Hi,
Below is a document that describes the design and implementation of OVS for
Hyper-V that my team in VMware has been working on. The focus was to work on
the implementation of the kernel components and leverage the userspace port. We
have most of the pieces working, and the document describes
Applied all three patches to master, thx for the review,
On Fri, Jun 13, 2014 at 5:41 PM, Alex Wang wrote:
> TXN_UNCOMMITTED should not be possible here (because we just committed
>> it). If you want to check for it (I probably wouldn't bother) then
>> I'd use an assertion:
>> > +/
>
> TXN_UNCOMMITTED should not be possible here (because we just committed
> it). If you want to check for it (I probably wouldn't bother) then
> I'd use an assertion:
> > +/* Sets the 'status_txn_try_again' if the transaction
> fails. */
> > +if (status == TXN_SUCCESS || s
This commit introduces a new data structure used for receiving packets from
netdevs and passing them to dpifs.
The purpose of this change is to allow storing some private data for each
packet. The subsequent commits make use of it.
Signed-off-by: Daniele Di Proietto
---
lib/automake.mk
The netdev_send function has been modified to accept multiple packets, to
allow netdev providers to amortize locking and queuing costs.
This is especially true for netdev-dpdk.
Later commits exploit the new API.
Signed-off-by: Daniele Di Proietto
---
lib/dpif-netdev.c | 4 +-
lib/netdev-b
This change in dpif-netdev allows faster packet processing for devices which
implement batching (netdev-dpdk currently).
Signed-off-by: Daniele Di Proietto
---
lib/dpif-netdev.c| 354 +++
lib/dpif.c | 12 +-
lib/odp-execute.c
Changes from v4:
rebased
simplified error handling in netdev_linux_send()
moved dpif_packet functions into a separate .c file
cosmetic changes
Changes from v3:
struct dpif_packet has its own header
removed many dpif_packet functions (using ofpbuf directly instead)
avoided copying in dpif_execute
On Fri, Jun 13, 2014 at 10:46:07AM -0700, Ben Pfaff wrote:
> On Fri, Jun 13, 2014 at 11:06:09AM +0900, Simon Horman wrote:
> > dd51dae29bccca3 ("ofproto: Move logic for collecting read-only rules into
> > rule_criteria.") modifies modify_flows__ such that the variable error,
> > the return value, m
On Fri, Jun 13, 2014 at 11:19:39AM -0700, Ben Pfaff wrote:
> On Tue, Jun 10, 2014 at 07:27:09PM +0900, Simon Horman wrote:
> > This is analogous to ofoperation_has_out_port,
> > operating on a group rather than a port.
> >
> > This is in preparation for adding out_group support to flow monitors
>
Thx for the review, applied to master.
On Fri, Jun 13, 2014 at 10:48 AM, Ben Pfaff wrote:
> On Mon, Jun 09, 2014 at 02:28:44PM -0700, Alex Wang wrote:
> > Non-leader revalidator thread uses pthread_barrier_* functions in their
> > main loop to synchronize with leader thread. However, since tho
Previously the out_port of a flow monitor was
checked in ofmonitor_report() using ofoperation_has_out_port().
When ofoperation_has_out_port() was removed so was the call to
it in ofmonitor_report() thus flow monitor updates are longer
filtered on the out_port.
This restores filtering on the out_p
On Fri, Jun 13, 2014 at 4:13 PM, Ben Pfaff wrote:
> On Fri, Jun 13, 2014 at 12:08:40PM -0700, Jesse Gross wrote:
>> In most cases, tunnel ports specify a dpif name to act as the backing
>> port in the datapath. However, in the case of UDP tunnels the type is
>> used with the port number appended.
On Fri, Jun 13, 2014 at 03:49:13PM -0700, Gurucharan Shetty wrote:
> On Thu, Jun 12, 2014 at 4:07 PM, Ben Pfaff wrote:
> > The Open vSwitch SSL code was inadvertently enabling only TLSv1, not
> > later versions. This commit should fix it.
