Acceso a Recursos Federales para PyMES
Junio 05 - webinar Interactivo
Introducción:
En la actualidad el autoempleo y el emprendimiento son considerados una de las
mejores maneras de generar ingresos. Muchas veces tenemos la idea y los
conocimientos para iniciar, pero nos hace falta el
On Fri, 4 May 2018 at 11:28, Aaron Conole wrote:
> Since the policy is an intermediate file, it can inherit the policy
> module version from release version.
> Suggested-by: Ansis Atteka
> Signed-off-by: Aaron Conole
Acked-by: Ansis
When there is a flow rule which forwards a packet from geneve
port to another tunnel port, ex: gre, the tun_metadata carried
from the geneve port needs to be clean up. Otherwise, the output
tunnel port will incorrectly have geneve option being set.
For example, without the patch, the datapath
On Thu, 2018-05-10 at 19:05 +, Stokes, Ian wrote:
> > This concludes the cleanup by fixing some nits and adding some additional
> > cross-references.
> >
> > Signed-off-by: Stephen Finucane
> > ---
> > This was initially sent as part of a larger series but excluded from a
Hi Ben,
The following changes since commit d87e08978fc3b522acb4ecb21cffb5c2108b3b33:
ovn-nbctl: Support ACL commands on port groups. (2018-05-10 16:53:22 -0700)
are available in the git repository at:
https://github.com/istokes/ovs dpdk_merge
for you to fetch changes up to
Hi Ben,
The following changes since commit 3462a4ec4c28d0126d08955c3328712ea1ce6275:
ofproto: Fix crash processing malformed Bundle Add message. (2018-05-10
16:45:46 -0700)
are available in the git repository at:
https://github.com/istokes/ovs dpdk_merge_2_9
for you to fetch changes up
> diff --git a/datapath/vport-internal_dev.c b/datapath/vport-internal_dev.c
> index f48684b2e70f..90e76bac2165 100644
> --- a/datapath/vport-internal_dev.c
> +++ b/datapath/vport-internal_dev.c
> @@ -153,7 +153,7 @@ static const struct net_device_ops
> internal_dev_netdev_ops = {
>
Dear Team,
I need to modify the functionality of OVS to test some scenarios using
Network Emulator Core for my research I need to know the following things.
1. Which part of the code is dealing with Packet Switching and where these
packets are structured in OVS ?
2. Any link or document which
This patch fixes the kernel soft lockup issue with vxlan configuration where
the tunneled packet is sent on the same bridge where vxlan port is attached
to.
It detects the loop in vxlan xmit function and drops if loop is detected.
--- a/datapath/linux/compat/vxlan.c
+++
From: Numan Siddique
Presently when a VM's IPv6 stack sends a Neighbor Solicitation request for its
router IP, (mostly when the ND cache entry for the router is in STALE state)
ovn-controller responds with a Neighbor Adv packet (using the action nd_na).
But it doesn't set
Jan,
Thanx for your comments. Please see inline. I will send v4 patch with your
comments addressed.
Thanx
Manu
On 09/05/18, 5:26 AM, "Jan Scheurich" wrote:
Hi Manu,
Thanks for working on this. Two general comments:
1. Is there a chance to
Hello Team,
What is the IDE or framework used in Linux environment for the OVS
Develpment ?
Can we debug the OVS if used as SDN Service in Core Emulator or any other
network emulator .
Regards
Rakesh Kumar
___
dev mailing list
d...@openvswitch.org
On Fri, May 11, 2018 at 5:08 AM, Ben Pfaff wrote:
> On Thu, May 10, 2018 at 11:18:23PM +0530, nusid...@redhat.com wrote:
> > From: Numan Siddique
> >
> > Presently when a VM's IPv6 stack sends a Neighbor Solicitation request
> for its
> > router IP, (mostly
Hi Ben,
The following changes since commit 1a75e02b1b5e3a9ca5a1fb904da17022c86e9084:
Avoid crash in OvS while transmitting fragmented packets over tunnel.
