so remove the checking at xsk_bind.
Tested using OVS at:
https://mail.openvswitch.org/pipermail/ovs-dev/2019-N
On Tue, Nov 05, 2019 at 02:14:24PM -0800, Greg Rose wrote:
> The missing inline keyword before the definition of the
> rpl_nf_ct_tmpl_free() function causes spurious warnings about the
> function not being used on some older kernels. Add the keyword
> to suppress the warning.
>
> Signed-off-by: G
On Tue, Nov 05, 2019 at 01:20:35PM -0800, Ben Pfaff wrote:
> On Tue, Nov 05, 2019 at 09:54:08PM +0100, Ilya Maximets wrote:
> > 'xdpmode' is part of 'options', not the 'other_config'.
> >
> > CC: William Tu
> > Fixes: 0de1b425962d ("netdev-afxdp: add new netdev type for AF_XDP.")
> > Signed-off-b
The patch adds support for fetching the datapath's capabilities
from the result of 'check_support()', and write the supported capability
to a new database column, called 'capabilities' under Datapath table.
To see how it works, run:
# ovs-vsctl -- add-br br0 -- set Bridge br0 datapath_type=netdev
The RFC patch enables shared umem support. It requires kernel change and
libbpf change, I will post it in another thread. I tested with multiple
afxdp ports using skb mode. For example:
ovs-vsctl -- set interface afxdp-p0 options:n_rxq=1 type="afxdp"
options:xdpmode=skb
ovs-vsctl -- set inter
The missing inline keyword before the definition of the
rpl_nf_ct_tmpl_free() function causes spurious warnings about the
function not being used on some older kernels. Add the keyword
to suppress the warning.
Signed-off-by: Greg Rose
---
datapath/linux/compat/include/net/netfilter/nf_conntrack
On Tue, Nov 05, 2019 at 08:10:41PM +0800, taoyunupt wrote:
> Hi,Numan,
> When I run OVN/RAFT cluster, I found a server(which
> initiative to leave or be kicked off ) ,cannot be added back to origin
> cluster. I found the code as following, can you tell me the reason , many
> tha
On 11/5/2019 1:14 PM, Ben Pfaff wrote:
On Mon, Nov 04, 2019 at 12:43:47PM -0800, Greg Rose wrote:
There is a confusing mix of ipgre and gretap functions with some
needed for gretap still having ipgre_ prefixes. This time though
I think I got the rest of the unused ipgre code.
Passes Travis h
On Tue, Nov 05, 2019 at 09:40:26PM +0100, Ilya Maximets wrote:
> On 05.11.2019 20:20, Ben Pfaff wrote:
> > On Mon, Nov 04, 2019 at 02:22:34PM +0100, Ilya Maximets wrote:
> > > Sometimes interface updates could happen in a way ifnotifier is not
> > > able to catch. For example some heavy operations
On Tue, Nov 05, 2019 at 09:54:08PM +0100, Ilya Maximets wrote:
> 'xdpmode' is part of 'options', not the 'other_config'.
>
> CC: William Tu
> Fixes: 0de1b425962d ("netdev-afxdp: add new netdev type for AF_XDP.")
> Signed-off-by: Ilya Maximets
It's not clear to me whether the options related to
On Mon, Nov 04, 2019 at 12:43:47PM -0800, Greg Rose wrote:
> There is a confusing mix of ipgre and gretap functions with some
> needed for gretap still having ipgre_ prefixes. This time though
> I think I got the rest of the unused ipgre code.
>
> Passes Travis here and this time I made sure the
On Mon, Nov 04, 2019 at 10:11:05AM +0200, Roi Dayan wrote:
> In kernels older than 4.8, struct tcf_t didn't have the firstuse.
> If openvswitch is compiled with the compat pkt_cls.h then there is
> a struct size mismatch between openvswitch and the kernel which cause
> parsing netlink actions to fa
'xdpmode' is part of 'options', not the 'other_config'.
CC: William Tu
Fixes: 0de1b425962d ("netdev-afxdp: add new netdev type for AF_XDP.")