> >
> > Signed-off-by: Ben Pfaff
> > Reported-by: Abhinav
On Fri, Jun 13, 2014 at 02:44:46PM -0700, Andy Zhou wrote:
> On Fri, Jun 13, 2014 at 8:40 AM, Ben Pfaff wrote:
> > We've forgotten more than once. Most updates coincide with adding
> > new flow members, so a build assertion on FLOW_WC_SEQ seems appropriate.
> >
> > Signed-off-by: Ben Pfaff
>
>
On Fri, Jun 13, 2014 at 11:40:24AM +0900, Simon Horman wrote:
> If NXFMF_OWN is set then full updates should be sent.
> Prior to this change an abbreviated update is always sent
> to the controller to which a monitor belongs, that is,
> the NXFMF_OWN flag is ignored.
>
> Also:
> * Update existing
On Fri, Jun 13, 2014 at 11:40:23AM +0900, Simon Horman wrote:
> The flow monitoring tests includes a perl script to sort multiline
> messages. This commit breaks it out of an individual test so that it can
> be used elsewhere.
>
> Signed-off-by: Simon Horman
> [b...@nicira.com changed approach f
On Fri, Jun 13, 2014 at 04:13:15PM -0700, Ben Pfaff wrote:
> On Fri, Jun 13, 2014 at 12:08:40PM -0700, Jesse Gross wrote:
> > In most cases, tunnel ports specify a dpif name to act as the backing
> > port in the datapath. However, in the case of UDP tunnels the type is
> > used with the port number
On Fri, Jun 13, 2014 at 12:08:40PM -0700, Jesse Gross wrote:
> In most cases, tunnel ports specify a dpif name to act as the backing
> port in the datapath. However, in the case of UDP tunnels the type is
> used with the port number appended. This is potentially a problem for
> IPsec tunnels becaus
On Fri, Jun 13, 2014 at 02:21:36PM -0700, Linda Sun wrote:
> On windows platform, TCP_NODELAY can only be set when TCP
> is established. If the conection is not immediately returning
> success, call it when state is changed from TCP_CONNECTING
> to SSL_CONNECTING.
>
> Signed-off-by: Linda Sun
A
On Fri, Jun 13, 2014 at 03:34:25PM -0700, Gurucharan Shetty wrote:
> On Fri, Jun 13, 2014 at 3:28 PM, Ben Pfaff wrote:
> > A few Open vSwitch source files use a type named HANDLE on Windows systems,
> > in a way that makes it easier to avoid #ifdefs if we have a dummy
> > definition on other platf
On Thu, Jun 12, 2014 at 4:07 PM, Ben Pfaff wrote:
> The Open vSwitch SSL code was inadvertently enabling only TLSv1, not
> later versions. This commit should fix it.
>
> Signed-off-by: Ben Pfaff
> Reported-by: Abhinav Singhal
Based on https://www.openssl.org/docs/ssl/SSL_CTX_new.html
and http:/
On Fri, Jun 13, 2014 at 3:28 PM, Ben Pfaff wrote:
> A few Open vSwitch source files use a type named HANDLE on Windows systems,
> in a way that makes it easier to avoid #ifdefs if we have a dummy
> definition on other platforms. was a really weird place
> for this dummy definition. This commit
Until now, the OVS source tree has had a whole maze of header files that
make "#include " work OK regardless of platform, but
this confuses everyone new to the tree, at first glance, and is difficult
to understand at second glance too.
This commit moves the core of the Netlink definitions that wer
Open vSwitch userspace uses special types to indicate that a particular
object may not be naturally aligned. Netlink is one source of such
problems: in Netlink, 64-bit integers are often aligned only on 32-bit
boundaries. Now that the header file for Open vSwitch datapath Netlink
definitions has
A few Open vSwitch source files use a type named HANDLE on Windows systems,
in a way that makes it easier to avoid #ifdefs if we have a dummy
definition on other platforms. was a really weird place
for this dummy definition. This commit moves it to util.h.
Signed-off-by: Ben Pfaff
---
include
Thanks for the review!
Pushed in two separate commits and the for statement restored and backported to
branch-2.1 and branch-2.3.
