Hi team/Ben:
Want to get inputs about compute de-comm use case. So when deleting the
chassis from southd after gracefully killing the compute, doesn't delete
the ports binded to the northd lswitch.
Below is the detail of a sandbox from recent scale test env.
I found a bug about ixgbevf kernel module in centos-3.10.0-229.20.1.el7.
And this bug is also in 3.10.0-514.10.2.el7.
How to produce this bug: use SRIOV first, then add lots of network traffic
on vf port, and then ifdow/ifup vf port, after many times, this bug happens.
BUG:
[308026.586026]
Greg, thank you so much for your reviewing, which Linux distribution version
has linux-3.10.107 kernel? I’ll add a test case for kernel datapath, fix
compiling issue on linux-3.10.107 and rebase it to master.
From: Gregory Rose [mailto:gvrose8...@gmail.com]
Sent: Tuesday, January 30, 2018 1:51
Adecuada gestión de personal para resultados excelentes
Técnicas de Supervisión Efectiva, Liderazgo, Productividad y Manejo de
Conflictos
14 de Febrero- Psi. Dolores Romero Mora - 9am- 8pm
Las habilidades de supervisión son imprescindibles para aquellos jefes o
supervisores que tienen equipos
Since Linux kernel upstream commit d15155824c50
("linux/compiler.h: Split into compiler.h and compiler_types.h") this
error check for the gcc compiler header is no longer valid. Remove
so that openvswitch builds for linux kernels 4.14.8 and since.
Signed-off-by: Greg Rose
Signed-off-by: Greg Rose
---
.travis.yml | 17 -
1 file changed, 8 insertions(+), 9 deletions(-)
diff --git a/.travis.yml b/.travis.yml
index 48acc8e..25458a3 100644
--- a/.travis.yml
+++ b/.travis.yml
@@ -26,17 +26,16 @@ sudo: false
env:
-
Signed-off-by: Greg Rose
---
acinclude.m4 | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/acinclude.m4 b/acinclude.m4
index 768c20c..d0f9d82 100644
--- a/acinclude.m4
+++ b/acinclude.m4
@@ -151,10 +151,10 @@ AC_DEFUN([OVS_CHECK_LINUX], [
Using SKB_GSO_UDP breaks the compilation on Linux 4.14. Check for
the HAVE_SKB_GSO_UDP compiler #define.
Signed-off-by: Greg Rose
---
datapath/datapath.c | 9 ++---
datapath/linux/compat/stt.c | 11 ++-
2 files changed, 16 insertions(+), 4 deletions(-)
From: Florian Westphal
Upstream commit:
commit b3480fe059ac9121b5714205b4ddae14b59ef4be
Author: Florian Westphal
Date: Sat Aug 12 00:57:08 2017 +0200
netfilter: conntrack: make protocol tracker pointers const
Doesn't change generated code,
If the entire file is not going to be compiled because OVS is using
upstream tunnel support then also don't bother pulling in the headers.
Signed-off-by: Greg Rose
---
datapath/linux/compat/ip_gre.c| 2 +-
datapath/linux/compat/ip_output.c | 2 +-
2 files changed, 2
An extended netlink ack has been added for 4.14 - add compat layer
changes so that it compiles for all kernels up to and including
4.14.
Signed-off-by: Greg Rose
---
acinclude.m4| 3 +++
datapath/linux/compat/include/linux/netdevice.h |
On Mon, Jan 29, 2018 at 2:44 PM, Ben Pfaff wrote:
> On Mon, Jan 29, 2018 at 02:35:35PM -0800, William Tu wrote:
>> On Mon, Jan 29, 2018 at 2:27 PM, Ben Pfaff wrote:
>> > On Mon, Jan 29, 2018 at 02:16:24PM -0800, William Tu wrote:
>> >> On Thu, Jan 25, 2018 at 3:39 PM,
On Mon, Jan 29, 2018 at 02:35:35PM -0800, William Tu wrote:
> On Mon, Jan 29, 2018 at 2:27 PM, Ben Pfaff wrote:
> > On Mon, Jan 29, 2018 at 02:16:24PM -0800, William Tu wrote:
> >> On Thu, Jan 25, 2018 at 3:39 PM, Ben Pfaff wrote:
> >> > ovs-vswitchd makes extensive
On Mon, Jan 29, 2018 at 2:27 PM, Ben Pfaff wrote:
> On Mon, Jan 29, 2018 at 02:16:24PM -0800, William Tu wrote:
>> On Thu, Jan 25, 2018 at 3:39 PM, Ben Pfaff wrote:
>> > ovs-vswitchd makes extensive use of RCU to defer freeing memory past the
>> > latest time that it
On Thu, Jan 25, 2018 at 3:39 PM, Ben Pfaff wrote:
> The asynchronous IO library in glibc starts threads that show up as memory
> leaks in valgrind. This commit attempts to avoid the warnings by flushing
> all the asynchronous I/O to the log file before exiting. This only does
>
