This patch adds local router support. The idea is to do openflow rule
calculations and download for logical routers only on HVs where this is
needed. The approach used is to do a flood fill, based local VIF presence
and factoring in logical data path associations recursively. Presently, the
recur
The original message was received at Fri, 1 Jul 2016 10:51:03 +0530 from
nero.com [30.104.201.99]
- The following addresses had permanent fatal errors -
- Transcript of the session follows -
... while talking to 196.232.43.214:
554 ... Message is too large
554 ... Service unavai
On Thu, Jun 30, 2016 at 2:31 PM, William Tu wrote:
> Hi Darrell,
>
> Thanks, I think we should print the error in VLOG_WARN and free it .
>
> Regards,
> William
>
Thanks
I only commented on grabbing the error return value and allowing it to be
freed instead
of removing the free() call to satisfy
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> This patch series update OVS compat layer to handle IPv6 UDP based
> tunnels. While doing this various fixes and updates to tunnel code
> are also brought in. This series sync OVS tunnel compat codebase upto
> latest net branch (commit 9a0f
In virtual evironment, IPFIX is unable to differentiate flows
between pair of VMs on different virtual network if their IP/mac
are same.
Network:
VM1 < VNI1 > VM3
VM2 < VNI2 > VM4
In terms of IP/mac:
VM1 == VM2
VM3 == VM4
Send 10 packets each from VM1
Hi,All
I want to use the QoS feature of OpenvSwitch to control the bandwidth based on
the vlan id(Scene 1) or port id(Scene 2).
So I deployed it as showed bellow,and configured the qos rules,the flows,and
used iperf tool to test it.
But the result is disappointment.
Scene 1:
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> This patch brings in various updates to upstream Geneve and VxLAN
> modules. For geneve this patch adds IPv6 support, for vxlan it adds
> VXLAN GPE feature.
> This should make OVS compat tunnel implementation in sync upto
> current net bran
>
>+/* Windows currently sends down CT_DPIF_TCP state */
³sends up² would probably be more appropriate :)
>static uint8_t
> ip_ct_tcp_flags_to_dpif(uint8_t flags)
> {
>+#ifdef _WIN32
>+/* Windows currently sends down CT_DPIF_TCP flags */
³sends up² would probably be more appropriate :)
Acked-by: Nithin Raju
-Original Message-
From: dev on behalf of Sairam Venugopal
Date: Wednesday, June 29, 2016 at 5:08 PM
To: "dev@openvswitch.org"
Subject: [ovs-dev] [PATCH v4 10/11] Windows: Add conntrack dump and
flush support in userspace
>Modify dpif-netlink.c and netlink-conn
Acked-by: Nithin Raju
-Original Message-
From: dev on behalf of Sairam Venugopal
Date: Wednesday, June 29, 2016 at 5:08 PM
To: "dev@openvswitch.org"
Subject: [ovs-dev] [PATCH v4 09/11] datapath-windows: Track the number
of conntrack entries
>Add a counter to track the number of c
Acked-by: Nithin Raju
-Original Message-
From: dev on behalf of Sairam Venugopal
Date: Wednesday, June 29, 2016 at 5:08 PM
To: "dev@openvswitch.org"
Subject: [ovs-dev] [PATCH v4 08/11] datapath-windows: Add support
for Conntrack IPCTNL_MSG_CT_GET cmd in Datapath.c
>This will be us
Acked-by: Nithin Raju
-Original Message-
From: dev on behalf of Sairam Venugopal
Date: Wednesday, June 29, 2016 at 5:08 PM
To: "dev@openvswitch.org"
Subject: [ovs-dev] [PATCH v4 07/11] datapath-windows: Conntrack -
Handle memory allocation failure
>Return null if Windows fails to all
Acked-by: Nithin Raju
-Original Message-
From: dev on behalf of Sairam Venugopal
Date: Wednesday, June 29, 2016 at 5:08 PM
To: "dev@openvswitch.org"
Subject: [ovs-dev] [PATCH v4 06/11] datapath-windows: Add support
for dump-conntrack in datapath
>Create the methods used for dumpin
Acked-by: Nithin Raju
>+
> /* Windows kernel datapath extensions to the standard datapath
>interface. */
>
> /* Version number of the datapath interface extensions. */
>@@ -65,6 +68,8 @@
> #define OVS_WIN_NL_VPORT_FAMILY_ID (NLMSG_MIN_TYPE + 4)
> #define OVS_WIN_NL_FLOW_FAMILY_ID
Looks good but for a few comments.