More comments below,
Jarno
On Jun 11, 2014, at 2:46 PM, Ben Pfaff wrote:
> On Mon, Jun 09, 2014 at 03:06:22PM -0700, Jarno Rajahalme wrote:
>> When reaching the
On Fri, Jun 13, 2014 at 8:40 AM, Ben Pfaff wrote:
> We've forgotten more than once. Most updates coincide with adding
> new flow members, so a build assertion on FLOW_WC_SEQ seems appropriate.
>
> Signed-off-by: Ben Pfaff
Good idea.
Acked-by: Andy Zhou
_
Git am warning.
git am dd2.patch
Applying: datapath: keep mask array compact when deleting mask
/home/pravin/ovs/cln/.git/rebase-apply/patch:119: trailing whitespace.
if (i < ma->max)
warning: 1 line adds whitespace errors.
On Wed, Jun 11, 2014 at 2:24 PM, Andy Zhou wrote:
> When deleting a
On windows platform, TCP_NODELAY can only be set when TCP
is established. If the conection is not immediately returning
success, call it when state is changed from TCP_CONNECTING
to SSL_CONNECTING.
Signed-off-by: Linda Sun
---
lib/stream-ssl.c | 36
1 file
Dear dev@openvswitch.org, this is your quarantine summary from the CudaMail
Spam & Virus Firewall.
You have 1 messages in your spam quarantine inbox. To view the contents of
your quarantine inbox or to manage your spam preferences, please open the
following link in your browser:
https://web.cu
OK.
Can you add the information about this only working on Windows after
connection completion to the change log, and then factor out the new
duplicated code into a function (probably in socket-util.[ch])? Then
it makes sense to apply it.
Thanks,
Ben.
On Fri, Jun 13, 2014 at 08:56:13PM +,
I'm probably wrong, but my interpretation is that this ends up being an no-op
on windows.
But without moving it down, setsockopt() would fail, and I can't establish
connections to NVP controller.
Linda
-Original Message-
From: Ben Pfaff [mailto:b...@nicira.com]
Sent: Friday, June 13,
Is TCP_NODELAY actually the right way to disable Nagle on Windows?
The Microsoft documentation at
http://msdn.microsoft.com/en-us/library/windows/desktop/ms740476(v=vs.85).aspx
says that "This socket option is included for backward compatibility
with Windows Sockets 1.1" which implies that there's
On windows platform, setsockopt would return invalid argument if called before
tcp is connected.
Linda
-Original Message-
From: Ben Pfaff [mailto:b...@nicira.com]
Sent: Friday, June 13, 2014 1:36 PM
To: Linda Sun
Cc: dev@openvswitch.org
Subject: Re: [ovs-dev] [PATCH] Only set TCP_NODELA
On Fri, Jun 13, 2014 at 01:35:18PM -0700, Linda Sun wrote:
> Signed-off-by: Linda Sun
Why?
___
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev
Signed-off-by: Linda Sun
---
lib/stream-ssl.c | 26 +++---
1 file changed, 19 insertions(+), 7 deletions(-)
diff --git a/lib/stream-ssl.c b/lib/stream-ssl.c
index 3f753d1..aad7d8c 100644
--- a/lib/stream-ssl.c
+++ b/lib/stream-ssl.c
@@ -260,13 +260,15 @@ new_ssl_stream(cons
On Wed, Jun 11, 2014 at 01:34:43PM +0900, Simon Horman wrote:
> Signed-off-by: Simon Horman
Looks good at first glance. Please rebase when you get a chance.
Thanks,
Ben.
___
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo
On Wed, Jun 11, 2014 at 01:34:42PM +0900, Simon Horman wrote:
> Buffer a multi-part requests until all its parts are received.
>
> This is achieved by initialising the list_node field of messages
> and passing them to ofmp_req_filter().
>
> * If the message is not recognised as part of a multi-pa
On Fri, Jun 13, 2014 at 01:22:46PM -0700, Ben Pfaff wrote:
> On Wed, Jun 11, 2014 at 01:34:41PM +0900, Simon Horman wrote:
> > Add helpers for allowing requests and use them in handle_openflow__().