(2018-05-09 15:02:02 -0700)
are available in the git repository at:
https://github.com/istokes/ovs dpdk_merge_2_8
for you to fetch
Hi Ben,
The following changes since commit f749357e624af52fb16a49ed41789db35293835b:
compat: Fix upstream 4.4.119 kernel (2018-05-08 17:35:03 -0700)
are available in the git repository at:
https://github.com/istokes/ovs dpdk_merge_2_7
for you to fetch changes up to
On Sun, May 06, 2018 at 03:26:35PM +0300, Paul Blakey wrote:
> OVS datapath flows aren't overlapping, so having their tc flower
> counterparts be prioritized makes no sense, we did so because of a
> tc flower restriction.
>
> Kernel tc flower added support for multiple masks on a single flower
>
On Fri, May 11, 2018 at 02:45:33PM +0530, rakesh kumar wrote:
> What is the IDE or framework used in Linux environment for the OVS
> Develpment ?
Most of my team uses Emacs or vim.
> Can we debug the OVS if used as SDN Service in Core Emulator or any other
> network emulator .
I don't know.
Thanks for the review, Ansis!
Ansis Atteka writes:
> On Fri, 4 May 2018 at 11:28, Aaron Conole wrote:
>
>> Currently, Open vSwitch on linux embeds the logic of loading and unloading
>> kernel modules into the ovs-ctl and ovs-lib script files. This
> On Thu, 2018-05-10 at 19:05 +, Stokes, Ian wrote:
> > > This concludes the cleanup by fixing some nits and adding some
> > > additional cross-references.
> > >
> > > Signed-off-by: Stephen Finucane
> > > ---
> > > This was initially sent as part of a larger series but
Hi Darell,
I reproduce the issue by making VM to transmit fragmented packets and in OvS if
we have corresponding rule
to transmit the received fragmented packet (from VM) over tunnel then I always
hit the crash.
Thanks
Rohith
On 11/05/18, 2:16 AM, "Darrell Ball" wrote:
On Fri, May 11, 2018 at 01:29:09AM +, Ansis Atteka wrote:
> On Fri, 4 May 2018 at 11:28, Aaron Conole wrote:
>
> > Currently, Open vSwitch on linux embeds the logic of loading and unloading
> > kernel modules into the ovs-ctl and ovs-lib script files. This works, but
> >
Great, thanks for the v2
On Fri, May 11, 2018 at 6:32 PM, Yi-Hung Wei wrote:
> 1) OVS datapath compat modules breaks on RHEL 7.5, because it moves
> ndo_change_mtu function pointer from 'struct net_device_ops' to
> 'struct net_device_ops_extended'.
>
> 2) RHEL 7.5
Unconditional return may cause packet leak in case of
'may_steal == true'.
Additionally, removed redundant checking for depth level and
clarified ignoring of the 'false' value of 'may_steal'.
CC: Sugesh Chandran
Fixes: 7c12dfc527a5 ("tunneling: Avoid datapath-recirc
On Fri, 11 May 2018 at 07:21, Aaron Conole wrote:
> Thanks for the review, Ansis!
> Ansis Atteka writes:
> > On Fri, 4 May 2018 at 11:28, Aaron Conole wrote:
> >
> >> Currently, Open vSwitch on linux embeds the logic of loading
Cómo Diseñar y aplicar
Indicadores Clave para el Desempeño
Fecha: 18/Mayo/2018
Horario: 10:00 a 13:00 y 15:00 a 18:00 horas
"La Matriz de Indicadores para Resultados (MIR) se construye para alinear los
objetivos de las Empresas. "
Un experto director académico aconseja:
Primero
1) OVS datapath compat modules breaks on RHEL 7.5, because it moves
ndo_change_mtu function pointer from 'struct net_device_ops' to
'struct net_device_ops_extended'.
2) RHEL 7.5 introduces the MTU range checking as mentioned in
6c0bf091 ("datapath: use core MTU range checking in core net infra").
> On RHEL 7.5, internal_dev_change_mtu will not be used and the compiler
> will throw a warning about it:
>
> CC [M] /root/ovs/datapath/linux/vport-internal_dev.o
> /root/ovs/datapath/linux/vport-internal_dev.c:92:12: warning:
> ‘internal_dev_change_mtu’ defined but not used [-Wunused-function]
> On May 11, 2018, at 9:10 AM, Ben Pfaff wrote:
>
> Presumably this was meant to be all-one-bits but it wasn't. It also didn't
> have the right endianness for an ovs_be16, so "sparse" complained.
