Hi all,
I'd like to build a site to site VPN tunnel with vpp only.
Because VPP can't be SA initiator, so we can't use IKE2, so how can we build
this, is there any files about this?
Regards,
Xiaoxu
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Onli
Hi Mike,
In such a situation, CP has to run state reconciliation process. You can find
examples in networking-vpp (Python), Ligato (go) or Honeycomb (Java).
Jerome
De : au nom de "Bly, Mike"
Date : mardi 28 août 2018 à 21:51
À : "vpp-dev@lists.fd.io"
Objet : [vpp-dev] control-plane restarts, e
Hello,
Can someone tell me the current VPP stance on warm restarts, configuration
replays, etc? If the control plane is restarted for whatever reason, what is
the expectation regarding replaying of configuration down to VPP and/or
auditing of the active VPP configuration on a live system?
Rega
> I cannot update wiki, it tells me that I'm trying to do suspicious login :)
My workaround it to attempt the login
from less deep wiki page, e.g. [1].
Vratko.
[1] https://wiki.fd.io/view/Main_Page
From: vpp-dev@lists.fd.io On Behalf Of Damjan Marion via
Lists.Fd.Io
Sent: Tuesday, 2018-August
Hi Ping,
I’ve already posted a comment ☺
Florin
From: "Yu, Ping"
Date: Tuesday, August 28, 2018 at 8:20 AM
To: Florin Coras
Cc: "Florin Coras (fcoras)" , "vpp-dev@lists.fd.io"
, "Yu, Ping"
Subject: RE: [vpp-dev] TLS half open lock
Yes, this is what I did to fix the code.
Please help review
Hello,
Yes I think this will work long term. (still will let others to comment but,
for now looks good to me)
Thank you.
Peter Mikus
Engineer – Software
Cisco Systems Limited
-Original Message-
From: Vanessa Valderrama via RT
Sent: Monday, August 27, 2018 6:27 PM
To: Peter Mikus -X (
+1
30 day artefact availability (except official release artefacts, of course) is
enough for us.
Thanks,
Jan
-Original Message-
From: csit-...@lists.fd.io On Behalf Of Peter Mikus via
Lists.Fd.Io
Sent: Tuesday, August 28, 2018 8:57 AM
To: fdio-helpd...@rt.linuxfoundation.org
Cc: csit-
Yes, this is what I did to fix the code.
Please help review below patch, and besides adding the lock, and I also
optimize a bit to reduce the lock scope.
https://gerrit.fd.io/r/14534
Ping
From: Florin Coras [mailto:fcoras.li...@gmail.com]
Sent: Tuesday, August 28, 2018 10:58 PM
To: Yu, Ping
C
Yes, this probably happens because free is called by a different thread. As
mentioned in my previous reply, could you try protecting with
clib_rwlock_reader_lock (&tm->half_open_rwlock); the branch that does not
expand the pool?
Thanks,
Florin
> On Aug 28, 2018, at 7:51 AM, Yu, Ping wrote:
>
Hi Ping,
Looks like a free happens just before on thread 2. Could you try protecting the
allocation of a half-open ctx that does not expand the pool with a reader lock,
to see if this keeps on happening?
Florin
> On Aug 28, 2018, at 2:28 AM, Yu, Ping wrote:
>
> Hi, Florin,
>
> Yes, you ar
Hello, Florin,
From below info, we can see a real race condition happens.
thread 2 free: 149
thread 3 free: 155
thread 0: alloc: 149
thread 0: alloc: 149
[Time 0]
thread 2 free: 149
Thread 2 free 149 and now 149 is at the pool vec_len (_pool_var
(p)->free_indices);
[Time 1&Time 2 ]
Now thre
Hi Aleksander,
It’s not top of my TODO list right now. Your additions would be most welcome.
/neale
From: on behalf of Aleksander Djuric
Date: Tuesday, 28 August 2018 at 14:41
To: "vpp-dev@lists.fd.io"
Subject: Re: [vpp-dev] IGMP enable issue
In addition to my previous message...
Unfortu
In addition to my previous message...
Unfortunatelly it's not work for me (
I need IGMPv2 support.. and I have found this comment:
/* TODO: IGMPv2 and IGMPv1 */
Is it in your nearest plans?
Certainly I also will try to do something by myself..
Regards,
Aleksander
-=-=-=-=-=-=-=-=-=-=-=-
Links:
If possible, repeat the exercise with a debug image. The code involved is well
tested, and does not crash without “help.” I wouldn’t be surprised to run into
an ASSERT elsewhere which explains the problem.
For the specific packet in question: see if
vnet_buffer(b)->sw_if_index[VLIB_TX] is set t
+1.
-Original Message-
From: csit-...@lists.fd.io On Behalf Of Jan Gelety via
Lists.Fd.Io
Sent: Tuesday, 2018-August-28 09:38
To: Peter Mikus -X (pmikus - PANTHEON TECHNOLOGIES at Cisco)
; fdio-helpd...@rt.linuxfoundation.org
Cc: csit-...@lists.fd.io
Subject: Re: [csit-dev] [FD.io Helpd
Hi, Florin,
Yes, you are right, and all alloc operation is performed by thread 0. An
interesting thing is that if running “test echo clients nclients 300 uri
tls://10.10.1.1/” in clients with 4 threads, I can easily catch the case
one same index be alloc twice by thread 0.
thread 0: alloc:
Hi, Neale
Many thanks!
I did the same job already ) My patch in attach.
I'm trying to test it now and will write later about results.
Best regards,
Aleksander
On Mon, Aug 27, 2018 at 05:40 PM, Neale Ranns wrote:
>
>
>
> Hi Aleksander,
>
>
>
>
>
>
>
> The API required to enable router
more info after full core dump:
#0 0x7f57b1b6e428 in raise () from /lib/x86_64-linux-gnu/libc.so.6#1
0x7f57b1b7002a in abort () from /lib/x86_64-linux-gnu/libc.so.6#2
0x5565b7348dee in os_exit (code=code@entry=1) at
/w/workspace/vpp-merge-1807-ubuntu1604/build-data/../src/vpp/
this crash accoured in vpp 18.07:
vpp[71]: received signal SIGSEGV, PC 0x7f125c775321, faulting address
0x7f16ae006978vpp[71]: #0 0x7f125cfcdf7f 0x7f125cfcdf7fvpp[71]: #1
0x7f125bed6390 0x7f125bed6390vpp[71]: #2 0x7f125c775321 ip4_local_avx2
+ 0x905vpp[71]: #3 0x7f125cf943a4
19 matches
Mail list logo