> >
> > This is a in preparation for supporting multipart requests
> > on a per message type basis.
On Wed, Jun 11, 2014 at 01:34:41PM +0900, Simon Horman wrote:
> Add helpers for allowing requests and use them in handle_openflow__().
>
> This is a in preparation for supporting multipart requests
> on a per message type basis.
>
> Signed-off-by: Simon Horman
As is, ofpmsg_is_mp_request() coul
On Tue, Jun 10, 2014 at 10:03:52AM -0700, Alex Wang wrote:
> This commit adds logic that checks the return value of status_txn
> transaction and runs the update again if the transaction fails
> (transaction status is not 'TXN_SUCCESS', 'TXN_UNCHANGED', or
> 'TXN_INCOMPLETE').
>
> To keep the code
On Tue, Jun 10, 2014 at 10:03:51AM -0700, Alex Wang wrote:
> Currently, ofproto_port_get_bfd/cfm_status() is used to check the
> bfd/cfm status change and query the status change. Users decide
> what to do with the filled status struct based on the return value
> of the funciton. Such design is c
On Tue, Jun 10, 2014 at 10:03:50AM -0700, Alex Wang wrote:
> This commit adds a new function, cfm_get_status(), for extracting
> all cfm status at once. This helps avoid the sequence of lock
> acquire/release in current implementation of status query.
>
> Signed-off-by: Alex Wang
Acked-by: Ben
On Tue, Jun 10, 2014 at 07:03:44PM +0530, Avinash wrote:
> This commit contains the following changes:
> 1. New vlan variables (tpid and count) are added to flow structure to support
>provider VLANs.
> 2. miniflow_extract() initialises these new variables based on received
>packet.
> 3. Alt
On Tue, Jun 10, 2014 at 07:04:07PM +0530, Avinash wrote:
> Introduced new parameter dvlan-tags in other-config to support
> provider VLANs at access port.
>
> Help and usage of this new parameter is updated vswitch.xml
>
> Signed-off-by: Avinash
Maybe the documentation in this patch is good eno
On Fri, Jun 13, 2014 at 12:27:12PM -0700, Ben Pfaff wrote:
> On Tue, Jun 10, 2014 at 07:04:28PM +0530, Avinash wrote:
> > This commit includes:
> > 1. Support for new config parameter in xbundle.
> > 2. Changes in determining the vlan id and number of VLANs to be present
> >in the output packet
On Tue, Jun 10, 2014 at 07:04:28PM +0530, Avinash wrote:
> This commit includes:
> 1. Support for new config parameter in xbundle.
> 2. Changes in determining the vlan id and number of VLANs to be present
>in the output packet.
>
> For testing purpose, planned to make changes in normalize-acti
On Wed, Jun 11, 2014 at 1:50 AM, Thomas Graf wrote:
> On 06/10/14 at 04:47pm, Jesse Gross wrote:
>> When calculating the source port for the UDP header, LISP primarily
>> uses skb_get_hash() but needs a backup in case this fails. The
>> current backup is a hash of the entire flow key but this incl
In most cases, tunnel ports specify a dpif name to act as the backing
port in the datapath. However, in the case of UDP tunnels the type is
used with the port number appended. This is potentially a problem for
IPsec tunnels because they have different types but should have the
same backing port. Th
On Tue, Jun 10, 2014 at 07:27:04PM +0900, Simon Horman wrote:
> this patch-set is a first-pass at adding support for OpenFlow1.4 flow
> monitor. It leverages the existing NX flow monitor extension. There are,
> however, enough differences between the two to make this a substantial
> patch-set.
>
>
On Tue, Jun 10, 2014 at 07:27:36PM +0900, Simon Horman wrote:
> This is analogous to Nicira extension support.
>
> This is in preparation for supporting EXT-187: flow entry notification
> extension (ONF flow monitor).
>
> Signed-off-by: Simon Horman
Thanks, I'll apply this in a minute.
On Tue, Jun 10, 2014 at 07:27:08PM +0900, Simon Horman wrote:
> Add OFPRAW_OFPST14_FLOW_MONITOR_REQUEST and
> OFPRAW_OFPST14_FLOW_MONITOR_REPLY.
