The patch in question is doing an invasive runtime check [1] to determine 
whether arp header modification is supported by ovs.  I seem to remember a lack 
of consensus on whether invasive runtime checks were acceptable around vxlan 
detection, and I would appreciate confirmation from other cores that this 
approach is considered acceptable for this patch.


m.

1: https://review.openstack.org/#/c/49227/41/neutron/agent/linux/ovs_lib.py

On May 19, 2014, at 1:07 PM, Assaf Muller <amul...@redhat.com> wrote:

> Hello Mark, Bob and Kyle,
> 
> You've all been involved with the OVS ARP responder patch:
> https://review.openstack.org/#/c/49227/
> 
> I kindly request that you revisit this patch - It's ready from
> my point of view, if that means anything. The last few patchsets
> have been nitpicks. Looking at the history, the patch has already
> had a large amount of +1's and +2's through it's various stages.
> 
> I think it'd be technically superior if this patch was merged
> before further progress is made in the DVR patch series.
> 
> 
> Thanks for your time,
> Assaf Muller, Cloud Networking Engineer
> Red Hat


_______________________________________________
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to