On Mon, Jan 29, 2018 at 02:16:24PM -0800, William Tu wrote:
> On Thu, Jan 25, 2018 at 3:39 PM, Ben Pfaff wrote:
> > ovs-vswitchd makes extensive use of RCU to defer freeing memory past the
> > latest time that it could be in use by a thread. Until now, ovs-vswitchd
> > has not
On Thu, Jan 25, 2018 at 3:39 PM, Ben Pfaff wrote:
> ovs-vswitchd makes extensive use of RCU to defer freeing memory past the
> latest time that it could be in use by a thread. Until now, ovs-vswitchd
> has not waited for RCU callbacks to fire before exiting. This meant that
> in
Signed-off-by: Han Zhou
---
ovn/utilities/ovn-nbctl.8.xml | 44 ++-
1 file changed, 43 insertions(+), 1 deletion(-)
diff --git a/ovn/utilities/ovn-nbctl.8.xml b/ovn/utilities/ovn-nbctl.8.xml
index 3688d35..f5ad360 100644
---
OUTSOURCING Y SUS CONSECUENCIAS FISCALES
Febrero 07 - webinar Interactivo
Este webinar está diseñado para las empresas que prestan servicios de
outsourcing de personal o las interesadas en contratar personal bajo la figura
del outsourcing.
TEMARIO:
El Outsourcing en términos de la Ley
OVS supports connection tracker related match fields and actions.
Added a tutorial to demonstrate the basic use cases for some of these
match fields and actions.
Signed-off-by: Ashish Varma
---
Documentation/automake.mk | 1 +
Signed-off-by: Han Zhou
---
ovn/controller/ofctrl.h | 2 --
1 file changed, 2 deletions(-)
diff --git a/ovn/controller/ofctrl.h b/ovn/controller/ofctrl.h
index 125f9a4..d53bc68 100644
--- a/ovn/controller/ofctrl.h
+++ b/ovn/controller/ofctrl.h
@@ -54,6 +54,4 @@ void
The test (ptap - recirculate after packet_type change) failed because
function format_odp_key_attr__ outputs src, dst and proto in the case of
OVS_KEY_ATTR_IPV4.
Signed-off-by: Yifeng Sun
---
tests/packet-type-aware.at | 2 +-
1 file changed, 1 insertion(+), 1
On 26 January 2018 at 09:13, Gregory Rose wrote:
> On 1/19/2018 7:55 PM, Ansis Atteka wrote:
>>
>> From: Ansis Atteka
>>
>> This patch sets up foundations for Proof of Concepts that
>> simply materialize documentation into Ansible instructions
>>
Yesterday, the ACM SOSR awards committee announced that it was granting
Open vSwitch its second annual Software Systems Award, which is given to
recognize the development of a software system that has had a
significant impact on SDN research, implementations, and tools. The
award comes along with
> -Original Message-
> From: Ilya Maximets [mailto:i.maxim...@samsung.com]
> Sent: Monday, 29 January, 2018 09:35
> To: Jan Scheurich ; Venkatesan Pradeep
> ; Stokes, Ian
> ; d...@openvswitch.org
> Cc:
Hi Alin,
Thanks for the review. I’ll address the warning and send out the patch.
Thanks,
Anand Kumar
On 1/29/18, 5:20 AM, "Alin Serdean" wrote:
Trimming the patch a bit.
Just one small nit from the static analyzer inlined.
Rest looks
On 1/10/2018 11:53 PM, Yi Yang wrote:
This patch series is to backport NSH support patches in Linux net-next tree
to OVS in order that it can support NSH in kernel compat mode.
Yi Yang (5):
datapath: ether: add NSH ethertype
datapath: vxlan: factor out VXLAN-GPE next protocol
datapath:
> -Original Message-
> From: Ben Pfaff [mailto:b...@ovn.org]
> Sent: Saturday, January 27, 2018 5:35 PM
> To: Stokes, Ian
> Cc: ovs-dev@openvswitch.org
> Subject: Re: OVS DPDK: dpdk_merge pull request for master
>
> Thanks for all the pull requests. I merged all of
Currently, there is one global lock for conntrack module, which protects
conntrack entries and conntrack table. All the NAT operations are
performed holding this lock.
This becomes inefficient, as the number of conntrack entries grow.
With new implementation, we will have two PNDIS_RW_LOCK_EX
Initial discussion on the OVS-DPDK RFC approach.
We will be discussing about the following points in the meeting today.
Regards
_Sugesh
From: Finn Christensen [mailto:f...@napatech.com]
Sent: Friday, January 26, 2018 1:41 PM
To: Chandran, Sugesh ; Loftus, Ciara
I've heard that there are problems with the mailing list this morning,
so here's a test email.