>
> This is a step towards supporting OpenFlow1.4 flow monitors.
>
> Signed-off-by: Simon Horman
Applied, thanks!
On Tue, Jun 10, 2014 at 07:27:09PM +0900, Simon Horman wrote:
> This is analogous to ofoperation_has_out_port,
> operating on a group rather than a port.
>
> This is in preparation for adding out_group support to flow monitors
> which is in turn in preparation for supporting OpenFlow1.4 flow monit
On Tue, Jun 10, 2014 at 07:27:07PM +0900, Simon Horman wrote:
> Add OFPET_FLOW_MONITOR_FAILED which is added in OpenFLow1.4.
> Map the OFPERR_NXBRC_FM_* errors to the corresponding new OpenFlow errors.
>
> This is a step towards supporting OpenFlow1.4 flow monitors.
>
> Signed-off-by: Simon Horma
On Fri, Jun 13, 2014 at 11:08:37AM -0700, Gurucharan Shetty wrote:
> On Thu, Jun 12, 2014 at 3:35 PM, Ben Pfaff wrote:
> > On Fri, Jun 06, 2014 at 10:04:31AM -0700, Gurucharan Shetty wrote:
> >> The new command is of the form 'time/warp LARGE_MSECS MSECS'.
> >> It advances the current monotonic ti
The new command is of the form 'time/warp LARGE_MSECS MSECS'.
It advances the current monotonic time by LARGE_MSECS. This is done MSECS
at a time in each run of the main thread. This gives other threads
time to run after the clock has been advanced by MSECS.
The old command would continue to work.
On Thu, Jun 12, 2014 at 3:35 PM, Ben Pfaff wrote:
> On Fri, Jun 06, 2014 at 10:04:31AM -0700, Gurucharan Shetty wrote:
>> The new command is of the form 'time/warp LARGE_MSECS MSECS'.
>> It advances the current monotonic time by LARGE_MSECS. This is done MSECS
>> at a time in each run of the main
On Tue, Jun 10, 2014 at 07:27:06PM +0900, Simon Horman wrote:
> Use enum ofp14_flow_monitor_flags in place of enum nx_flow_monitor_flags in
> struct ofputil_flow_monitor_request and struct rule, translating between
> the two enumerations as necessary.
>
> The motivation for this patch is to move t
On Tue, Jun 10, 2014 at 07:27:05PM +0900, Simon Horman wrote:
> This is in preparation for supporting OpenFlow1.4
> flow monitor requests.
>
> Signed-off-by: Simon Horman
Thanks, I'll apply this soon with a few typos fixed (one of them is
in the OF1.4 spec):
diff --git a/include/openflow/openfl
On Mon, Jun 09, 2014 at 02:28:44PM -0700, Alex Wang wrote:
> Non-leader revalidator thread uses pthread_barrier_* functions in their
> main loop to synchronize with leader thread. However, since those threads
> only call poll_block() intermittently, the poll interval check in
> poll_block() can wr
On Fri, Jun 13, 2014 at 11:06:09AM +0900, Simon Horman wrote:
> dd51dae29bccca3 ("ofproto: Move logic for collecting read-only rules into
> rule_criteria.") modifies modify_flows__ such that the variable error,
> the return value, may be uninitialised if either of the following is true:
>
> 1. ofp
On Mon, Jun 09, 2014 at 11:53:55AM -0700, Jarno Rajahalme wrote:
> Use cmap instead of hmap & hindex in classifier. Performance impact
> with current locking strategy is not yet tested. Later patches will
> introduce RCU into the classifer.
into the "classifier".
> Signed-off-by: Jarno Rajahalm
On Mon, Jun 09, 2014 at 11:53:54AM -0700, Jarno Rajahalme wrote:
> Reduce the number of goto statements by returning via a new helper
> fill_range_wc() when no match is found.
>
> Signed-off-by: Jarno Rajahalme
I slightly lean toward making fill_range_wc() a void function, but
this is OK too.
