On 06/10/14 at 04:47pm, Jesse Gross wrote:
When calculating the source port for the UDP header, LISP primarily
uses skb_get_hash() but needs a backup in case this fails. The
current backup is a hash of the entire flow key but this includes
many fields that probably would not be considered to
On 06/10/14 at 04:47pm, Jesse Gross wrote:
As new protocols are added, the size of the flow key tends to
increase although few protocols care about all of the fields. In
order to optimize this for hashing and matching, OVS uses a varible
length portion of the key. However, when fields are
On 06/10/14 at 04:47pm, Jesse Gross wrote:
Currently, the flow information that is matched for tunnels and
the tunnel data passed around with packets is the same. However,
as additional information is added this is not necessarily desirable,
as in the case of pointers.
This adds a new
On 06/10/14 at 04:47pm, Jesse Gross wrote:
diff --git a/include/linux/openvswitch.h b/include/linux/openvswitch.h
index 33423ad..57d40e3 100644
--- a/include/linux/openvswitch.h
+++ b/include/linux/openvswitch.h
@@ -340,6 +340,7 @@ enum ovs_tunnel_key_attr {
OVS_TUNNEL_KEY_ATTR_TTL,
On 06/10/14 at 04:47pm, Jesse Gross wrote:
In some cases, the names of tunnel protocols are longer than the
maximum allowed after concatenating port numbers. This truncates
names to the correct size rather than assert-failing on the assumption
that collisions between names of protocols are
On 06/10/14 at 04:47pm, Jesse Gross wrote:
As the size of the flow key grows, it can put some pressure on the
stack. This is particularly true in ovs_flow_cmd_set(), which needs several
copies of the key on the stack. One of those uses is logically separate,
so this factors it out to reduce
On 06/10/14 at 04:47pm, Jesse Gross wrote:
diff --git a/datapath/flow.c b/datapath/flow.c
index f1bb95d..7b108ed 100644
--- a/datapath/flow.c
+++ b/datapath/flow.c
@@ -455,6 +455,13 @@ int ovs_flow_extract(struct sk_buff *skb, u16 in_port,
struct sw_flow_key *key)
struct
On 6/10/14, Thomas Graf tg...@suug.ch wrote:
On 06/10/14 at 07:03pm, Avinash wrote:
Kernel recognizes and accepts ethertype of provider VLANs (ETH_P_8021AD)
along with normal VLAN (ETH_P_8021Q). Also in flow key formation,
only the outermost VLAN is considered. Remaining stacked VLANs are
On 6/10/14, Thomas Graf tg...@suug.ch wrote:
On 06/10/14 at 07:02pm, Avinash wrote:
Hello,
As a general remark. It would be nice to have such a mail formatted as
the cover letter of the patches series and all the patches as reply to
it. That way all patches and are neatly bundled in a single
Thanks. Applied to master, branch-2.[23].
On Mon, Jun 09, 2014 at 11:04:09PM +, Pritesh Kothari (pritkoth) wrote:
Acked-by: Pritesh Kothari pritesh.koth...@cisco.com
On Jun 9, 2014, at 3:58 PM, Ben Pfaff b...@nicira.com wrote:
I think these were leftovers from the removal of %z for
On Fri, May 30, 2014 at 05:14:14PM +0900, Simon Horman wrote:
Use OFPRR_GROUP_DELETE as the reason for deleting flows due
to the removal of a group that they use.
This implementation adds an delete_reason member to struct ofputil_flow_mod
as a convenient way to set the reason used by
On Fri, May 30, 2014 at 05:14:47PM +0900, Simon Horman wrote:
OFPRR_METER_DELETE was introduced in OF1.4 however meters were introduced
in OF1.3.
