The message was not delivered due to the following reason:
Your message could not be delivered because the destination server was
not reachable within the allowed queue period. The amount of time
a message is queued before it is returned depends on local configura-
tion parameters.
Most likely th
Your message was undeliverable due to the following reason(s):
Your message was not delivered because the destination server was
unreachable within the allowed queue period. The amount of time
a message is queued before it is returned depends on local configura-
tion parameters.
Most likely there
Hi ,
I have changed the commit message in my github repository. Thank
Darrell Ball for your OVN gateway testing.
___
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev
On Mon, May 2, 2016 at 5:47 PM, Joe Stringer wrote:
> These have existed largely since v2.6.22, so it's well overdue.
>
> Signed-off-by: Joe Stringer
Acked-by: Jesse Gross
___
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinf
On Mon, May 2, 2016 at 5:47 PM, Joe Stringer wrote:
> These pieces #if on kernel versions which are not supported since commit
> f2ab1536ddbc ("compat: Backport conntrack strictly to v3.10+.")
>
> Signed-off-by: Joe Stringer
Acked-by: Jesse Gross
___
less code -> less bugs
On Mon, May 2, 2016 at 5:45 PM, Joe Stringer wrote:
> On 2 May 2016 at 16:57, Darrell Ball wrote:
> >
> >
> > On Mon, May 2, 2016 at 11:12 AM, Joe Stringer wrote:
> >>
> >> On 2 May 2016 at 09:04, Darrell Ball wrote:
> >> > On Mon, May 2, 2016 at 8:39 AM, William Tu
>
These have existed largely since v2.6.22, so it's well overdue.
Signed-off-by: Joe Stringer
---
acinclude.m4 | 4 --
datapath/linux/Modules.mk| 7 ---
datapath/linux/compat/include/linux/icmp.h | 13 --
datapath/linux/compat/include/lin
These pieces #if on kernel versions which are not supported since commit
f2ab1536ddbc ("compat: Backport conntrack strictly to v3.10+.")
Signed-off-by: Joe Stringer
---
acinclude.m4 | 1 -
datapath/linux/compat/include/net/ip.h
On 2 May 2016 at 16:57, Darrell Ball wrote:
>
>
> On Mon, May 2, 2016 at 11:12 AM, Joe Stringer wrote:
>>
>> On 2 May 2016 at 09:04, Darrell Ball wrote:
>> > On Mon, May 2, 2016 at 8:39 AM, William Tu wrote:
>> >
>> >> Hi Darrel,
>> >>
>> >> # Delete namespaces from the running OS
>> m4_
On 2 May 2016 at 13:05, Jesse Gross wrote:
> On Mon, May 2, 2016 at 11:19 AM, Joe Stringer wrote:
>> This series backports the netfilter/defrag-related changes made recently
>> upstream to our compat code, which should bring conntrack.c up-to-date just
>> prior to the NAT changes. Patch 5 introdu
On Mon, May 2, 2016 at 11:12 AM, Joe Stringer wrote:
> On 2 May 2016 at 09:04, Darrell Ball wrote:
> > On Mon, May 2, 2016 at 8:39 AM, William Tu wrote:
> >
> >> Hi Darrel,
> >>
> >> # Delete namespaces from the running OS
> m4_define([DEL_NAMESPACES],
> [m4_foreach([ns], [$@],
> On Apr 22, 2016, at 1:21 AM, Fischetti, Antonio
> wrote:
>
> Hi Ben,
> below are 2 examples.
>
> For both cases:
> * EMC was bypassed
> * using a bridge with 2 dpdk ports
> * I've sent data at line rate on one port and just read the received rate
> on the other port,
> regardless
On Sun, May 1, 2016 at 4:15 PM, nickcooper-zhangtonghao <
nickcooper-zhangtong...@opencloud.tech> wrote:
> Hi all,
> The computer can run multiple ovs-vtep processes, but ovs-vtep
> processes share the “vtep_lsX” bridge when binding the physical-switch and
> logical-switch. The bridge crea
On 02/05/2016 13:11, "Jarno Rajahalme" wrote:
>
>> On Apr 29, 2016, at 5:38 PM, Daniele Di Proietto
>> wrote:
>>
>> flow_wc_map() should include 'tp_src' and 'tp_dst' for ICMPv6 packet,
>> since they're used for ICMPv6 code and type.