A
On Mon, Jun 09, 2014 at 11:53:53AM -0700, Jarno Rajahalme wrote:
> miniflow_and_mask_matches_flow_wc() fills in the masks in flow
> wildcards, so a separate step to that effect is no longer needed.
>
> Signed-off-by: Jarno Rajahalme
Acked-by: Ben Pfaff
__
On Mon, Jun 09, 2014 at 11:53:52AM -0700, Jarno Rajahalme wrote:
> When, during a classifier lookup, we narrow down to a single potential
> rule, it is enough to match on ("unwildcard") one bit that differs
> between the packet and the rule.
>
> This is a special case of the more general algorithm
On Fri, Jun 13, 2014 at 10:21:36AM -0700, Ben Pfaff wrote:
> On Mon, Jun 09, 2014 at 11:53:52AM -0700, Jarno Rajahalme wrote:
> > When, during a classifier lookup, we narrow down to a single potential
> > rule, it is enough to match on ("unwildcard") one bit that differs
> > between the packet and
On Mon, Jun 09, 2014 at 11:53:52AM -0700, Jarno Rajahalme wrote:
> When, during a classifier lookup, we narrow down to a single potential
> rule, it is enough to match on ("unwildcard") one bit that differs
> between the packet and the rule.
>
> This is a special case of the more general algorithm
On Mon, Jun 09, 2014 at 11:53:51AM -0700, Jarno Rajahalme wrote:
> Factor out the priority vector code from the classifier.
>
> Making the classifier use RCU instead of locking requires parallel
> access to the priority vector, pointing to subtables in descending
> priority order. When a new subt
OK, thanks! I didn't realize that I was reviewing an old version;
I'm glad that I didn't look deeper, then.
On Fri, Jun 13, 2014 at 09:14:50AM -0700, Daniele Di Proietto wrote:
> I posted a v4 few days later, but since I need to apply this change
> I?ll post a v5 as soon as possible.
>
> Daniele
Thanks for the suggestions Ben.
I posted a v4 few days later, but since I need to apply this change I’ll post a
v5 as soon as possible.
Daniele
On Jun 13, 2014, at 9:10 AM, Ben Pfaff wrote:
> On Fri, Jun 06, 2014 at 05:13:14PM -0700, Daniele Di Proietto wrote:
>> The netdev_send function has
On Fri, Jun 06, 2014 at 05:13:14PM -0700, Daniele Di Proietto wrote:
> The netdev_send function has been modified to accept multiple packets, to
> allow netdev providers to amortize locking and queuing costs.
> This is especially true for netdev-dpdk.
>
> Later commits exploit the new API.
>
> Si
On Mon, Jun 09, 2014 at 10:23:54PM -0700, Andy Zhou wrote:
> Yes indeed. ovs_wait() internally sleeps. The first sleep is with
> 0.1 seconds. So fractional seconds are portable after all.
I don't know whether they are portable in practice, but ovs_wait works
even if they are not portable. The c
On Fri, Jun 06, 2014 at 05:13:13PM -0700, Daniele Di Proietto wrote:
> This commit introduces a new data structure used for receiving packets from
> netdevs and passing them to dpifs.
> The purpose of this change is to allow storing some private data for each
> packet. The subsequent commits make u
On Jun 12, 2014, at 4:54 PM, Ben Pfaff wrote:
> On Thu, Jun 12, 2014 at 04:37:33PM -0700, Daniele Di Proietto wrote:
>> Since dpif_netdev_enumerate() is used for "netdev" and "dummy" class, it
>> incorrectly lists dpif-netdevs as "dummy" and vice versa.
>> This patches address the issue by chang
We've forgotten more than once. Most updates coincide with adding
new flow members, so a build assertion on FLOW_WC_SEQ seems appropriate.
Signed-off-by: Ben Pfaff
---
lib/odp-util.h |7 +++
1 file changed, 3 insertions(+), 4 deletions(-)
diff --git a/lib/odp-util.h b/lib/odp-util.h
in
On Thu, Jun 12, 2014 at 10:41:30PM -0700, Andy Zhou wrote:
> Signed-off-by: Andy Zhou
Acked-by: Ben Pfaff
___
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev
WSAStartup() needs to be called before using winsock2 related
functions. We need this for almost all the utilities. So call
it through OVS_CONSTRUCTOR.