Signed-off-by: Ilya Maximets
---
vswitchd/vswitch.xml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/vswitchd/vswitch.xml b/vswitchd/
On 05.11.2019 20:20, Ben Pfaff wrote:
On Mon, Nov 04, 2019 at 02:22:34PM +0100, Ilya Maximets wrote:
Sometimes interface updates could happen in a way ifnotifier is not
able to catch. For example some heavy operations (device reset) in
netdev-dpdk could require re-applying of the bridge configu
Hi Wei
If I change my matrix:include to use "arch: ppc64le" rather than "os:
linux-ppc64le", will it eliminate your concern?
matrix:
include:
- - os: linux-ppc64le
+ - arch: ppc64le
compiler: gcc
env: OPTS="--disable-ssl"
Later when we want to enable the full matrix on all
Hi Flavio,
As per your inputs, I modified the gso_size, and now
skb_gso_validate_mtu(skb, mtu) is returning true, and
ip_finish_output2(sk, skb) and dst_neigh_output(dst, neigh, skb); are
getting called. But still, I am seeing the large packets getting dropped
somewhere in the kernel
down the line
On Mon, Nov 04, 2019 at 02:22:34PM +0100, Ilya Maximets wrote:
> Sometimes interface updates could happen in a way ifnotifier is not
> able to catch. For example some heavy operations (device reset) in
> netdev-dpdk could require re-applying of the bridge configuration.
>
> For this purpose new m
On Tue, Nov 05, 2019 at 07:42:51PM +0200, Lorenzo Bianconi wrote:
> >
> > On Tue, Nov 05, 2019 at 04:27:51PM +0200, Lorenzo Bianconi wrote:
> > > Allow jsonrpc clients (e.g. ovn-controller) to specify jsonrpc input
> > > buffer size in order to reduce overhead when downloading huge db size
> > > si
On Tue, Nov 05, 2019 at 01:06:13PM -0500, Russell Bryant wrote:
> On Tue, Nov 5, 2019 at 12:38 PM Ben Pfaff wrote:
>
> > On Tue, Nov 05, 2019 at 12:23:09PM -0500, Russell Bryant wrote:
> > > Duplicate all of the IPv4 load balancing test cases for IPv6.
> > > All of these are passing without any c
Bleep bloop. Greetings Russell Bryant, I am a robot and I have tried out your
patch.
Thanks for your contribution.
I encountered some error that I wasn't expecting. See the details below.
checkpatch:
WARNING: Line is 184 characters long (recommended limit is 79)
#757 FILE: p-set-addresses:199
From: Numan Siddique
If ha chassis rows of an HA chassis group become stale i.e the
HA_Chassis.chassis
column is empty (because ovn-controller is not running in that chassis)
except one row and when ha_chassis_group_is_active()
is called on that ovn-controller, then it returns false. Ideally it
Comments inline.
Best regards, Ilya Maximets.
On 05.11.2019 5:35, Anju Thomas via dev wrote:
Currently OVS maintains explicit packet drop/error counters only on port level.
Packets that are dropped as part of normal OpenFlow processing are counted in
flow stats of “drop” flows or as table mis
On Tue, Nov 5, 2019 at 12:38 PM Ben Pfaff wrote:
> On Tue, Nov 05, 2019 at 12:23:09PM -0500, Russell Bryant wrote:
> > Duplicate all of the IPv4 load balancing test cases for IPv6.
> > All of these are passing without any changes needed in OVN code, but
> > this will help ensure that we do not ha
>
> On Tue, Nov 05, 2019 at 04:27:51PM +0200, Lorenzo Bianconi wrote:
> > Allow jsonrpc clients (e.g. ovn-controller) to specify jsonrpc input
> > buffer size in order to reduce overhead when downloading huge db size
> > since current value is 512B. The user can specify rpc buffer size using
> > ov
On Tue, Nov 05, 2019 at 12:23:09PM -0500, Russell Bryant wrote:
> Duplicate all of the IPv4 load balancing test cases for IPv6.
> All of these are passing without any changes needed in OVN code, but
> this will help ensure that we do not have any IPv6 load balancing
> regressions in the future.