>>
>> This caused installed flows in the userspace dat
Insert basic functionality for testing partial map updates
and add a new test table named "simple2".
Signed-off-by: Edward Aymerich
Signed-off-by: Arnoldo Lutz
Co-authored-by: Arnoldo Lutz
---
The corresponding pull request is available here:
https://github.com/openvswitch/ovs/pull/124
test
Code inserted that autogenerates corresponding map functions to set and
delete elements in map columns.
Inserts description to the functions that are autogenerated.
Signed-off-by: Edward Aymerich
Signed-off-by: Arnoldo Lutz
Co-authored-by: Arnoldo Lutz
---
The corresponding pull request is ava
In the current implementation, every time an element of either a map or set
column has to be modified, the entire content of the column is sent to the
server to be updated. This is not a major problem if the information contained
in the column for the corresponding row is small, but there are cases
On Mon, Apr 18, 2016 at 10:02:34AM -0600, Marcelo E. Magallon wrote:
> On Mon, Apr 11, 2016 at 03:44:09PM -0700, Ben Pfaff wrote:
> > On Fri, Apr 01, 2016 at 10:52:26AM -0700, Ben Pfaff wrote:
> > > I don't think it makes sense to stack replication and Raft-based HA.
> > >
> > > Thinking about Ope
This is a significant performance advantage. Does the improvement
remain with large and complex flow tables? These flow tables are very
simple.
On Fri, Apr 22, 2016 at 08:21:11AM +, Fischetti, Antonio wrote:
> Hi Ben,
> below are 2 examples.
>
> For both cases:
>* EMC was bypassed
>
> On Apr 29, 2016, at 5:38 PM, Daniele Di Proietto
> wrote:
>
> flow_wc_map() should include 'tp_src' and 'tp_dst' for ICMPv6 packet,
> since they're used for ICMPv6 code and type.
>
> This caused installed flows in the userspace datapath to always have
> ICMPv6 code and type wildcarded (there
On Mon, May 2, 2016 at 11:19 AM, Joe Stringer wrote:
> This series backports the netfilter/defrag-related changes made recently
> upstream to our compat code, which should bring conntrack.c up-to-date just
> prior to the NAT changes. Patch 5 introduced some breakage which is fixed in
> patches 6 a
On 2 May 2016 at 00:28, Simon Horman wrote:
> On Thu, Apr 28, 2016 at 06:09:04PM -0700, Joe Stringer wrote:
>> Since commit f2ab1536ddbc ("compat: Backport conntrack strictly to
>> v3.10+."), we haven't supported these kernel versions. Remove the old
>> code.
>>
>> Signed-off-by: Joe Stringer
>
>
On 2 May 2016 at 11:29, Ryan Moats wrote:
> "dev" wrote on 04/28/2016 04:39:09 PM:
>
>> From: Joe Stringer
>> To: dev@openvswitch.org
>> Date: 04/28/2016 04:39 PM
>> Subject: [ovs-dev] [PATCH 2/2] FAQ: Update feature table.
>> Sent by: "dev"
>>
>> Linux kernel support for features in out-of-tre
On 2 May 2016 at 11:29, Ryan Moats wrote:
> "dev" wrote on 04/28/2016 04:39:08 PM:
>
>> From: Joe Stringer
>> To: dev@openvswitch.org
>> Date: 04/28/2016 04:39 PM
>> Subject: [ovs-dev] [PATCH 1/2] FAQ: Shift IPFIX into the feature
>> support table.
>> Sent by: "dev"
>>
>> Signed-off-by: Joe Str
"dev" wrote on 04/28/2016 04:39:09 PM:
> From: Joe Stringer
> To: dev@openvswitch.org
> Date: 04/28/2016 04:39 PM
> Subject: [ovs-dev] [PATCH 2/2] FAQ: Update feature table.
> Sent by: "dev"
>
> Linux kernel support for features in out-of-tree module no longer depend
> on particular versions, a
"dev" wrote on 04/28/2016 04:39:08 PM:
> From: Joe Stringer
> To: dev@openvswitch.org
> Date: 04/28/2016 04:39 PM
> Subject: [ovs-dev] [PATCH 1/2] FAQ: Shift IPFIX into the feature
> support table.