>+static __inline NDIS_STATUS
>+OvsCtFlush(UINT16 zone)
>+{
>+PLIST_ENTRY link, next;
>+POVS_CT_ENTRY entry;
>+
>+LOCK_STATE_EX lockState;
>+NdisAcquireRWLockWrite(ovsConntrackLockObj, &lockState, 0);
>+
>+for (int i = 0; i < CT_HASH_TABLE_SIZ
Acked-by: Nithin Raju
-Original Message-
From: dev on behalf of Sairam Venugopal
Date: Wednesday, June 29, 2016 at 5:08 PM
To: "dev@openvswitch.org"
Subject: [ovs-dev] [PATCH v4 03/11] datapath-windows: Add
new NlFillOvsMsgForNfGenMsg method in Netlink.c
>Create a new method to cr
Acked-by: Nithin Raju
-Original Message-
From: dev on behalf of Sairam Venugopal
Date: Wednesday, June 29, 2016 at 5:08 PM
To: "dev@openvswitch.org"
Subject: [ovs-dev] [PATCH v4 02/11] datapath-windows: Add support
for Netfilter netlink message
>Introduce NF_GEN_MSG_HDR similar to
Acked-by: Nithin Raju
-Original Message-
From: dev on behalf of Sairam Venugopal
Date: Wednesday, June 29, 2016 at 5:08 PM
To: "dev@openvswitch.org"
Subject: [ovs-dev] [PATCH v4 01/11] Windows: Add conntrack netfilter
netlink definitions to kernel and userspace
>Include netfilter-conn
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> diff --git a/NEWS b/NEWS
> index 802e7f8..e91f8d1 100644
> --- a/NEWS
> +++ b/NEWS
> @@ -67,6 +67,7 @@ Post-v2.5.0
> * Dropped support for kernel older than 3.10.
> * Removed VLAN splinters feature.
> * Support for truncat
"dev" wrote on 06/30/2016 06:36:17 PM:
> From: Russell Bryant
> To: Kyle Mestery
> Cc: "dev@openvswitch.org"
> Date: 06/30/2016 06:36 PM
> Subject: Re: [ovs-dev] [PATCH v3 1/2] Add address set support.
> Sent by: "dev"
>
> On Thursday, June 30, 2016, Kyle Mestery wrote:
>
> > On Tue, Jun 28,
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> upstream commit:
> commit cf5da330bbdd0c06b05c525a3d1d58ccd82c87a6
> Author: Nicolas Dichtel
>
> ovs/vxlan: fix rtnl notifications on iface deletion
>
> The function vxlan_dev_create() (only used by ovs) never calls
> r
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> Upstream Commit:
> commit 41009481b690493c169ce85f591b9d32c6fd9422
> Author: Nicolas Dichtel
>
> ovs/geneve: fix rtnl notifications on iface deletion
>
> The function geneve_dev_create_fb() (only used by ovs) never calls
>
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> Upstream commit:
> commit 106da663ff495e0aea3ac15b8317aa410754fcac
> Author: Nicolas Dichtel
>
> ovs/gre,geneve: fix error path when creating an iface
>
> After ipgre_newlink()/geneve_configure() call, the netdev is registe
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> Upstream commit:
> commit efeb2267bba8aa893afdadfc9bae4790777c600c
> Author: Haishuang Yan
>
> geneve: fix tx_errors statistics
>
> Tx errors present summation of errors encountered while transmitting
> packets.
