Re: [vpp-dev] MACIP ACL replace causes ip4_table_index change?

2017-12-08 Thread Jon Loeliger
On Fri, Dec 8, 2017 at 12:55 PM, Jon Loeliger wrote: > > > >> We need to iterate the am->macip_acl_by_sw_if_index and for interfaces >> which have the acl in question applied, reapply these new tables to these >> interfaces so the already active macip acl remained active. >> > > Ah, I see > I

Re: [vpp-dev] How can i use VPP as MPLS PE/P device

2017-12-08 Thread Michael Borokhovich
So, for the control plane, we can use e.g., FRR that will populate Linux's FIB and MPLS table. Then, we need to sync this info to VPP's FIB and VPP's MPLS table. While the "router plugin" provides support for FIB synchronization, there is no support for MPLS sync. Does anyone know if there are pla

Re: [vpp-dev] MACIP ACL replace causes ip4_table_index change?

2017-12-08 Thread Jon Loeliger
On Fri, Dec 8, 2017 at 12:34 PM, Andrew Yourtchenko wrote: > Jon, > > Do you have an api trace you could throw in my direction unicast ? > I'd have to work at that quite a bit as I am using a totally new and different UI to drive these API calls... I can outline it for you: macip_index = c

Re: [vpp-dev] MACIP ACL replace causes ip4_table_index change?

2017-12-08 Thread Andrew Yourtchenko
Jon, Do you have an api trace you could throw in my direction unicast ? Macip_add_replace call was added later than most ACL plugins, (after realizing the convenience of this approach in the policy ACLs vs the unapply/delete acl/readd acl/reapply and for consistency), via commit c29940c58de3e4

Re: [vpp-dev] MACIP ACL replace causes ip4_table_index change?

2017-12-08 Thread Jon Loeliger
On Fri, Dec 8, 2017 at 11:24 AM, Jon Loeliger wrote: > On Fri, Dec 8, 2017 at 10:56 AM, Jon Loeliger wrote: > >> >> vpp# show acl-plugin macip acl >> MACIP acl_index: 0, count: 1 (true len 1) tag {bob} is free pool slot: 0 >> ip4_table_index 0, ip6_table_index 0, l2_table_index 0 >> rule 0

Re: [vpp-dev] MACIP ACL replace causes ip4_table_index change?

2017-12-08 Thread Jon Loeliger
On Fri, Dec 8, 2017 at 10:56 AM, Jon Loeliger wrote: > > vpp# show acl-plugin macip acl > MACIP acl_index: 0, count: 1 (true len 1) tag {bob} is free pool slot: 0 > ip4_table_index 0, ip6_table_index 0, l2_table_index 0 > rule 0: ipv4 action 0 ip 0.0.0.0/0 mac 00:00:00:00:00:00 mask > 00:00

[vpp-dev] MACIP ACL replace causes ip4_table_index change?

2017-12-08 Thread Jon Loeliger
Hey VPP Fans, I've detected a slight anomaly in the handling of MACIP ACLs, and would like some help tracking down the right solution. I start by making a MACIP ACL. vppctl shows: vpp# show acl-plugin macip acl MACIP acl_index: 0, count: 1 (true len 1) tag {bob} is free pool slot: 0 ip4_table_

Re: [vpp-dev] Build error when trying to cross-compile vpp

2017-12-08 Thread Dave Barach (dbarach)
Please try this sequence from the top of your workspace: $ make bootstrap $ make PLATFORM= build That’s the “supported, plan-A” scheme. If it doesn’t work, please let us know. If you specify PLATFORM when building host tools (i.e. vppapigen), it won’t work. Thanks… Dave From: nikhil ap [mailt

Re: [vpp-dev] The feasibility of C++ gRPC with libvcl_ldpreload

2017-12-08 Thread Keith Burns
Ack, thanks Peter! On Dec 8, 2017 2:48 AM, "Peter Palmár" wrote: > Hi Keith, > > > thanks for your mail. I have just encountered something and therefore > created this report: > > https://jira.fd.io/browse/VPP-1089 > > VCL-LDPRELOAD: setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, ...) does nothing, >

Re: [vpp-dev] The feasibility of C++ gRPC with libvcl_ldpreload

2017-12-08 Thread Peter Palmár
Hi Keith, thanks for your mail. I have just encountered something and therefore created this report: https://jira.fd.io/browse/VPP-1089 VCL-LDPRELOAD: setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, ...) does nothing, therefore, getsockopt(...) does not confirm an expected change Regards, Peter

[vpp-dev] how to redirect data?

2017-12-08 Thread lin huang
Hi, all I want the data received by host-vpp1_inside port to redirect to port host-vpp2_inside. How can do it? Do I need to modify the code or adding a simple route rule?? Show int host-vpp2_inside 2 up host-vpp1_inside 1 up rx packets