Regardless of the OF version when flows are deleted cause flows to be
deleted handle_delete_meter() calls delete_flows__() with
On Wed, Jun 11, 2014 at 7:26 AM, Avinash avinashand...@gmail.com wrote:
On 6/10/14, Thomas Graf tg...@suug.ch wrote:
On 06/10/14 at 07:03pm, Avinash wrote:
@@ -471,10 +497,14 @@ int ovs_flow_extract(struct sk_buff *skb, u16
in_port, struct sw_flow_key *key)
if
On Fri, May 30, 2014 at 05:15:14PM +0900, Simon Horman wrote:
My reading of handle_delete_meter() is that OFPRR_METER_DELETE is used.
Accordingly delete the entry relating to it from OPENFLOW-1.1+.
Signed-off-by: Simon Horman ho...@verge.net.au
Applied, thanks!
On Mon, May 26, 2014 at 02:57:40AM -0700, Arun Sharma wrote:
If ovs-vswitchd or ovsdb-server is trying to connect to a controller
over SSL that isn't up yet, and the connection is set to bootstrap
the CA cert, the following annoying thing happens: - The connection
will go into backoff mode,
On Wed, Jun 11, 2014 at 1:50 AM, Thomas Graf tg...@suug.ch wrote:
On 06/10/14 at 04:47pm, Jesse Gross wrote:
diff --git a/datapath/vport-lisp.c b/datapath/vport-lisp.c
index a1e2b2b..af9a71e 100644
--- a/datapath/vport-lisp.c
+++ b/datapath/vport-lisp.c
@@ -173,8 +173,12 @@ static u16
On Wed, Jun 11, 2014 at 3:00 AM, Thomas Graf tg...@suug.ch wrote:
On 06/10/14 at 04:47pm, Jesse Gross wrote:
diff --git a/include/linux/openvswitch.h b/include/linux/openvswitch.h
index 33423ad..57d40e3 100644
--- a/include/linux/openvswitch.h
+++ b/include/linux/openvswitch.h
@@ -340,6
On Wed, Jun 11, 2014 at 3:04 AM, Thomas Graf tg...@suug.ch wrote:
On 06/10/14 at 04:47pm, Jesse Gross wrote:
In some cases, the names of tunnel protocols are longer than the
maximum allowed after concatenating port numbers. This truncates
names to the correct size rather than assert-failing on
Pushed to master (but I forgot to add the Acked-by, sorry),
Jarno
On Jun 10, 2014, at 12:21 PM, Ethan Jackson et...@nicira.com wrote:
Acked-by: Ethan Jackson et...@nicira.com
On Mon, Jun 9, 2014 at 11:53 AM, Jarno Rajahalme jrajaha...@nicira.com
wrote:
Remove unnecessary includes
Pushed to master (but I forgot to add the Acked-by, sorry),
Jarno
On Jun 10, 2014, at 12:20 PM, Ethan Jackson et...@nicira.com wrote:
Acked-by: Ethan Jackson et...@nicira.com
On Mon, Jun 9, 2014 at 11:53 AM, Jarno Rajahalme jrajaha...@nicira.com
wrote:
This bug did not manifest due
Thanks for the reviews!
On Jun 10, 2014, at 1:47 PM, Ethan Jackson et...@nicira.com wrote:
Nice, thing we could do something similar for the classifier loop?
I have it in the pipeline, also integrating locking to the iterators, so that
the change to RCU will not be so visible.
Acked-by:
On Sat, May 31, 2014 at 01:53:15AM -0300, Flavio Leitner wrote:
This patch adds generic IGMP snooping library code
that is used in follow-up patches.
Signed-off-by: Cong Wang amw...@redhat.com
Signed-off-by: Daniel Borkmann dbork...@redhat.com
Acked-by: Thomas Graf tg...@redhat.com
On Wed, Jun 11, 2014 at 4:58 AM, Thomas Graf tg...@suug.ch wrote:
On 06/10/14 at 04:47pm, Jesse Gross wrote:
diff --git a/datapath/flow.h b/datapath/flow.h
index 0ecf78b..5d8383c 100644
--- a/datapath/flow.h
+++ b/datapath/flow.h
@@ -53,11 +53,20 @@ struct ovs_key_ipv4_tunnel {
struct
On Sat, May 31, 2014 at 01:53:16AM -0300, Flavio Leitner wrote:
Add IGMP support to struct flow, flow compose and flow extract.