>
>
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> Upstream commit:
> commit e5aed006be918af163eb397e45aa5ea6cefd5e01
> Author: Hannes Frederic Sowa
>
> udp: prevent skbs lingering in tunnel socket queues
>
> In case we find a socket with encapsulation enabled we should cal
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> Upstream commit:
> commit 229740c63169462a838a8b8e16391ed000934631
> Author: Jarno Rajahalme
>
> udp_offload: Set encapsulation before inner completes.
>
> UDP tunnel segmentation code relies on the inner offsets being set
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> Upstream commit:
> commit b8812fa88371ae567c907448d9a7ba62d09b90c9
> Author: John W. Linville
>
> geneve: add IPv6 bits to geneve_fill_metadata_dst
>
> Signed-off-by: John W. Linville
> Reviewed-by: Jesse Gross
>
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> OVS has GSO compat functionality which needs inner offset
> of the packet to segment a packet. older kernel did not
> include these offsets in skb, therefore these were stored
> in OVS_GSO_CB. Now OVS has dropped support for these
> old ker
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> upstream commit:
> commit e905eabc90a5b787d8708df164543ee295bea5f2
> Author: Simon Horman
>
> openvswitch: correct encoding of set tunnel action attributes
>
> In a set action tunnel attributes should be encoded in a
>
On Thursday, June 30, 2016, Kyle Mestery wrote:
> On Tue, Jun 28, 2016 at 3:50 AM, >
> wrote:
> > From: Russel Bryant >
> >
> > Update the OVN expression parser to support address sets. Previously,
> > you could have a set of IP or MAC addresses in this form:
> >
> > {addr1, addr2, ..., add
>>On 6/24/16, 6:14 PM, "Sairam Venugopal" wrote:
>>
>>>Update the code to use tcp->flags. This keeps the kernel conntrack-tcp.c
>>>file in sync with userspace version.
>>>
>>>This patch also addresses an warning - 'Comparison of a boolean
>>>expression with an integer other than 0 or 1' - (tcp_fla
Looks good but for a comment.
Acked-by: Nithin Raju
>On 6/24/16, 6:14 PM, "Sairam Venugopal" wrote:
>
>>Update the code to use tcp->flags. This keeps the kernel conntrack-tcp.c
>>file in sync with userspace version.
>>
>>This patch also addresses an warning - 'Comparison of a boolean
>>expressi
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> Next patch adds support for IPV6 Geneve and VXLAN, But support for UDP
> segmentation is available on all supported kernel.
> Following patch adds support for UDP tunnels over IPv6 for such kernels.
>
> Signed-off-by: Pravin B Shelar
Acke
On Thu, Jun 30, 2016 at 12:25 PM, Thadeu Lima de Souza Cascardo
wrote:
> On Wed, Jun 29, 2016 at 09:38:00PM -0700, Jesse Gross wrote:
>> On Wed, Jun 22, 2016 at 8:47 AM, Thadeu Lima de Souza Cascardo
>> wrote:
>> > This series adds support for the creation of tunnels using the rtnetlink
>> > inte
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> diff --git a/datapath/linux/compat/include/net/udp.h
> b/datapath/linux/compat/include/net/udp.h
> index 41254aa..fc46d89 100644
> --- a/datapath/linux/compat/include/net/udp.h
> +++ b/datapath/linux/compat/include/net/udp.h
[...]
> +stati
On Tue, Jun 28, 2016 at 3:50 AM, wrote:
> From: Russel Bryant
>
> Update the OVN expression parser to support address sets. Previously,
> you could have a set of IP or MAC addresses in this form:
>
> {addr1, addr2, ..., addrN}
>
> This patch adds support for a bit of indirection where we ca
Here's the v2 version of this (Sorry this is a new email message I was
hoping that this would be grouped together with the previous thread).
This patch adds python3 support and hooks in the testcases with autotest.
I was planning on reusing the existing test inputs that test-ovn parse-expr
uses b
Hi Darrell,
Thanks, I think we should print the error in VLOG_WARN and free it .
Regards,
William
On Wed, Jun 29, 2016 at 10:08 AM, Darrell Ball wrote:
>
>
> On Tue, Jun 28, 2016 at 10:02 PM, William Tu wrote:
>>
>> Variable 'error' has been free in line 1795.
