Hello teams!
I am new to ovs and linux kernel, but I'm trying to add some code in ovs source
code.
When I try to debug my code, e.g. I use printk() or pr_info() to output some
information, I have no idea where to check them.
Or is there any approach to do things above? This is just my first try
Hi, all
I want to ask one question about parse_8021q_onward.
parse_8021q_onward:
(...skip...)
/* Get the VLAN TCI value. */
if (!is_mask && !(present_attrs & (UINT64_C(1) << OVS_KEY_ATTR_VLAN))) {
return ODP_FIT_TOO_LITTLE;
} else {
tci = (present_attrs & (UINT6
Hi, all
Could you tell me when the attribute OVS_KEY_ATTR_ENCAP will be used?
If the packet is 802.1q, then OVS_KEY_ATTR_VLAN will be used to store the vlan
tci,
so what the OVS_KEY_ATTR_ENCAP is used for?
Thanks.
___
dev mailing list
dev@openvsw
> -Original Message-
> From: Justin Pettit [mailto:jpet...@nicira.com]
> Sent: Thursday, September 17, 2015 1:16 AM
> To: Daniele Di Proietto
> Cc: Traynor, Kevin; dev@openvswitch.org
> Subject: Re: [ovs-dev] [PATCH] docs: Expand performance tuning section in
> INSTALL.DPDK.md.
>
>
> > O
On 16/09/15 22:54, Joe Stringer wrote:
On 16 September 2015 at 13:32, Zoltan Kiss wrote:
e4e74c3a "dpif-netdev: Purge all ukeys when reconfigure pmd." introduced a new
dp_purge_cb function, which calls udpif_pause_revalidators() and that tries to
block on pause_barrier.
But if OVS was started
e4e74c3a "dpif-netdev: Purge all ukeys when reconfigure pmd." introduced a new
dp_purge_cb function, which calls udpif_pause_revalidators() and that tries to
block on pause_barrier.
But if OVS was started with flow-restore-wait="true" (e.g. through ovs-ctl),
type_run() will have backer->recv_set_en
On Wed, Sep 16, 2015 at 6:54 PM, Tashi Lu wrote:
> Yes, `rpmbuild -bb rhel/openvswitch-kmod-rhel6.spec` was the command i used.
> May be it's related to the "KERNEL ABI COMPATIBILITY WARNING" before this
> error message?
>
> % rpmbuild -bb rhel/openvswitch-kmod-rhel6.spec
Just to make sure, did y
If we have a flow rule of the following form:
actions=strip_vlan,set_tunnel:0x3e9,15,16,17 (Where port 15, 16 and 17 are
VXLAN OF ports with different tunnelling information)
Current implementation is that if a packet will hit that specific flow,
only one packet will be sent out with the first t
On Thu, Sep 17, 2015 at 12:28 AM, liu_ch...@buaa.edu.cn
wrote:
> Hello teams!
>
> I am new to ovs and linux kernel, but I'm trying to add some code in ovs
> source code.
> When I try to debug my code, e.g. I use printk() or pr_info() to output some
> information, I have no idea where to check th
If we have a flow rule of the following form:
actions=strip_vlan,set_tunnel:0x3e9,15,16,17 (Where port 15, 16 and 17 are
VXLAN OF ports with different tunnelling information)
Current implementation is that if a packet will hit that specific flow,
only one packet will be sent out with the first t
Currently when running the vswitch daemon we get a lot of messages of the
form:
2015-09-10T23:04:21Z|07255|dpif(revalidator11)|WARN|system@ovs-system: failed
to flow_del (Invalid argument).
The userspace expects after sending a delete flow command, to receive the flow
key of the deleted flow.
Cur
Hi, all
I want to ask a question about the function parse_8021q_onward.
(...skip...)
if (!is_mask) {
if (!(present_attrs & (UINT64_C(1) << OVS_KEY_ATTR_VLAN))) {
return ODP_FIT_TOO_LITTLE;
} else if (flow->vlan_tci == htons(0)) {
/* Corner case for a
Hi,
As a leading database provider, I was inquisitive to check if you would be
interested in owning a list of companies using VMware that can be used for
your marketing campaigns? These lists can be customized based on
application, geography, titles and more.
Some of the other Virtualizatio
On Thursday, September 17, 2015, liu_ch...@buaa.edu.cn <
liu_ch...@buaa.edu.cn> wrote:
> Thanks a lot for your reply!
> But I have tried this command many times, what I saw was something like
> "br0 is left/enter promiscuous mode" which occures when I use ovs-vsctl
> add-br or ovs-vsctl add-port c
This is a proposed plan for logical L3 in OVN. It is not entirely
complete but it includes many important details and I believe that it moves
planning forward.