>
On Tue, Nov 05, 2019 at 04:27:51PM +0200, Lorenzo Bianconi wrote:
> Allow jsonrpc clients (e.g. ovn-controller) to specify jsonrpc input
> buffer size in order to reduce overhead when downloading huge db size
> since current value is 512B. The user can specify rpc buffer size using
> ovsdb_idl_set_
On Tue, Nov 05, 2019 at 12:04:39PM -0500, Nicolas Bouliane via dev wrote:
> > Can you try:
> >
> > # ovs-appctl dpctl/dump-conntrack system@ovs-system zone=5
> >
> > and see if you see the connection you've inserted is visible?
> >
>
> It doesn't work either... but it made me realize that in my
Duplicate all of the IPv4 load balancing test cases for IPv6.
All of these are passing without any changes needed in OVN code, but
this will help ensure that we do not have any IPv6 load balancing
regressions in the future.
Signed-off-by: Russell Bryant
---
tests/system-ovn.at | 887
Sometimes interface updates could happen in a way ifnotifier is not
able to catch. For example some heavy operations (device reset) in
netdev-dpdk could require re-applying of the bridge configuration.
For this purpose new manual notifier introduced. Its function
'if_notifier_manual_report()' cou
>
>
>
> Can you try:
>
> # ovs-appctl dpctl/dump-conntrack system@ovs-system zone=5
>
> and see if you see the connection you've inserted is visible?
>
It doesn't work either... but it made me realize that in my Docker
environment ovs-vswitchd runs with --enable-dummy=system ! (so it must be
it)
Hi William,
See some comments inline.
//Eelco
On 1 Nov 2019, at 21:14, William Tu wrote:
Now netdev-afxdp always forwards all packets to userspace because
it is using libbpf's default XDP program, see 'xsk_load_xdp_prog'.
There are some cases when users want to keep packets in kernel instead
On 20.10.2019 14:31, David Marchand wrote:
Hello,
On Tue, Oct 15, 2019 at 2:13 PM Ilya Maximets wrote:
On 14.10.2019 20:04, Aaron Conole wrote:
David Marchand writes:
Add a coverage counter to help diagnose contention on the vhost txqs.
This is seen as dropped packets on the physical port
On 05.11.2019 13:54, Sriram Vatala wrote:
Thanks Kevin for your response.
@i.maxim...@ovn.org : Can you please review the patch set.
I have it on my ToDo list for this week.
Best regards, Ilya Maximets.
___
dev mailing list
d...@openvswitch.org
htt
Allow jsonrpc clients (e.g. ovn-controller) to specify jsonrpc input
buffer size in order to reduce overhead when downloading huge db size
since current value is 512B. The user can specify rpc buffer size using
ovsdb_idl_set_remote routine passing requested value
Signed-off-by: Lorenzo Bianconi
-
Thanks Kevin for your response.
@i.maxim...@ovn.org : Can you please review the patch set.
Thanks & Regards,
Sriram.
-Original Message-
From: Kevin Traynor
Sent: 05 November 2019 16:07
To: Sriram Vatala ; ovs-dev@openvswitch.org;
i.maxim...@ovn.org
Cc: 'Ilya Maximets'
Subject: Re: [P
Signed-off-by: Dumitru Ceara
---
NEWS |1 +
1 file changed, 1 insertion(+)
diff --git a/NEWS b/NEWS
index 0ad9677..d7ef6e7 100644
--- a/NEWS
+++ b/NEWS
@@ -4,6 +4,7 @@ Post-OVS-v2.12.0
independently.
- Added IPv6 NAT support for OVN routers.
- Added Stateless Floating IP suppor
Signed-off-by: Dumitru Ceara
---
include/ovn/actions.h |1 -
lib/actions.c | 50 +
northd/ovn-northd.c | 15 +++
tests/ovn.at |3 +--
4 files changed, 17 insertions(+), 52 deletions(-)
diff --git a/include
Change the ovn-northd implementation to set the new 'controller_meter'
field for flows that need to punt packets to ovn-controller. For protocols
that get per port logical flows, any potential per port CoPP policies
take precedence over switch/router CoPP policies.