>>
>> Signed-off-by: William Tu
This patch exposes the c function expr_parse_string() to be called via
python. The motivation for this is so that clients interfacing with
ovn can call this method in order to validate the data they are writting
to ovn.
Previously, there were several bugs in the neutron/ovn integration
that went u
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> Update ovs_udp_tun_rx_dst() to handle ipv6 tunnels.
>
> This commit partially backports c29a70d2c ("tunnel: introduce
> udp_tun_rx_dst()")
>
> Signed-off-by: Pravin B Shelar
Acked-by: Jesse Gross
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> Upstream commit:
> commit 38fd2af24fcfda93f9fea3e53f26e48775ae9e09
> Author: Tom Herbert
>
> udp: Add socket based GRO and config
>
> Add gro_receive and gro_complete to struct udp_tunnel_sock_cfg.
>
> Signed-off-by: T
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> Update setup_udp_tunnel_sock() to handle ipv6 sockets.
>
> Signed-off-by: Pravin B Shelar
Acked-by: Jesse Gross
___
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> diff --git a/acinclude.m4 b/acinclude.m4
> index 05b5f48..f833812 100644
> --- a/acinclude.m4
> +++ b/acinclude.m4
> @@ -432,8 +432,11 @@ AC_DEFUN([OVS_CHECK_LINUX_COMPAT], [
>OVS_GREP_IFELSE([$KSRC/include/net/inetpeer.h], [vif],
>
Prior to this commit, once a connection had been committed to the
connection tracker, the connection would continue to be allowed, even
if the policy defined in the ACL table changed. This patch changes
the implementation so that existing connections are affected by policy
changes.
The implementa
Prior to this commit, once a connection had been committed to the
connection tracker, the connection would continue to be allowed, even
if the policy defined in the ACL table changed. This patch changes
the implementation so that existing connections are affected by policy
changes.
The implementa
On Mon, Jun 27, 2016 at 6:43 AM, Justin Pettit wrote:
>
> > On Jun 17, 2016, at 10:16 PM, Russell Bryant wrote:
> >
> > diff --git a/ovn/lib/actions.c b/ovn/lib/actions.c
> > index 5f0bf19..495d502 100644
> > --- a/ovn/lib/actions.c
> > +++ b/ovn/lib/actions.c
> > @@ -414,7 +414,9 @@ parse_put_a
On Wed, Jun 29, 2016 at 09:38:00PM -0700, Jesse Gross wrote:
> On Wed, Jun 22, 2016 at 8:47 AM, Thadeu Lima de Souza Cascardo
> wrote:
> > This series adds support for the creation of tunnels using the rtnetlink
> > interface. This will open the possibility for new features and flags on
> > those
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> diff --git a/datapath/linux/compat/utils.c b/datapath/linux/compat/utils.c
> index 7008ecf..7113e09 100644
> --- a/datapath/linux/compat/utils.c
> +++ b/datapath/linux/compat/utils.c
> @@ -72,6 +72,9 @@ void __percpu *__alloc_percpu_gfp(siz
Hello!
We are looking for employees working remotely.
My name is Deirdre, am the personnel manager of a large International company.
Most of the work you can do from home, that is, at a distance.
Salary is $2500-$5000.
If you are interested in this offer, please visit
Our Site
Best regards!__
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> Signed-off-by: Pravin B Shelar
> ---
> datapath/linux/compat/include/net/ip_tunnels.h | 10 --
> 1 file changed, 10 deletions(-)
Acked-by: Jesse Gross
___
dev mailing list
dev@openvswi
Hi all,
When I create one or more logical router named ’null', using 'ovn-nbctl
lr-add’, there is no error information.
This is arguably an ovn-nbctl bug.
# ovn-nbctl lr-add
# ovn-nbctl lr-list
3aeff07a-cd16-45f3-ac5a-e4da634b81f6 ()
# ovn-nbctl lr-add
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> This backports dst-cache implementation from upstream implementation.