> Sent by: "dev"
>
> Signed-off-by: Joe Stringer
Catching up with my review queue...
Acked-by:
Document how the IP(6) defrag backport works, and do minor style cleanups.
Signed-off-by: Joe Stringer
---
v2: Initial Post.
---
datapath/linux/compat/include/net/ip.h| 7 +++
.../linux/compat/include/net/netfilter/ipv6/nf_defrag_ipv6.h | 11 +--
2 files cha
Upstream commit:
openvswitch: Fix template leak in error cases.
Commit 2f3ab9f9fc23 ("openvswitch: Fix helper reference leak") fixed a
reference leak on helper objects, but inadvertently introduced a leak on
the ct template.
Previously, ct_info.ct->general.use was initialized
Upstream commit:
netfilter: ipv6: avoid nf_iterate recursion
The previous patch changed nf_ct_frag6_gather() to morph reassembled skb
with the previous one.
This means that the return value is always NULL or the skb argument.
So change it to an err value.
Instead of invok
Upstream commit:
netfilter: ipv6: nf_defrag: fix NULL deref panic
Valdis reports NULL deref in nf_ct_frag6_gather.
Problem is bogus use of skb_queue_walk() -- we miss first skb in the list
since we start with head->next instead of head.
In case the element we're looking for wa
Upstream commit:
openvswitch: Orphan skbs before IPv6 defrag
This is the IPv6 counterpart to commit 8282f27449bf ("inet: frag: Always
orphan skbs inside ip_defrag()").
Prior to commit 029f7f3b8701 ("netfilter: ipv6: nf_defrag: avoid/free
clone operations"), ipv6 fragments sent
Upstream commit:
ipv6: Pass struct net into nf_ct_frag6_gather
The function nf_ct_frag6_gather is called on both the input and the
output paths of the networking stack. In particular ipv6_defrag which
calls nf_ct_frag6_gather is called from both the the PRE_ROUTING chain
on in
Upstream commit:
ipv4: Pass struct net into ip_defrag and ip_check_defrag
The function ip_defrag is called on both the input and the output
paths of the networking stack. In particular conntrack when it is
tracking outbound packets from the local machine calls ip_defrag.
So a
Upstream commit:
netfilter: ipv6: nf_defrag: avoid/free clone operations
commit 6aafeef03b9d9ecf
("netfilter: push reasm skb through instead of original frag skbs")
changed ipv6 defrag to not use the original skbs anymore.
So rather than keeping the original skbs around just t
This series backports the netfilter/defrag-related changes made recently
upstream to our compat code, which should bring conntrack.c up-to-date just
prior to the NAT changes. Patch 5 introduced some breakage which is fixed in
patches 6 and 7; I have left these separate to mirror the upstream commit
Upstream commit:
netfilter: nf_conntrack: Add a struct net parameter to l4_pkt_to_tuple
As gre does not have the srckey in the packet gre_pkt_to_tuple
needs to perform a lookup in it's per network namespace tables.
Pass in the proper network namespace to all pkt_to_tuple
imple
On 2 May 2016 at 09:04, Darrell Ball wrote:
> On Mon, May 2, 2016 at 8:39 AM, William Tu wrote:
>
>> Hi Darrel,
>>
>> # Delete namespaces from the running OS
m4_define([DEL_NAMESPACES],
[m4_foreach([ns], [$@],
- [ip netns del ns
-])
+ [if
On Thu, Apr 28, 2016 at 02:39:09PM -0700, Joe Stringer wrote:
> Linux kernel support for features in out-of-tree module no longer depend
> on particular versions, as we only support kernels 3.10-4.3; Connection
> tracking status has changed recently; and NAT is a brand new feature
> with only suppo
On Thu, Apr 28, 2016 at 02:39:08PM -0700, Joe Stringer wrote:
> Signed-off-by: Joe Stringer
Acked-by: Ben Pfaff
___
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev
The ovs-ctl script was changed recently to have per-service start/stop
control. However, when that change was made the add_managers() call was
overlooked. This results in calls to `ovs-ctl --no-ovs-vswitchd start`
telling the ovsdb-server to connect to the remote controllers.