>
> CC: Paul Blakey
> CC: Simon Horman
Presumably this was meant to be all-one-bits but it wasn't. It also didn't
have the right endianness for an ovs_be16, so "sparse" complained.
CC: Paul Blakey
CC: Simon Horman
Fixes: d00eeded6a9b ("netdev-tc-offloads: Probe for allowing multiple
On Fri, May 11, 2018 at 11:57:48AM +, Stokes, Ian wrote:
> Hi Ben,
>
> The following changes since commit 3462a4ec4c28d0126d08955c3328712ea1ce6275:
>
> ofproto: Fix crash processing malformed Bundle Add message. (2018-05-10
> 16:45:46 -0700)
>
> are available in the git repository at:
>
On Fri, May 11, 2018 at 11:58:02AM +, Stokes, Ian wrote:
> Hi Ben,
>
> The following changes since commit 1a75e02b1b5e3a9ca5a1fb904da17022c86e9084:
>
> Avoid crash in OvS while transmitting fragmented packets over tunnel.
> (2018-05-09 15:02:02 -0700)
>
> are available in the git
On Fri, May 11, 2018 at 11:58:10AM +, Stokes, Ian wrote:
> Hi Ben,
>
> The following changes since commit f749357e624af52fb16a49ed41789db35293835b:
>
> compat: Fix upstream 4.4.119 kernel (2018-05-08 17:35:03 -0700)
>
> are available in the git repository at:
>
>
On Thu, May 10, 2018 at 11:35 PM, Rohith Basavaraja <
rohith.basavar...@ericsson.com> wrote:
> Hi Darell,
>
> I reproduce the issue by making VM to transmit fragmented packets and in
> OvS if we have corresponding rule
> to transmit the received fragmented packet (from VM) over tunnel then I
>
On Fri, May 11, 2018 at 07:13:10PM +0200, Timothy Redaelli wrote:
> Currently in /etc/sysconfig/openvswitch it's not clear that
> force-corefiles is enabled by default.
> This patch adds a comment explaining that force-corefiles is, by
> default, set to yes.
>
> Signed-off-by: Timothy Redaelli
On Fri, May 11, 2018 at 11:57:30AM +, Stokes, Ian wrote:
> Hi Ben,
>
> The following changes since commit d87e08978fc3b522acb4ecb21cffb5c2108b3b33:
>
> ovn-nbctl: Support ACL commands on port groups. (2018-05-10 16:53:22 -0700)
>
> are available in the git repository at:
>
>
Code structure is explained as part of https://youtu.be/0BAeFEVCVbQ
I would suggest enabling logging and map the code flow.
On Fri, May 11, 2018, 2:29 PM rakesh kumar wrote:
> Dear Team,
>
> I need to modify the functionality of OVS to test some scenarios using
>
Currently in /etc/sysconfig/openvswitch it's not clear that
force-corefiles is enabled by default.
This patch adds a comment explaining that force-corefiles is, by
default, set to yes.
Signed-off-by: Timothy Redaelli
---
On Fri, May 11, 2018 at 10:44:40AM -0700, Justin Pettit wrote:
>
> > On May 11, 2018, at 9:10 AM, Ben Pfaff wrote:
> >
> > Presumably this was meant to be all-one-bits but it wasn't. It also didn't
> > have the right endianness for an ovs_be16, so "sparse" complained.
> >
> >
ofpacts_check__() was a huge switch statement with special cases for many
different kinds of actions. This made it unwieldy and put the special
cases far away from the rest of the code related to a given action. This
commit refactors the code to avoid the problem.
Signed-off-by: Ben Pfaff
Looks good to me, thanks.
Reviewed-by: Yifeng Sun
On Sun, Apr 29, 2018 at 2:02 PM, Ben Pfaff wrote:
> From: Paul Greenberg
>
> There is no INFO or WARN level log function. It is either ERROR or
> FATAL. This PR adds it.
>
>
On Fri, 4 May 2018 at 11:28, Aaron Conole wrote:
> Defines a type 'openvswitch_load_module_t' used exclusively for loading
> modules. This means that the 'openvswitch_t' domain won't require
> access to the module loading facility - such access can only happen
> after
41 matches
Mail list logo