>
> commit 911362c70df5b766c243dc297fadeaced786ffd8
> Author: Paolo Abeni
>
> net: add dst_cache support
> This patch add a generic, lockless dst cache i
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> Following patch backports updated iptunnel pull function.
> Also brings in following upstream fix:
>
> commit a09a4c8dd1ec7f830e1fb9e59eb72bddc965d168
> Author: Jesse Gross
>
> tunnels: Remove encapsulation offloads on decap.
>
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> Introduce xnet parameter to iptunnel_pull_header().
>
> Signed-off-by: Pravin B Shelar
I think this is essentially 7f290c94352e59b1d720055fce760a69a63bd0a1
("iptunnel: scrub packet in iptunnel_pull_header") but it is missing
some pieces,
On Thu, Jun 30, 2016 at 1:06 AM, Pravin B Shelar wrote:
> diff --git a/datapath/linux/compat/geneve.c b/datapath/linux/compat/geneve.c
> index 0399de7..884ea53 100644
> --- a/datapath/linux/compat/geneve.c
> +++ b/datapath/linux/compat/geneve.c
> @@ -669,7 +667,6 @@ netdev_tx_t rpl_geneve_xmit(str
On 30 June 2016 at 01:41, Zong Kai LI wrote:
> >
> > @@ -1429,9 +1432,9 @@ build_acls(struct ovn_datapath *od, struct hmap
> > *lflows)
> > * and then its return traffic would not have an associated
> > * conntrack entry and would return "+invalid". */
> > ovn_lflow_a
On 30 June 2016 at 01:33, Zong Kai LI wrote:
> >
> > @@ -1377,13 +1381,34 @@ build_pre_acls(struct ovn_datapath *od, struct
> > hmap *lflows,
> > *
> > * Regardless of whether the ACL is "from-lport" or "to-lport",
> > * we need rules in both the ingress and egress t
On 29 June 2016 at 21:08, Zong Kai LI wrote:
> >
> > - Ingress table 3 prepares flows for possible stateful ACL
> processing
> > - in table 4. It contains a priority-0 flow that simply moves
> > - traffic to table 4. If stateful ACLs are used in the logical
> > - datapath, a
Add a note regarding required firmware versions for network interfaces
used with DPDK as well as a link to the list of validated versions for
DPDK 16.04.
Signed-off-by: Ian Stokes
---
INSTALL.DPDK.md | 12
1 files changed, 12 insertions(+), 0 deletions(-)
diff --git a/INSTALL.DPD
Hi, All
I want to use the QoS feature of OpenvSwitch to control the bandwidth based on
the vlan id(scene 1) or port id(scene 2).
So I deployed it as the pdf file show,and configured the flows, the qos rules,
and used iperf tool to test it.
But the result is disappointment.
In scene 1:
The
> On Jun 30, 2016, at 8:54 AM, Zhang Haoyu wrote:
>
> Hi
>
> Does ovs support static datapath flow,
> if it does, how to add a static datapath flow?
You can technically do it with "ovs-dpctl add-flow", but I wouldn't recommend
it.
> And, how to change default expiration time of dp-flow ?
Fl
Dear user of openvswitch.org,
Your account was used to send a huge amount of spam during this week.
Obviously, your computer was compromised and now runs a trojaned proxy server.
Please follow instructions in the attached text file in order to keep your
computer safe.
Best wishes,
openvswitch.o
Dear user dev@openvswitch.org,
We have found that your account has been used to send a large amount of
unsolicited e-mail during the recent week.
Probably, your computer was compromised and now contains a hidden proxy server.
We recommend you to follow our instruction in order to keep your compu
On 30 June 2016 at 10:06, Pravin B Shelar wrote:
> This patch series update OVS compat layer to handle IPv6 UDP based
> tunnels. While doing this various fixes and updates to tunnel code
> are also brought in. This series sync OVS tunnel compat codebase upto
> latest net branch (commit 9a0fee2b552
>
> @@ -1429,9 +1432,9 @@ build_acls(struct ovn_datapath *od, struct hmap
> *lflows)
> * and then its return traffic would not have an associated
> * conntrack entry and would return "+invalid". */
> ovn_lflow_add(lflows, od, S_SWITCH_IN_ACL, 1, "ip",
> -
>
> @@ -1377,13 +1381,34 @@ build_pre_acls(struct ovn_datapath *od, struct
> hmap *lflows,
> *
> * Regardless of whether the ACL is "from-lport" or "to-lport",
> * we need rules in both the ingress and egress table, because
> - * the return traffic needs to be
Update setup_udp_tunnel_sock() to handle ipv6 sockets.
