{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":185818351,"defaultBranch":"master","name":"ovn","ownerLogin":"ovsrobot","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2019-05-09T14:44:57.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/45605505?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1717172366.0","currentOid":""},"activityList":{"items":[{"before":null,"after":"fdec4887ec9fc30a7f52e28fd411bcd6c06b182b","ref":"refs/heads/series_409061","pushedAt":"2024-05-31T16:19:26.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"provider networks: Provide the option to tunnel traffic.\n\nThis patch adds a global config option - 'provider_network_overlay' and\nwhen set to true, any traffic destined to a VIF logical port of a\nprovider logical switch (having localnet port(s)), is tunnelled to\nthe destination chassis, instead of sending it out via the localnet\nport. This feature is useful for the following reasons:\n\n1. CMS can add both provider logical switches and overlay logical\n swithes to a logical router. With this option set, E-W routing between\n these logical switches will be tunnelled all the time. The router port\n mac addresses are not leaked from multiple chassis to the upstream\n switches anymore.\n\n2. NATting will work as expected either in the gateway chassis or on\n the source VIF chassis (if external_mac and logical_port set).\n\n3. With this option set, there is no need to centralize routing\n for provider logical switches ('reside-on-redirect-chassis').\n\n4. With the commits [1] now merged, MTU issues arising due to tunnel\n overhead will be handled gracefully.\n\n[1] - 3faadc76ad71 (\"northd: Fix pmtud for non routed traffic.\")\n 221476a01f26 (\"ovn: Add tunnel PMTUD support.\")\n\nReported-at: https://issues.redhat.com/browse/FDP-209\nSigned-off-by: Numan Siddique \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"provider networks: Provide the option to tunnel traffic."}},{"before":null,"after":"a19d8bf954b5bd4bd79f952abd989e5b41044b0a","ref":"refs/heads/series_409022","pushedAt":"2024-05-31T12:59:41.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"tests: Fix flaky PMUTD flows test.\n\nAdd missing sync calls to make sure that the flows are present and\nstrip the statistics from the flows.\n\nFixes: 3faadc76ad71 (\"northd: Fix pmtud for non routed traffic.\")\nSigned-off-by: Ales Musil \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"tests: Fix flaky PMUTD flows test."}},{"before":"0cb36600a1442550e7dc051807c8a537ee80cdbf","after":"c7d6a824d3774a4c4877a69ac3ca2f738b5e517a","ref":"refs/heads/series_408749","pushedAt":"2024-05-29T16:07:28.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"northd: Use the NAT match column.\n\nUse the newly added NAT match and priority column in logical flows.\nThis allows to differentiate between various scenarios and more\nfine-grained control over the resulting translation. The flows with\nthe extra match have higher priority than regular flows as the\nflows without match are subset of the flows with match, the priority\nis calculated as 300 + priority column.\n\nReported-at: https://issues.redhat.com/browse/FDP-433\nSigned-off-by: Ales Musil \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"northd: Use the NAT match column."}},{"before":"e965fcf28e1c3f37c916014f4ccdbef00099f4ae","after":"0cb36600a1442550e7dc051807c8a537ee80cdbf","ref":"refs/heads/series_408749","pushedAt":"2024-05-29T16:06:09.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"nb: Add support for match and priority in NAT.\n\nAdd support for match and priority in NAT table. This allows to define\nNAT that has extra match condition to have more fine-grained control\nover the final NAT rule application. At the same time it allows for\nNAT rules that would be considered as duplicates otherwise e.g.\nmultiple SNATs with same logical IP, but different external IP. Also,\nwhen the match is specified allow addition of priority to order the\nNAT rule valuation as needed.\n\nSigned-off-by: Ales Musil \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"nb: Add support for match and priority in NAT."}},{"before":null,"after":"e965fcf28e1c3f37c916014f4ccdbef00099f4ae","ref":"refs/heads/series_408749","pushedAt":"2024-05-29T16:04:25.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"nothd: Unify the priority calculation for NAT flows.