Signed-off-by: Flavio Leitner f...@redhat.com
If the ofproto code is going to match on particular IGMP type or code
or group internally, then we need to also modify
On Sat, May 31, 2014 at 01:53:17AM -0300, Flavio Leitner wrote:
It follows mac learning, but since the multicast snooping feature
can be disabled, the locking is handled in the library.
Signed-off-by: Flavio Leitner f...@redhat.com
Acked-by: Ben Pfaff b...@nicira.com
DEMANDE DE PARTEANRIAT
Mes sincères salutations et mes excuses à votre égard. Avant tout chose, je
voudrais m'excuser de mon intrusion dans votre vie privée. Bref, je me nomme
Mme. Leanna Ntali, Cadre au Département de la Comptabilité à Ecobank Côte
d'Ivoire. Un compte a été ouvert au sein de
On Sat, May 31, 2014 at 01:53:18AM -0300, Flavio Leitner wrote:
Signed-off-by: Flavio Leitner f...@redhat.com
Acked-by: Ben Pfaff b...@nicira.com
___
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev
On Sat, May 31, 2014 at 01:53:19AM -0300, Flavio Leitner wrote:
This patch adds the command 'ovs-appctl mdb/show bridge'
to show learned groups on a bridge from the multicast
snooping database.
It also adds the command 'ovs-appctl mdb/flush [bridge]'
to flush learned groups on a bridge or
On 06/11/14 at 11:11am, Jesse Gross wrote:
On Wed, Jun 11, 2014 at 3:04 AM, Thomas Graf tg...@suug.ch wrote:
On 06/10/14 at 04:47pm, Jesse Gross wrote:
In some cases, the names of tunnel protocols are longer than the
maximum allowed after concatenating port numbers. This truncates
names
On 06/11/14 at 11:10am, Jesse Gross wrote:
On Wed, Jun 11, 2014 at 3:00 AM, Thomas Graf tg...@suug.ch wrote:
On 06/10/14 at 04:47pm, Jesse Gross wrote:
diff --git a/include/linux/openvswitch.h b/include/linux/openvswitch.h
index 33423ad..57d40e3 100644
--- a/include/linux/openvswitch.h
On 06/11/14 at 11:23am, Jesse Gross wrote:
These two pieces are actually related.
All of the operations during flow lookup (flow extraction, masking,
hashing, and comparison) are now variable length to the relevant data.
For non-Geneve packets, the option field won't be part of the
On Sat, May 31, 2014 at 01:53:20AM -0300, Flavio Leitner wrote:
If the packet is multicast and the snooping feature is enabled,
update the multicast snooping database accordingly and send it
to the right ports.
If the packet is not multicast or the snooping feature is disabled,
let the MAC
On Sat, May 31, 2014 at 01:53:21AM -0300, Flavio Leitner wrote:
Signed-off-by: Flavio Leitner f...@redhat.com
Acked-by: Ben Pfaff b...@nicira.com
___
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev
I think you could make it work as you stop iterating upon deletion,
like this:
for (i = 0; i ma-count - 1; i++) {
if (mask == ma-masks[i]) {
[...]
break;
}
}
This is also how other similar kernel code looks like.
You are right. The mask insertion and deletion
Simplify flow mask cache replacement without using expensive atomic
memory access to the mask pointers.
Signed-off-by: Andy Zhou az...@nicira.com
---
datapath/flow_table.c | 44 +---
1 file changed, 21 insertions(+), 23 deletions(-)
diff --git
When deleting a mask from the mask array, we always move the last entry
into its current location. Another approach can be NULL in its current
place, and periodically compact it.