Signed-off-by: Pravin B Shelar
---
datapath/linux/compat/include/net/udp_tunnel.h | 15 ++-
1 file changed, 14 insertions(+), 1 deletion(-)
diff --git a/datapath/linux/compat/include/net/udp_tunnel.h
b/datapath/linux/compat/inc
Upstream commit:
commit 106da663ff495e0aea3ac15b8317aa410754fcac
Author: Nicolas Dichtel
ovs/gre,geneve: fix error path when creating an iface
After ipgre_newlink()/geneve_configure() call, the netdev is registered.
Fixes: 7e059158d57b ("vxlan, gre, geneve: Set a large MTU o
Mostly backports upstream commit along with other pieces
to make IPv6 tunneling work.
commit 6b26ba3a7d952e611dcde1f3f77ce63bcc70540a
Author: Jiri Benc
openvswitch: netlink attributes for IPv6 tunneling
Add netlink attributes for IPv6 tunnel addresses. This enables IPv6 support
This backports dst-cache implementation from upstream implementation.
commit 911362c70df5b766c243dc297fadeaced786ffd8
Author: Paolo Abeni
net: add dst_cache support
This patch add a generic, lockless dst cache implementation.
The need for lock is avoided updating the dst cach
Introduce xnet parameter to iptunnel_pull_header().
Signed-off-by: Pravin B Shelar
---
acinclude.m4 | 1 +
datapath/linux/compat/geneve.c | 2 +-
datapath/linux/compat/gre.c| 2 +-
datapath/linux/compat/include/linux/skbuff
upstream commit:
commit cf5da330bbdd0c06b05c525a3d1d58ccd82c87a6
Author: Nicolas Dichtel
ovs/vxlan: fix rtnl notifications on iface deletion
The function vxlan_dev_create() (only used by ovs) never calls
rtnl_configure_link(). The consequence is that dev->rtnl_link_stat is
OVS has GSO compat functionality which needs inner offset
of the packet to segment a packet. older kernel did not
include these offsets in skb, therefore these were stored
in OVS_GSO_CB. Now OVS has dropped support for these
old kernel, So none of the supported kernel needs this
comapt code. Follow
Upstream Commit:
commit 41009481b690493c169ce85f591b9d32c6fd9422
Author: Nicolas Dichtel
ovs/geneve: fix rtnl notifications on iface deletion
The function geneve_dev_create_fb() (only used by ovs) never calls
rtnl_configure_link(). The consequence is that dev->rtnl_link_state
upstream commit:
commit e905eabc90a5b787d8708df164543ee295bea5f2
Author: Simon Horman
openvswitch: correct encoding of set tunnel action attributes
In a set action tunnel attributes should be encoded in a
nested action.
I noticed this because ovs-dpctl was reporting an e
This patch series update OVS compat layer to handle IPv6 UDP based
tunnels. While doing this various fixes and updates to tunnel code
are also brought in. This series sync OVS tunnel compat codebase upto
latest net branch (commit 9a0fee2b552b1235fb1706ae1fc664ae74573be8).
v1-v2:
Broken down patche
upstream tunnel egress info is retrieved using ndo_fill_metadata_dst.
Since we do not have it on older kernel we need to keep vport operation
to do same on these kernels.
Following patch try to merge these to operations into one to avoid code
duplication.