Protocol packets for which CoPP
Add new 'Copp' (Control plane protection) table to OVN Northbound DB:
- this stores mappings between control plane protocol names and meters
that should be used to rate limit controller-destined traffic for
those protocols.
Add new 'copp' columns to the following OVN Northbound DB tables:
- Lo
Add a new 'controller_meter' column to OVN Southbound Logical_Flow
table. This stores an optional string which should correspond to
the Meter that must be used for rate limiting controller actions
generated by packets hitting the flow.
Add a new 'ofctrl_add_flow_meter' function to create a new 'ov
This series adds support for user configured control plane protection
policies. Such policies are implemented through OVS meters and are
useful for protecting ovn-controller from being overloaded by control
traffic (any type of traffic that requires ovn-controller additional
processing).
First, lo
On Tue, Nov 5, 2019 at 1:47 PM Dumitru Ceara wrote:
>
> This series adds support for user configured control plane protection
> policies. Such policies are implemented through OVS meters and are
> useful for protecting ovn-controller from being overloaded by control
> traffic (any type of traffic
This series adds support for user configured control plane protection
policies. Such policies are implemented through OVS meters and are
useful for protecting ovn-controller from being overloaded by control
traffic (any type of traffic that requires ovn-controller additional
processing).
First, lo
Hi,Numan,
When I run OVN/RAFT cluster, I found a server(which initiative
to leave or be kicked off ) ,cannot be added back to origin cluster. I found
the code as following, can you tell me the reason , many thanks!
case RAFT_REC_NOTE:
if (!strcmp(r->note, "left")) {
On Tue, Nov 5, 2019 at 5:40 PM taoyunupt wrote:
>
> Hi,Numan,
> When I run OVN/RAFT cluster, I found a server(which
> initiative to leave or be kicked off ) ,cannot be added back to origin
> cluster. I found the code as following, can you tell me the reason , many
> thanks!
>
>
Приветствуем вас
Мы специалисты в подготовке любых баз данных компаний по любой отрасли в любом
городе.
Рекомендуем новую базу данных потенциальных клиентов.
Можно сделать выборку по категории, городу или заказать базу компаний по всей
Российской Федарации.
Эта база предприятий включает все р
On 05/11/2019 04:52, Sriram Vatala wrote:
> Hi All,
> Please consider this as a gentle remainder.
>
> Thanks & Regards,
> Sriram.
>
> -Original Message-
> From: Sriram Vatala
> Sent: 30 October 2019 11:57
> To: 'ovs-dev@openvswitch.org' ;
> 'ktray...@redhat.com' ; 'i.maxim...@ovn.org'
>
From: Numan Siddique
ovn-controller will periodically sends out the service monitor packets
for the services configured in the SB DB Service_Monitor table. This
patch makes use of the action - handle_svc_check to handle the service
monitor reply packets from the service.
This patch supports IPv4
From: Numan Siddique
This action will be used in an upcoming patch to handle the
service monitor replies from ovn-controller when it sends
out service monitor requests.
This action gets translated to openflow controller action.
Acked-by: Mark Michelson
Signed-off-by: Numan Siddique
---
inclu
From: Numan Siddique
This series adds load balancer health check feature. With this
ovn-controllers will periodically check the status of the backend
services. Only those services which are online/active will be considered
for load balancing.
Right now this feature is restricted to IPv4 Load bal
From: Numan Siddique
The present Load balancer feature in OVN provides load balancing
functionality to the back end ips without checking if the chosen
backend ip is reachable or not. In case a back end service is
down and if that IP is chosen, then packet will be lost.
This patch series adds the
Thanks for the review Eelco.
Regards
Anju
-Original Message-
From: Eelco Chaudron
Sent: Tuesday, November 5, 2019 1:23 PM
To: Anju Thomas
Cc: d...@openvswitch.org; i.maxim...@samsung.com; b...@ovn.org; Rohith
Basavaraja ; Keshav Gupta
Subject: Re: [PATCH v14] Improved Packet Drop Sta
64 matches
Mail list logo