The approach taken by this patch is more efficient during run time.
During look up, fast path packet don't have to
On Wed, Jun 11, 2014 at 1:52 PM, Thomas Graf tg...@suug.ch wrote:
On 06/11/14 at 11:11am, Jesse Gross wrote:
On Wed, Jun 11, 2014 at 3:04 AM, Thomas Graf tg...@suug.ch wrote:
On 06/10/14 at 04:47pm, Jesse Gross wrote:
In some cases, the names of tunnel protocols are longer than the
maximum
On Wed, Jun 11, 2014 at 1:58 PM, Thomas Graf tg...@suug.ch wrote:
On 06/11/14 at 11:23am, Jesse Gross wrote:
These two pieces are actually related.
All of the operations during flow lookup (flow extraction, masking,
hashing, and comparison) are now variable length to the relevant data.
For
Agreed.
Acked-by: Ethan Jackson et...@nicira.com
On Mon, Jun 9, 2014 at 3:20 PM, Thomas Graf tg...@suug.ch wrote:
On 06/05/14 at 10:02pm, Ben Pfaff wrote:
Open vSwitch has supported datapaths that cannot update their flow tables
synchronously for many versions. In that time, I have talked
On Tue, Jun 03, 2014 at 02:14:01PM -0700, Ryan Wilson wrote:
Previously, DPDK buffers were freed using 'struct ofpbuf' pointers
passed to free_dpdk_buf(). However, if a new ofpbuf allocated on the
stack shares data with the old ofpbuf and the new ofpbuf is to be
freed with free_dpdk_buf(),
On Wed, Jun 11, 2014 at 09:28:03AM +0900, Simon Horman wrote:
This is in preparation for using this value
in ofproto-dpif-xlate.c when composing recirculation
actions added as a result of processing (MPLS) actions.
Signed-off-by: Simon Horman ho...@verge.net.au
Applied, thanks!
On Wed, Jun 11, 2014 at 09:28:05AM +0900, Simon Horman wrote:
This is in preparation for using the same helper as part of support
for using recirculation in conjunction series of actions including
with MPLS actions that are currently not able to be translated.
In that scenario the idle
On Wed, Jun 11, 2014 at 09:28:04AM +0900, Simon Horman wrote:
This is to allow a recirculation id to be associated with a rule
in the case that its actions cause recirculation.
In such a case if the recirc_id field is non-zero then that value should be
used, otherwise a value should be
Allow datapath to recognize and extract MPLS labels into flow keys
and execute actions which push, pop, and set labels on packets.
Based heavily on work by Leo Alterman, Ravi K, Isaku Yamahata and Joe Stringer.
Cc: Ravi K rke...@gmail.com
Cc: Leo Alterman lalter...@nicira.com
Cc: Isaku Yamahata
On Wed, Jun 11, 2014 at 10:50:51AM -0700, Ben Pfaff wrote:
On Fri, May 30, 2014 at 05:14:14PM +0900, Simon Horman wrote:
Use OFPRR_GROUP_DELETE as the reason for deleting flows due
to the removal of a group that they use.
This implementation adds an delete_reason member to struct
On Wed, Jun 11, 2014 at 10:53:43AM -0700, Ben Pfaff wrote:
On Fri, May 30, 2014 at 05:14:47PM +0900, Simon Horman wrote:
OFPRR_METER_DELETE was introduced in OF1.4 however meters were introduced
in OF1.3.
Regardless of the OF version when flows are deleted cause flows to be
deleted
OFPRR_METER_DELETE was introduced in OF1.4 however meters were introduced
in OF1.3.
Regardless of the OF version when flows are deleted cause flows to be
deleted handle_delete_meter() calls delete_flows__() with
OFPRR_METER_DELETE as the reason.
In order to avoid sending OFPRR_METER_DELETE to
47 matches
Mail list logo