Signed-off-by: Gurucharan Shetty
---
lib/stream.c | 29 -
lib/util.c | 11 +++
2 files changed, 11 ins
As of now, when a process tries to reacquire a lockfile, we
return EEXIST on Windows and print a different error message.
This means that the unit tests need to look for different error
messages too. Linux uses EDEADLK for the same. EDEADLK feels like
a good error description for Windows too and th
basename() and dir_name() are not used for Windows and won't work well if
used. So put a '#ifndef _WIN32' around them to prevent future calls.
test-file_name.c tests the above 2 functions. It makes sense to merge
this single function file with test-util.c and then not compile it for
Windows.
Sig
Most of the Python code in Open vSwitch repo does not work
on Windows. Till that porting is done, simply skip all
Python tests.
Signed-off-by: Gurucharan Shetty
---
v1-v2:
* Abandoned commits in v1 that selectively disabled Python tests
and instead added this single commit.
---
tests/atlocal
There is no 'kill -l' type functionality available on Windows.
So instead of looking for the string 'ABRT', check for the exit
code in both platforms. On msys (unit test environment), it is 9
and on Linux, it is 134 (SIGABRT + 128).
On Windows, stderr is fully buffered if connected to a pipe.
Make
After the change, both of them compile. test-netflow related
unit tests pass.
test-sflow related tests do not pass because
of LOOPBACK_INTERFACE constraints for 'agent'.
(It should be revisited later.)
Signed-off-by: Gurucharan Shetty
---
v1-v2:
Remove the call to winsock_start() as WSAStartup
When a OVS daemon is configured to run as a Windows service,
when the service is stopped by calling service_stop(), the
windows services manager does not give enough time to do
everything in the atexit handler. So call the exit handler
directly from service_stop().
Also add a test case for Windows
On Fri, Jun 13, 2014 at 07:44:58PM +0530, Rahul Arora wrote:
> I am working on openvswitch version 2.1.2. But i am facing one issue in
> this.
>
> When i am adding port in a bridge,Then my CPU usage is increasing to 100%.
>
> When i am commenting the following line in the file (* vim
> openvswitc
Hi All,
I am working on openvswitch version 2.1.2. But i am facing one issue in
this.
When i am adding port in a bridge,Then my CPU usage is increasing to 100%.
When i am commenting the following line in the file (* vim
openvswitch-2.1.2/lib/seq.c*)
*poll_immediate_wake(); //line number 17
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 13 Jun 2014 06:07:31 -0700
Source: openvswitch
Binary: openvswitch-datapath-source openvswitch-datapath-dkms
openvswitch-common openvswitch-switch openvswitch-ipsec openvswitch-pki
openvswitch-dbg python-openvswi
openvswitch_2.1.0+git20140411-3_i386.changes uploaded successfully to localhost
along with the files:
openvswitch-common_2.1.0+git20140411-3_i386.deb
openvswitch-switch_2.1.0+git20140411-3_i386.deb
openvswitch-ipsec_2.1.0+git20140411-3_i386.deb
openvswitch-dbg_2.1.0+git20140411-3_i386.deb
Hi,
A quick follow up to know if you would be interested to acquire a list of MS
HyperV-End Users & Partners.
Let me know if you are focused on any particular application/technology
users or titles so that I can get back to you with all the relevant details.
Your questions and queries w
On Fri, Jun 13, 2014 at 12:00 AM, Arpit Kumar wrote:
> Hi all,
> I am working with ovs-switch where the ovs-switch say O1 has a controller
> say C. Now O1 has some pre-installed rule inside it which I manually install
> using ovs-ofctl.
> I want the controller C to be connected to it but I want O1
Hi all,
I am working with ovs-switch where the ovs-switch say O1 has a controller
say C. Now O1 has some pre-installed rule inside it which I manually
install using ovs-ofctl.
I want the controller C to be connected to it but I want O1 to ignore all
flow-rules that is tried to be install by my cont
90 matches
Mail list logo