\n\nThe priority calculation was scattered in multiple places which\ncould result in errors when the code is being updated. Move it\nto common function that makes it very clear how is the priority\ncalculated.\n\nSigned-off-by: Ales Musil \nAcked-by: Mark Michelson \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"nothd: Unify the priority calculation for NAT flows."}},{"before":null,"after":"8182b88e09ffedc94a1071154d62c0d3e71dedae","ref":"refs/heads/series_408655","pushedAt":"2024-05-29T14:09:40.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"northd: Fix the match not being cleared inside the loop.\n\nThe match wasn't cleared which led to matches being appended together\nand the ovn-controller failed to parse them.\n\nFixes: 3faadc76ad71 (\"northd: Fix pmtud for non routed traffic.\")\nSigned-off-by: Ales Musil \nAcked-by: Dumitru Ceara \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"northd: Fix the match not being cleared inside the loop."}},{"before":null,"after":"73df5479d7ccdefb3463943fca0991cbda97d293","ref":"refs/heads/series_408640","pushedAt":"2024-05-29T13:50:12.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"northd: Fix the match not being cleared inside the loop.\n\nThe match wasn't cleared which led to matches being appended together\nand the ovn-controller failed to parse them.\n\nFixes: 3faadc76ad71 (\"northd: Fix pmtud for non routed traffic.\")\nSigned-off-by: Ales Musil \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"northd: Fix the match not being cleared inside the loop."}},{"before":null,"after":"c4136d9cffadc97b6fd303e1e79a755a362443a2","ref":"refs/heads/series_408611","pushedAt":"2024-05-29T13:23:42.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"text respresntations for drop sampling.\n\ncreated a new column in the southbound database to hardcode a human readable\ndescription for flows. This first use is describing why the flow is dropping packets.\nThe new column is called flow_desc and will create southbound database entries like this\n\n_uuid : 20f1897b-477e-47ae-a32c-c546d83ec097\nactions : \"sample(probability=65535,collector_set=123,obs_domain=1,obs_point=$cookie); /* drop */\"\ncontroller_meter : []\nexternal_ids : {source=\"northd.c:8721\", stage-name=ls_in_l2_unknown}\nflow_desc : \"No L2 destination\"\nlogical_datapath : []\nlogical_dp_group : ee3c3db5-98a2-4f34-8a84-409deae140a7\nmatch : \"outport == \\\"none\\\"\"\npipeline : ingress\npriority : 50\ntable_id : 27\ntags : {}\nhash : 0\n\nfuture work includes entering more flow_desc for more flows and adding\nflow_desc to the actions as a comment.\n\nSigned-off-by: Jacob Tanenbaum \nSuggested-by: Dumitru Ceara \nReported-at: https://issues.redhat.com/browse/FDP-307\nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"text respresntations for drop sampling."}},{"before":null,"after":"516e12601b0746b0e9a03edf33a43f3bee3b2ae9","ref":"refs/heads/series_408589","pushedAt":"2024-05-29T12:48:59.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"northd: Add bfd and bfd_consumer nodes to I-P engine.\n\nIntroduce bfd and bfd_consumer nodes to northd I-P engine to track bfd\nconnections and northd static_route/policy_route changes.\n\nReported-at: https://issues.redhat.com/browse/FDP-600\nSigned-off-by: Lorenzo Bianconi \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"northd: Add bfd and bfd_consumer nodes to I-P engine."}},{"before":null,"after":"252d8dfaa75c2b7b711e7643a06c450799acb774","ref":"refs/heads/series_408375","pushedAt":"2024-05-27T18:39:54.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"controller: Send RARP/GARP for VIF post link state is up.\n\nCurrently, GARP/RARP broadcast is sent for VIFs (part of logical\nswitch with localnet port) after iface-id is set.\nThis fix is to avoid packet loss during migration if iface-id\nis set even before the VM migration is completed.\n\nSigned-off-by: Shibir Basak \nAcked-by: Naveen Yerramneni \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"controller: Send RARP/GARP for VIF post link state is up."}},{"before":"888cca77460450efe8452ca68e630adb6ea89b29","after":"f0d61990b960e62b595258a775ca0526f11b18c8","ref":"refs/heads/series_408257","pushedAt":"2024-05-27T07:23:24.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"controller, northd: Add support for CT zone limits.\n\nAdd support for limitng the CT zone usage per Ls, LR or LSP.\nWhen the limit is configured on logical switch it will also implicitly\nset limits for all ports in that logical switch. The port configuration\ncan be overwritten individually and has priority over the whole logical\nswitch configuration.