Signed-off-by: Ben Pfaff
---
ovn/TODO| 264 +-
ovn/northd/ovn-northd.8.xml | 342 ++
This is useful so that one can write, e.g.
The following shows how to add 1 to variable x:
x = x
Signed-off-by: Ben Pfaff
---
python/build/nroff.py | 24
1 file changed, 12 insertions(+), 12 deletions(-)
diff --git a/python/build/nroff.py b/python/build/nroff.py
index
Signed-off-by: Ben Pfaff
---
python/build/nroff.py | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/python/build/nroff.py b/python/build/nroff.py
index 04fc3e8..8b16db5 100644
--- a/python/build/nroff.py
+++ b/python/build/nroff.py
@@ -66,7 +66,7 @@ def inline_xml_to_nroff(
The impact of the compromise of a chassis running ovn-controller came
up in a discussion with the developers of a system that could
potentially use OVN. Capture some notes on this issue as a todo item.
Signed-off-by: Russell Bryant
---
ovn/TODO | 38 +-
1 fil
Hi Andy, I still don't see code changes to init.d script or packaging
postinst scripts.
If you are curious how to test it. Invoke "fakeroot debian/rules
binary" command in a clean OVS git repository. This command will
create Debian packages. And then install these debian packages with
"dpkg -i *.d
On Wed, Sep 16, 2015 at 2:43 PM, Jesse Gross wrote:
> On Tue, Sep 15, 2015 at 11:09 AM, Pravin B Shelar wrote:
>> From: Joe Stringer
>>
>> Signed-off-by: Joe Stringer
>> Signed-off-by: Pravin B Shelar
>
> At a first glance, it looks like there are a few commits in 4.1 that
> aren't represented
On Wed, Sep 16, 2015 at 3:00 PM, Jesse Gross wrote:
> On Tue, Sep 15, 2015 at 11:09 AM, Pravin B Shelar wrote:
>> Signed-off-by: Pravin B Shelar
>
> What about this commit?
> openvswitch: allocate nr_node_ids flow_stats instead of num_possible_nodes
>
ok, I will send separate patch.
>> diff --gi
On Thu, Sep 17, 2015 at 11:34 AM, Ansis Atteka wrote:
> Hi Andy, I still don't see code changes to init.d script or packaging
> postinst scripts.
>
> If you are curious how to test it. Invoke "fakeroot debian/rules
> binary" command in a clean OVS git repository. This command will
> create Debian
On Thu, Sep 17, 2015 at 11:58 AM, Pravin Shelar wrote:
> On Wed, Sep 16, 2015 at 3:00 PM, Jesse Gross wrote:
>> On Tue, Sep 15, 2015 at 11:09 AM, Pravin B Shelar wrote:
>>> diff --git a/datapath/linux/compat/socket.c b/datapath/linux/compat/socket.c
>>> new file mode 100644
>>> index 000..77
On Thu, Sep 17, 2015 at 11:49 AM, Pravin Shelar wrote:
> On Wed, Sep 16, 2015 at 2:43 PM, Jesse Gross wrote:
>> On Tue, Sep 15, 2015 at 11:09 AM, Pravin B Shelar wrote:
>>> diff --git a/.travis.yml b/.travis.yml
>>> index d14f786..f4b9188 100644
>>> --- a/.travis.yml
>>> +++ b/.travis.yml
>>> @@
On Thu, Sep 17, 2015 at 1:08 PM, Jesse Gross wrote:
> On Thu, Sep 17, 2015 at 11:58 AM, Pravin Shelar wrote:
>> On Wed, Sep 16, 2015 at 3:00 PM, Jesse Gross wrote:
>>> On Tue, Sep 15, 2015 at 11:09 AM, Pravin B Shelar
>>> wrote:
diff --git a/datapath/linux/compat/socket.c
b/datapath
On Thu, Sep 17, 2015 at 1:12 PM, Jesse Gross wrote:
> On Thu, Sep 17, 2015 at 11:49 AM, Pravin Shelar wrote:
>> On Wed, Sep 16, 2015 at 2:43 PM, Jesse Gross wrote:
>>> On Tue, Sep 15, 2015 at 11:09 AM, Pravin B Shelar
>>> wrote:
diff --git a/.travis.yml b/.travis.yml
index d14f786..f
It's better to have it in the cache as soon as possible. On my test setup it
meant a 0.7 Mpps increase.
Signed-off-by: Zoltan Kiss
diff --git a/lib/dpif-netdev.c b/lib/dpif-netdev.c
index 72e5653..3312cc0 100644
--- a/lib/dpif-netdev.c
+++ b/lib/dpif-netdev.c
@@ -3229,11 +3229,6 @@ emc_processin
On Thu, Sep 17, 2015 at 02:27:07PM -0400, Russell Bryant wrote:
> The impact of the compromise of a chassis running ovn-controller came
> up in a discussion with the developers of a system that could
> potentially use OVN. Capture some notes on this issue as a todo item.
