> On Dec 13, 2017, at 3:10 PM, Ben Pfaff wrote:
>
> diff --git a/ovsdb/ovsdb-client.1.in b/ovsdb/ovsdb-client.1.in
> index 694a7abed46d..2e2df5e5aa7f 100644
> --- a/ovsdb/ovsdb-client.1.in
> +++ b/ovsdb/ovsdb-client.1.in
> @@ -30,6 +30,9 @@ ovsdb\-client \- command-line interface
Thanks. It is a good reading and learning. I found a small issue in the
line below.
+A boolean value, true if authorized insertions and authorized are
allowed,
For "insertions and authorized", maybe you are saying "insertions and
deletions".
Other than that, it looks good to me.
v1 -> v2: refactored and improved code based on reviewer's comments.
Signed-off-by: Yifeng Sun
---
configure.ac| 1 +
lib/automake.mk | 6 ++
lib/dns-resolve.c | 244
lib/dns-resolve.h |
On Wed, Dec 13, 2017 at 04:13:20PM -0800, Sairam Venugopal wrote:
> Found when compiling the code with C++ binaries. Most of the issues are
> due to missing explicit cast.
>
> Changes in PADDED_MEMBERS* is because MSVC does not allow to re-define
> unnamed structure in union. Thus, this fix
On Thu, Dec 14, 2017 at 12:18:16PM -0800, Justin Pettit wrote:
>
> > On Dec 13, 2017, at 3:10 PM, Ben Pfaff wrote:
> >
> > @@ -317,16 +318,30 @@ ovsdb_log_unread(struct ovsdb_log *file)
> > file->offset = file->prev_offset;
> > }
> >
> > +void
> >
Aplique los principios fundamentales y juicio profesional
Ética y la Profesión Contable
17 de Enero - Mtro. David Lozada Martínez - 9am-2pm
El código de ética bajo el cual se rigen los contadores públicos en México es
el Código de ética profesional de la Comisión de ética del Instituto
> On Dec 13, 2017, at 3:10 PM, Ben Pfaff wrote:
>
> @@ -317,16 +318,30 @@ ovsdb_log_unread(struct ovsdb_log *file)
> file->offset = file->prev_offset;
> }
>
> +void
> +ovsdb_log_compose_record(const struct json *json,
> + struct ds *header, struct ds
On Wed, Dec 13, 2017 at 4:58 PM, Pravin Shelar wrote:
> On Tue, Dec 12, 2017 at 8:17 AM, Ed Swierk wrote:
>> A short IPv4 packet may have up to 6 bytes of padding following the IP
>> payload when received on an Ethernet device.
>>
>> In the normal
These are all great comments. Thanks, I fixed up this stuff as much as
I could. I'm going to apply this to master in a minute.
___
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev
Hi guys,
Is it possible to pay one of the devs for 15 min to 30 min of consulting
regarding a problem I have with 2.8.1 and localnet?
I must be missing something in my config and just need someone to look
over my shell commands.
Kind Regards
Nigel
On 12/14/2017 03:30 PM, Ilya Maximets wrote:
> Hello Ciara,
> Thanks for the patches.
>
> I did not review the code. But I have few general concerns about number
> of tx descriptors in HW NICs inline.
>
> Best regards, Ilya Maximets.
>
> On 08.12.2017 18:26, Ciara Loftus wrote:
>> Enabled per
Hello Ciara,
Thanks for the patches.
I did not review the code. But I have few general concerns about number
of tx descriptors in HW NICs inline.
Best regards, Ilya Maximets.
On 08.12.2017 18:26, Ciara Loftus wrote:
> Enabled per port like so:
> ovs-vsctl set Interface dpdkvhostuserclient0
13th December 2017
Attendees: Vishal, Billy, Thomas, Ian, Eelco, Simon, Aaron, Antonio,
Yipeng, Ben, Sameh, Johann, Sugesh, Olga, Frikkie, Kevin.
===
GENERAL
===
- Next Meeting January 10th
- Prioritization of patches for OVS 2.9?
-- Discussed the patches in the PERF/FEATURES section
--
New statistics for 'pmd-stats-show' command:
average number of packets per output batch.
Acked-by: Eelco Chaudron
Signed-off-by: Ilya Maximets
---
lib/dpif-netdev.c | 27 ++-
1 file changed, 22 insertions(+), 5 deletions(-)
This allows to collect packets from more than one RX burst
and send them together with a configurable intervals.
'other_config:tx-flush-interval' can be used to configure
time that a packet can wait in output batch for sending.
dpif-netdev turned to microsecond resolution for time
measuring to
Not needed anymore because 'may_steal' already handled on
dpif-netdev layer and always true.
Acked-by: Eelco Chaudron
Signed-off-by: Ilya Maximets
---
lib/dpif-netdev.c | 2 +-
lib/netdev-bsd.c | 4 ++--
lib/netdev-dpdk.c | 25
While processing incoming batch of packets they are scattered
across many per-flow batches and sent separately.
This becomes an issue while using more than a few flows.
For example if we have balanced-tcp OvS bonding with 2 ports
there will be 256 datapath internal flows for each dp_hash
In current implementation 'now' variable updated once on each
receive cycle and passed through the whole datapath via function
arguments. It'll be better to keep this variable inside PMD
thread structure to be able to get it at any time. Such solution
will save the stack memory and simplify
This patch-set inspired by [1] from Bhanuprakash Bodireddy.
Implementation of [1] looks very complex and introduces many pitfalls [2]
for later code modifications like possible packet stucks.
This version targeted to make simple and flexible output packet batching on
higher level without
From: Marcin Rybka
New OVS-DPDK testsuite, which can be launched via `make check-dpdk`,
tests OVS using a DPDK datapath. The testsuite contains already
initial tests:
1. EAL init
2. Add standard DPDK PHY port
3. Add vhost-user-client port
Signed-off-by: Marcin Rybka
If ARP reply is received on LOCAL port of underlay bridge, then packets
pushed to tunnel port in overlay bridge will be dropped in the underlay.
This commit modifies this by receiving ARP replies on a different dummy
port. This fix is needed for an upcomming correction for ARP snooping.
Move tunnel neigh snooping from do_xlate_actions() to
terminate_native_tunnel() in order to keep ARP neighbor cache clean.
Furthermore filter ARP reply and Neighbor Advertisement messages
addressing tunnel endpoint.
Signed-off-by: Zoltan Balogh
---
Currenlty, OVS snoops any ARP or ND packets in any bridge and populates
the tunnel neighbor cache with the retreived data. For instance, when
ARP reply originated by a tenant is received on an overlay bridge, the
ARP message is snooped and tunnel neighbor cache is filled with tenant
data, however
By avoiding Tx recirculation and embracing tnl_push action within clone,
the tunnel metadata is not propagated. Unless clone action is handled in
the dpif_sflow_read_actions() function as well. This commit resolves
this issue.
In addition, some sflow data needs to be stored and restored in
24 matches
Mail list logo