>-Original Message-
>From: Ilya Maximets
>Sent: Wednesday, 3 January 2024 19:12
>To: Eli Britstein ; ovs-discuss@openvswitch.org
>Cc: Maor Dickman ; i.maxim...@ovn.org
>Subject: Re: [ovs-discuss] Match on header rewrite fields
>
>External email: Use caution open
Hello,
In case there is a header rewrite action, OVS implicitly adds match on the
corresponding fields.
For example:
ovs-ofctl add-flow br-int0
'in_port=enp8s0f0,ip,actions=mod_dl_dst=00:11:22:33:44:55,enp8s0f0_0'
The datapath flow will have an exact match on dl_dst field.
Does someone know
>-Original Message-
>From: Aaron Conole
>Sent: Wednesday, 17 May 2023 16:32
>To: Kevin Traynor
>Cc: Eli Britstein ; Ilya Maximets ;
>ovs-discuss@openvswitch.org
>Subject: Re: [ovs-discuss] dpdk-lcore-mask
>
>External email: Use caution opening links or att
>-Original Message-
>From: Ilya Maximets
>Sent: Tuesday, 9 May 2023 21:04
>To: Eli Britstein ; ovs-discuss@openvswitch.org
>Cc: Kevin Traynor ; Aaron Conole
>; i.maxim...@ovn.org
>Subject: Re: [ovs-discuss] dpdk-lcore-mask
>
>External email: Use caution o
Hello,
With [1], dpdk-lcore-mask configuration was introduced, instead of passing
explicitly dpdk EAL options.
Commits [2]-[3] handle this code area.
Currently, the affinity is restored to the original one only if the user did
not set any dpdk-lcore-mask, and it is "auto_determine".
In case it
>-Original Message-
>From: Ilya Maximets
>Sent: Tuesday, 1 November 2022 12:23
>To: Eli Britstein ; Donald Sharp
>; ovs-discuss@openvswitch.org;
>e...@eecs.berkeley.edu
>Cc: i.maxim...@ovn.org
>Subject: Re: [ovs-discuss] ovs-vswitchd running at 100% cpu
>
&
>-Original Message-
>From: Ilya Maximets
>Sent: Monday, 31 October 2022 23:54
>To: Donald Sharp ; ovs-
>disc...@openvswitch.org; e...@eecs.berkeley.edu; Eli Britstein
>
>Cc: i.maxim...@ovn.org
>Subject: Re: [ovs-discuss] ovs-vswitchd running at 100% cpu
>
&
Hello,
I am trying to use Address Sanitizer to detect issues.
With a simple code of use-after-free it works, but with postponed free,
there
is no detection of the problem.
Compilation is done with:
make -j CFLAGS="-O0 -g3 -Werror -fsanitize=address
-fno-omit-frame-pointer -fno-common"
Simple
Hello,
I have 2 ports connected in a bridge, and traffic is going, offloaded
(full).
Doing that, I remove one port "ovs-vsctl del-port pf".
Adding it back, traffic resumes, but OVS does not create the correct
flows, as the rules were not deleted properly with del-port.
The issue is that:
Hello,
Working in non quiescent state in this thread is necessary, as done in
6c95dbf96bed ("dpif-netdev: End the quiescent state for flow offloading
thread.").
However, when there are a lot of flows to offload, and if
rte_flow_create/rte_flow_destroy take a while,makes the thread stay
Hi
I see this file has many inconsistencies against the one from DPDK
(18.11.2).
For example, this API:
rte_flow_query(uint16_t port_id,
struct rte_flow *flow,
enum rte_flow_action_type action,
void *data,
struct rte_flow_error *error);
is
On 11/19/2019 7:46 PM, Ilya Maximets wrote:
> On 19.11.2019 18:29, Eli Britstein wrote:
>> On 11/19/2019 7:27 PM, Eli Britstein wrote:
>>> Hi
>>>
>>> I see this file has many inconsistencies against the one from DPDK
>>> (18.11.2).
>>>
>
On 11/19/2019 7:27 PM, Eli Britstein wrote:
> Hi
>
> I see this file has many inconsistencies against the one from DPDK
> (18.11.2).
>
> For example, this API:
>
> rte_flow_query(uint16_t port_id,
> struct rte_flow *flow,
> en
On 6/18/2019 8:11 PM, William Tu wrote:
> On Tue, Jun 18, 2019 at 9:15 AM William Tu wrote:
>> On Mon, Jun 17, 2019 at 10:46 PM Eli Britstein wrote:
>>>
>>> On 6/18/2019 1:22 AM, Gregory Rose wrote:
>>>> On 6/12/2019 2:20 AM, Eli Britstein wrote:
>&
On 6/18/2019 1:22 AM, Gregory Rose wrote:
>
> On 6/12/2019 2:20 AM, Eli Britstein wrote:
>> Could you please have a look (and even better try?) still need to
>> tidy up
>>
>> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Felibr-mell
On 6/11/2019 8:04 PM, Gregory Rose wrote:
On 6/6/2019 2:25 PM, Eli Britstein wrote:
Thanks, I really appreciate it. However, though I see you find it to
work on Ubuntu 16.04 with kernel 4.4 (I will try it myself too), I think
we should think how to fix the upstream tunnels (in Linux kernel
On 6/6/2019 7:33 PM, Gregory Rose wrote:
>
> On 6/5/2019 11:52 PM, Eli Britstein wrote:
>> On 6/5/2019 9:04 PM, Gregory Rose wrote:
>>>
>>> On 6/5/2019 10:31 AM, Eli Britstein wrote:
>>>> On 6/5/2019 8:11 PM, Gregory Rose wrote:
>>>>&g
On 6/5/2019 9:04 PM, Gregory Rose wrote:
>
>
> On 6/5/2019 10:31 AM, Eli Britstein wrote:
>> On 6/5/2019 8:11 PM, Gregory Rose wrote:
>>>
>>> On 6/4/2019 8:13 AM, Eli Britstein wrote:
>>>> Hello,
>>>>
>>>> I would like to config
On 6/5/2019 8:11 PM, Gregory Rose wrote:
>
>
> On 6/4/2019 8:13 AM, Eli Britstein wrote:
>> Hello,
>>
>> I would like to configure a GRE tunnel over IPv6, on a Linux system.
>
> Which Linux system? Distro, kernel version, etc?
Fedora 28.
Kernel upstream
On 6/4/2019 9:38 PM, Ben Pfaff wrote:
> On Tue, Jun 04, 2019 at 06:08:00PM +0000, Eli Britstein wrote:
>> On 6/4/2019 8:24 PM, Ben Pfaff wrote:
>>> On Tue, Jun 04, 2019 at 03:13:02PM +0000, Eli Britstein wrote:
>>>> Hello,
>>>>
>>>> I woul
On 6/4/2019 8:24 PM, Ben Pfaff wrote:
> On Tue, Jun 04, 2019 at 03:13:02PM +0000, Eli Britstein wrote:
>> Hello,
>>
>> I would like to configure a GRE tunnel over IPv6, on a Linux system.
>> However, I encounter the following:
>>
>> My command:
>> ovs-
Hello,
I would like to configure a GRE tunnel over IPv6, on a Linux system.
However, I encounter the following:
My command:
ovs-vsctl add-port br1 gre6 -- set interface gre6 type=ip6gre
options:remote_ip= 2001:db8:0:f102::11 options:key=55
Output:
ovs-vsctl: Error detected while setting up
22 matches
Mail list logo