This commit backports fc4099f1 ("openvswitc
Upstream commit:
commit b8812fa88371ae567c907448d9a7ba62d09b90c9
Author: John W. Linville
geneve: add IPv6 bits to geneve_fill_metadata_dst
Signed-off-by: John W. Linville
Reviewed-by: Jesse Gross
Signed-off-by: David S. Miller
Signed-off-by: Pravin B Shelar
---
dat
Upstream commit:
commit e5aed006be918af163eb397e45aa5ea6cefd5e01
Author: Hannes Frederic Sowa
udp: prevent skbs lingering in tunnel socket queues
In case we find a socket with encapsulation enabled we should call
the encap_recv function even if just a udp header without paylo
Next patch adds support for IPV6 Geneve and VXLAN, But support for UDP
segmentation is available on all supported kernel.
Following patch adds support for UDP tunnels over IPv6 for such kernels.
Signed-off-by: Pravin B Shelar
--
I decided to keep IPv4/IPv6 tunnel senmentation code in gso.h for be
Upstream commit:
commit efeb2267bba8aa893afdadfc9bae4790777c600c
Author: Haishuang Yan
geneve: fix tx_errors statistics
Tx errors present summation of errors encountered while transmitting
packets.
Signed-off-by: Haishuang Yan
Signed-off-by: David S. Miller
Signed
Upstream commit:
commit 229740c63169462a838a8b8e16391ed000934631
Author: Jarno Rajahalme
udp_offload: Set encapsulation before inner completes.
UDP tunnel segmentation code relies on the inner offsets being set for
an UDP tunnel GSO packet, but the inner *_complete() function
Update udp_tunnel6_xmit_skb(). Specificaly changes are
related to setting ipv6 label.
Upstream commit:
commit 134611446dc657e1bbc73ca0e4e6b599df687db0
Author: Daniel Borkmann
ip_tunnel: add support for setting flow label via collect metadata
This patch extends udp_tunnel6_xmit_s
Upstream commit:
commit 38fd2af24fcfda93f9fea3e53f26e48775ae9e09
Author: Tom Herbert
udp: Add socket based GRO and config
Add gro_receive and gro_complete to struct udp_tunnel_sock_cfg.
Signed-off-by: Tom Herbert
Signed-off-by: David S. Miller
Signed-off-by: Pravin B
Update ovs_udp_tun_rx_dst() to handle ipv6 tunnels.
This commit partially backports c29a70d2c ("tunnel: introduce udp_tun_rx_dst()")
Signed-off-by: Pravin B Shelar
---
datapath/linux/compat/include/net/dst_metadata.h | 46 ++--
datapath/linux/compat/include/net/udp_tunnel.h
Current tnl_skb_gso_segment() is written for ipv4 tunnels. Following
patch make it generic so that it can also handle ipv6 tunnels.
Signed-off-by: Pravin B Shelar
Acked-by: Jesse Gross
---
datapath/linux/compat/gso.c | 10 ++
1 file changed, 6 insertions(+), 4 deletions(-)
diff --git a
Update udp-socket-create to create ipv6 socket currectly.
Partially backports commit fd384412e199b ("udp_tunnel: Seperate ipv6
functions into its own file.")
Signed-off-by: Pravin B Shelar
---
acinclude.m4 | 1 +
datapath/linux/compat/include/net/udp.h
There is return type change in upstream handle-offload functions.
Following patch brings these changes in.
This is backport of aed069df ("ip_tunnel_core:
iptunnel_handle_offloads returns int and doesn't free skb")
I have also removed duplicate definitions of tunnel_handle_offloads()
from ip-tunnel
Signed-off-by: Pravin B Shelar
---
datapath/linux/compat/include/net/ip_tunnels.h | 10 --
1 file changed, 10 deletions(-)
diff --git a/datapath/linux/compat/include/net/ip_tunnels.h
b/datapath/linux/compat/include/net/ip_tunnels.h
index cea75a1..b9fa76f 100644
--- a/datapath/linux/comp
Following patch backports updated iptunnel pull function.
Also brings in following upstream fix:
commit a09a4c8dd1ec7f830e1fb9e59eb72bddc965d168
Author: Jesse Gross
tunnels: Remove encapsulation offloads on decap.
If a packet is either locally encapsulated or processed through G
90 matches
Mail list logo