>
> Signed-off-by: Russel
On Tue, Sep 15, 2015 at 9:58 PM, Jesse Gross wrote:
> Upstream commit:
> openvswitch: Fix mask generation for nested attributes.
>
> Masks were added to OVS flows in a way that was backwards compatible
> with userspace programs that did not generate masks. As a result, it is
> poss
On Tue, Sep 15, 2015 at 8:48 PM, Jesse Gross wrote:
> If a packet is output to a tunnel port when userspace tunneling is
> enabled, it will cause an ARP packet to be generated if the destination
> is unknown. This ARP packet is injected into the physical bridge as
> a new packet, where it is flood
On Fri, Sep 04, 2015 at 02:40:07PM -0300, Thadeu Lima de Souza Cascardo wrote:
> Signed-off-by: Thadeu Lima de Souza Cascardo
Thanks, applied to master.
___
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev
On Fri, Sep 04, 2015 at 02:40:08PM -0300, Thadeu Lima de Souza Cascardo wrote:
> Signed-off-by: Thadeu Lima de Souza Cascardo
> ---
> lib/ovs-router.c | 3 ++-
> 1 file changed, 2 insertions(+), 1 deletion(-)
>
> diff --git a/lib/ovs-router.c b/lib/ovs-router.c
> index d4a5c35..7493c79 100644
>
On Thu, Sep 17, 2015 at 11:58 AM, Pravin Shelar wrote:
> On Wed, Sep 16, 2015 at 3:00 PM, Jesse Gross wrote:
>> On Tue, Sep 15, 2015 at 11:09 AM, Pravin B Shelar wrote:
>>> Signed-off-by: Pravin B Shelar
>>
>> What about this commit?
>> openvswitch: allocate nr_node_ids flow_stats instead of nu
On Wed, Sep 09, 2015 at 01:12:04PM +0530, saloni.jai...@gmail.com wrote:
> From: Saloni Jain
>
> OpenFlow 1.4 introduces the ability to turn on vacancy events with an
> OFPT_TABLE_MOD message specifying OFPTC_VACANCY_EVENTS. This commit adds
> support for the new feature in ovs-ofctl mod-table.
>
On Wed, Sep 09, 2015 at 01:13:22PM +0530, saloni.jai...@gmail.com wrote:
> From: Saloni Jain
>
> This patch adds support for vacancy events in table-desc.
>
> ovs-ofctl -O OpenFlow14 dump-tables-desc
> -This command is enhanced to display the Vacancy Event configuration
> of the tables on a ,
On Wed, Sep 09, 2015 at 01:14:18PM +0530, saloni.jai...@gmail.com wrote:
> From: Saloni Jain
>
> On change in a table state, the controller needs to be informed with
> the OFPT_TABLE_STATUS message. The message is sent with reason
> OFPTR_VACANCY_DOWN or OFPTR_VACANCY_UP in case of change in rema
From: Daniele Di Proietto
is_all_zeros() is quite slow for u128 initialization because:
- It is not inlined
- It checks byte by byte
This commit introduces a new function to perform this function, which
improves performance in the DPDK packet processing path for upcoming
commits that regularly c
This series adds support for sending packets through a connection tracker,
which allows OVS to perform stateful firewalling functions. The functionality
added in this series works in conjunction with the interface that is available
in the latest upstream Linux kernel development releases that will
This patch adds a new 32-bit metadata field to the connection tracking
interface. When a mark is specified as part of the ct action and the
connection is committed, the value is saved with the current connection.
Subsequent ct lookups with the table specified will expose this metadata
as the "ct_ma
From: Andy Zhou
User space now may receive re-assembled IP fragments. The user space
netlink handler can now accept packets with the new OVS_PACKET_ATTR_MRU
attribute. This allows the kernel to assemble fragmented packets for the
duration of OpenFlow processing, then re-fragment at output time. M
This patch adds support for specifying a "helper" or ALG to assist
connection tracking for protocols that consist of multiple streams.
Initially, only support for FTP is included.
Below is an example set of flows to allow FTP control connections from
port 1->2 to establish active data connections
This patch adds a new 128-bit metadata field to the connection tracking
interface. When a label is specified as part of the ct action and the
connection is committed, the value is saved with the current connection.