___
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev
Some of the functions and code are refactored
so that new conntrack lock can be implemented
Signed-off-by: Anand Kumar
Acked-by: Alin Gabriel Serdean
---
datapath-windows/ovsext/Conntrack-nat.c | 11 +-
datapath-windows/ovsext/Conntrack.c | 174
From: Daniel Axtens
Date: Mon, 29 Jan 2018 14:20:58 +1100
> OK, so how about:
>
> - first, a series that introduces skb_gso_validate_mac_len and uses it
>in bnx2x. This should be backportable without difficulty.
>
> - then, a series that wires skb_gso_validate_mac_len
Trimming the patch a bit.
Just one small nit from the static analyzer inlined.
Rest looks good.
Acked-by: Alin Gabriel Serdean
<--8<-->
/*
@@ -124,12 +135,9 @@
This patch series replaces existing one RW lock implemenation in
conntrack with two RW locks in conntrack and one RW lock in NAT.
---
v1->v2:
- Patch 3, address review comments
v2->v3:
- Patch 3, fix invalid memory access after deleting ct entry
v3->v4:
- Patch 3, address static analyzer
Thank you all for attending today call.
I have updated the MOM in the following document.
https://docs.google.com/document/d/1KeQB5NIUph721uuk1f1wMy4QXwSWxlzDaumd_bWX6YI/edit?usp=sharing
Regards
_Sugesh
-Original Appointment-
From:
Sent: None
To: Chandran,
Hi Yuanhan,
This will not break our PMD. I think PMDs should be able to handle rss_conf ==
NULL and then failover to default or initially set rss_conf.
Finn
>-Original Message-
>From: Yuanhan Liu [mailto:y...@fridaylinux.org]
>Sent: 29. januar 2018 07:59
>To: Stokes, Ian
Hi Jan/Pradeep,
Thanks for flagging this issue, I hadn't considered it before. I agree that
this needs to be investigated further.
If it's of use I have reverted the per port mempool patches manually for
testing with the head of master so that both approaches can be checked against
these type
From: Wang, Hongbin
Sent: 29 January 2018 10:48
To: Wang, Hongbin
Subject: Hallo
Brauchen Sie einen Kredit?
___
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev
Eric Dumazet writes:
> On Fri, 2018-01-26 at 00:44 +1100, Daniel Axtens wrote:
>> Hi Eric,
>>
>> > May I ask which tree are you targeting ?
>> >
>> > ( Documentation/networking/netdev-FAQ.txt )
>>
>> I have been targeting net-next, but I haven't pulled for about two
>>
Hi Pradeep,
Yes, this is for sure a bug in the current OVS mempool handling (and possibly
in many other DPDK applications). In the past it was perhaps not so critical
because shared mempools rarely got released, but with per port mempools it
becomes a real threat. And as you say, we do not
Hi,
I'd like to take one step back and look at how much many mbufs we actually need.
Today mbufs are consumed in the following places:
a) Rx queues of *physical* dpdk ports: dev->requested_n_rxq *
dev->requested_rxq_size
Note 1: These mbufs are hogged up at all times.
Note 2: There
On 1/23/2018 11:35 AM, Justin Pettit wrote:
Enough time has passed that this doesn't apply cleanly to master either. Would
you mind rebasing these, too?
Thanks,
--Justin
Yep, I can do that.
thanks,
- Greg
On Dec 11, 2017, at 1:50 PM, Greg Rose wrote:
The
On 1/23/2018 12:13 AM, Justin Pettit wrote:
Hi, Greg. I haven't looked at these in detail, but it doesn't look like NEWS
or the FAQ supported kernel list was updated. Would you mind adding those and
rebasing against the current master? If you can do that, I'll take a closer
look and get
On 29.01.2018 11:50, Jan Scheurich wrote:
>> -Original Message-
>> From: Ilya Maximets [mailto:i.maxim...@samsung.com]
>> Sent: Monday, 29 January, 2018 09:35
>> To: Jan Scheurich ; Venkatesan Pradeep
>> ; Stokes, Ian
>>
On 29.01.2018 11:19, Jan Scheurich wrote:
> Hi,
>
> I'd like to take one step back and look at how much many mbufs we actually
> need.
>
> Today mbufs are consumed in the following places:
>
> 1. Rx queues of **physical** dpdk ports: dev->requested_n_rxq *
> dev->requested_rxq_size
>
Currently NAT module relies on the existing conntrack lock.
This patch provides a basic lock implementation for NAT module
in conntrack.
Signed-off-by: Anand Kumar
Acked-by: Alin Gabriel Serdean
---
datapath-windows/ovsext/Conntrack.c | 36
47 matches
Mail list logo