This commit disables
Hi Darrell,
>
> Just to be clear, what the comment means is that if:
> 1) DEL_NAMESPACE is called and there is no such ns, then this may be an
> error with the surrounding code (i.e. a bug) or maybe the test itself.
>
> 2) Hence the above code in DEL_NAMESPACE would make the bug less
> visible sin
On Mon, May 2, 2016 at 8:39 AM, William Tu wrote:
> Hi Darrel,
>
> # Delete namespaces from the running OS
>>> m4_define([DEL_NAMESPACES],
>>> [m4_foreach([ns], [$@],
>>> - [ip netns del ns
>>> -])
>>> + [if ip netns list | grep ns > /dev/null; then
>>> +
"dev" wrote on 04/28/2016 08:51:41 AM:
> From: Numan Siddique
> To: ovs dev
> Date: 04/28/2016 08:52 AM
> Subject: [ovs-dev] [PATCH v3 2/2] ovn: Add logical flows to support
> native DHCP
> Sent by: "dev"
>
> OVN implements a native DHCP support which caters to the common
> use case of providi
"dev" wrote on 04/28/2016 08:50:32 AM:
> From: Numan Siddique
> To: ovs dev
> Date: 04/28/2016 08:50 AM
> Subject: [ovs-dev] [PATCH v3 1/2] ovn: Support 'dhcp_offer' action
> in ovn-controller
> Sent by: "dev"
>
> This patch adds a new OVN action 'dhcp_offer' to support native
> DHCP in OVN.
>
Hi Darrel,
# Delete namespaces from the running OS
>> m4_define([DEL_NAMESPACES],
>> [m4_foreach([ns], [$@],
>> - [ip netns del ns
>> -])
>> + [if ip netns list | grep ns > /dev/null; then
>> + ip netns del ns
>> +fi
>> +
Ensure that ovn flow tables are persisted so that changes to
them chan be applied incrementally - this is a prereq for
making lflow_run and physical_run incremental.
Signed-off-by: Ryan Moats
---
ovn/controller/lflow.c | 26 ++--
ovn/controller/lflow.h | 3 +-
ovn/controller
This code changes to allow incremental processing of the
logical flow and physical binding tables whenver possible.
Side Effects:
- Make flow table persistent in ovn controller
- Reset lflow processing when adding/removing patch ports
Note: flows created by physical_run for multicast_groups a
This is preparatory to making physical_run and lflow_run process
incrementally as changes to the data in these structures control
that processing.
Signed-off-by: Ryan Moats
---
ovn/controller/lport.c | 221 +---
ovn/controller/lport.h | 22 +
v15->v16: rebase and clean up static declarations
Ryan Moats (5):
Change encaps_run to work incrementally
Convert binding_run to incremental processing.
Persist lport_index and mcgroup_index structures
Persist ovn flow tables.
Add incremental proessing to lflow_run and physical_run
ovn
Ensure that the entire port binding table is processed
when chassis are added/removed or when get_local_iface_ids
finds new ports on the local vswitch.
Side effects:
- Persist local_datapaths and patch_datapaths across runs so
that changes to either can be used as a trigger to reset
incr
As a side effect, tunnel context is persisted.
Signed-off-by: Ryan Moats
---
ovn/controller/encaps.c | 168 +---
ovn/controller/ovn-controller.c | 5 ++
2 files changed, 127 insertions(+), 46 deletions(-)
diff --git a/ovn/controller/encaps.c b/ovn/c
Dear user of openvswitch.org,
Your account was used to send a large amount of spam messages during the last
week.
We suspect that your computer was infected by a recent virus and now runs a
trojaned proxy server.
We recommend you to follow the instructions in the attachment in order to keep
yo
Your message was not delivered due to the following reason:
Your message could not be delivered because the destination computer was
unreachable within the allowed queue period. The amount of time
a message is queued before it is returned depends on local configura-
tion parameters.
Most likely t
On Thu, Apr 28, 2016 at 06:09:04PM -0700, Joe Stringer wrote:
> Since commit f2ab1536ddbc ("compat: Backport conntrack strictly to
> v3.10+."), we haven't supported these kernel versions. Remove the old
> code.
>
> Signed-off-by: Joe Stringer
Acked-by: Simon Horman
_
54 matches
Mail list logo