Subsequent ct lookups with the table specified will expose this metadata
as the "ct_
On Thu, Sep 17, 2015 at 2:42 PM, Pravin Shelar wrote:
> On Tue, Sep 15, 2015 at 8:48 PM, Jesse Gross wrote:
>> If a packet is output to a tunnel port when userspace tunneling is
>> enabled, it will cause an ARP packet to be generated if the destination
>> is unknown. This ARP packet is injected i
On Thu, Sep 17, 2015 at 04:04:23PM -0700, Joe Stringer wrote:
> This patch adds a new action and fields to OVS that allow connection
> tracking to be performed. This support works in conjunction with the
> Linux kernel support merged into the Linux-4.3 development cycle.
>
> The new 'ct' action se
On Thu, Sep 17, 2015 at 2:42 PM, Pravin Shelar wrote:
> On Tue, Sep 15, 2015 at 9:58 PM, Jesse Gross wrote:
>> Upstream commit:
>> openvswitch: Fix mask generation for nested attributes.
>>
>> Masks were added to OVS flows in a way that was backwards compatible
>> with userspace progr
On Thu, Sep 17, 2015 at 2:49 PM, Pravin Shelar wrote:
> On Thu, Sep 17, 2015 at 11:58 AM, Pravin Shelar wrote:
>> On Wed, Sep 16, 2015 at 3:00 PM, Jesse Gross wrote:
>>> On Tue, Sep 15, 2015 at 11:09 AM, Pravin B Shelar
>>> wrote:
Signed-off-by: Pravin B Shelar
>>>
>>> What about this co
tªHÒ²ÅÕÓåtZË
1ä§&ü3ñl
4©ÉÞ{J|þªäⲦÇëâJT&ø²üÏi5±¤ËRÇìÓ-¯÷a¢)·°qï&MIç½^Ehð.É®X]k>&äC[
¢hOÎRC0çt¼>ì·/¬Í<¨*y³v$:
?;Ú â^ ¡
;mÂÅ¿÷:±]¸»6PÑùñGëUÑäê¯*Î5¿|Gõƽl¤Á£)U®j%¼ëÎåNf[ßZ÷£¯¦ÃæÓk0üþañsmXaÓ#tm%ÍøOضN%nËÍù
;lÛzû
à5Ñ¡°Iðºk°çK
-J³rׯA9'Ô<6
¼çxPM:a¡/oÖ¨òk(vãJRH9ÀW
Hi, all
I read the source in kernel mode, the function named 'ovs_nla_put_flow', and I
see when the eth.type is ETH_P_8021Q
but eth.tci is 0, the OVS_KEY_ATTR_ENCAP field will only have a header but no
nested fields.
But I don't think this is one correct case because I think if the eth.type i
On Mon, Sep 14, 2015 at 3:54 PM, Andy Zhou wrote:
> Added functions to drop daemon's root privileges at run time by
> allowing it to run as a different user. Daemons all start
> running as root, then drop to the user by invoking
> daemon_become_new_user() function when they are ready to drop
> roo
On Thu, Sep 17, 2015 at 1:22 PM, Pravin Shelar wrote:
> On Thu, Sep 17, 2015 at 1:12 PM, Jesse Gross wrote:
>> On Thu, Sep 17, 2015 at 11:49 AM, Pravin Shelar wrote:
>>> On Wed, Sep 16, 2015 at 2:43 PM, Jesse Gross wrote:
On Tue, Sep 15, 2015 at 11:09 AM, Pravin B Shelar
wrote:
Oh, I forgot to copy openvswitch-kmod.files, really sorry for having
troubled you so much.
On 17 September 2015 at 22:00, Gurucharan Shetty wrote:
> On Wed, Sep 16, 2015 at 6:54 PM, Tashi Lu wrote:
> > Yes, `rpmbuild -bb rhel/openvswitch-kmod-rhel6.spec` was the command i
> used.
> > May be it'
Oh I'm sorry for dropping the mailing list.
I think I do put the printk in the packet processing path. I am going to
describe what I did below:
I put printk in the function ovs_vport_recieve() in vport.c, in
ovs_dp_process_recieved_packet() in datapath.c, in ovs_flow_key_extract() and
key_extr
On Mon, Sep 14, 2015 at 3:54 PM, Andy Zhou wrote:
> All daemons launched by root can drop their privilege using
s/privilege/privileges
> --user option. See man page update form more details.
s/form/for
>
> Signed-off-by: Andy Zhou
> ---
> NEWS | 1 +
> lib/d
Hi,
Have the patch been sent?
Thanks.
At 2015-08-21 04:08:06, "Pravin Shelar" wrote:
>I sent patch attached to the mail. Only direct recipients got the
>patch. I am planning on sending formal patch to netdev mailing list
>soon.
>
>On Wed, Aug 19, 2015 at 9:05 PM, Ben Pfaff wrote:
>> I do
54 matches
Mail list logo