\n\nThe value 0 means unlimited, when the value is not specified it is\nderived from OvS default CT limit specified for given OvS datapath.\n\nReported-at: https://bugzilla.redhat.com/2189924\nSigned-off-by: Ales Musil \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"controller, northd: Add support for CT zone limits."}},{"before":"fcd0112ca207abb86545542a9620cdad8d031abe","after":"888cca77460450efe8452ca68e630adb6ea89b29","ref":"refs/heads/series_408257","pushedAt":"2024-05-27T07:22:24.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"controller: Prepare structure around CT zone limiting.\n\nIn order to be able to store CT limits for specified zone, store the\nzone inside separate struct instead of simap. This allows to add\nthe addition of limit without chaning the whole infrastructure again.\n\nThis is a preparation step for the CT zone limits.\n\nSigned-off-by: Ales Musil \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"controller: Prepare structure around CT zone limiting."}},{"before":"8e6b87b047fcff9793463c53511d7eb742606d24","after":"fcd0112ca207abb86545542a9620cdad8d031abe","ref":"refs/heads/series_408257","pushedAt":"2024-05-27T07:21:41.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"controller: Further encapsulate the CT zone handling.\n\nMove more code into the new ct-zone module and encapsulate\nfunctionality that is strictly related to CT zone handling.\n\nSigned-off-by: Ales Musil \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"controller: Further encapsulate the CT zone handling."}},{"before":null,"after":"8e6b87b047fcff9793463c53511d7eb742606d24","ref":"refs/heads/series_408257","pushedAt":"2024-05-27T07:20:00.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"controller: Move CT zone handling into separate module.\n\nMove the CT zone handling specific bits into it's own module. This\nallows for easier changes done within the module and separates the\nlogic that is unrelated from ovn-controller.\n\nSigned-off-by: Ales Musil \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"controller: Move CT zone handling into separate module."}},{"before":null,"after":"deb1d1d0ce998b34ed04a57f665779f93e992b4a","ref":"refs/heads/series_408005","pushedAt":"2024-05-24T08:20:08.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"Do not reply on unicast arps for IPv4 targets.\n\nReply only if target ethernet address is broadcast, if\naddress is specified explicitly do noting to let target\nreply by itself. This technique allows to monitor target\naliveness with arping.\n\nCloses #239\n\nSigned-off-by: Vasyl Saienko \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"Do not reply on unicast arps for IPv4 targets."}},{"before":"535c36af4512f5ca71ad4c645aa6d7fb1870b0bd","after":"80c03a0e31a15a409c70d9a8667f4b4fd1115ac9","ref":"refs/heads/series_407891","pushedAt":"2024-05-23T14:23:43.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"controller, northd: Add support for CT zone limits.\n\nAdd support for limitng the CT zone usage per Ls, LR or LSP.\nWhen the limit is configured on logical switch it will also implicitly\nset limits for all ports in that logical switch. The port configuration\ncan be overwritten individually and has priority over the whole logical\nswitch configuration.\n\nThe value 0 means unlimited, when the value is not specified it is\nderived from OvS default CT limit specified for given OvS datapath.\n\nReported-at: https://bugzilla.redhat.com/2189924\nSigned-off-by: Ales Musil \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"controller, northd: Add support for CT zone limits."}},{"before":"5604261c6fcd24a2ab33b8ffca154eb648500c86","after":"535c36af4512f5ca71ad4c645aa6d7fb1870b0bd","ref":"refs/heads/series_407891","pushedAt":"2024-05-23T14:22:42.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"controller: Prepare structure around CT zone limiting.\n\nIn order to be able to store CT limits for specified zone, store the\nzone inside separate struct instead of simap. This allows to add\nthe addition of limit without chaning the whole infrastructure again.\n\nThis is a preparation step for the CT zone limits.\n\nSigned-off-by: Ales Musil \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"controller: Prepare structure around CT zone limiting."}},{"before":"f6415c758a7cafc2d941ac887f4817a1c79e1a37","after":"5604261c6fcd24a2ab33b8ffca154eb648500c86","ref":"refs/heads/series_407891","pushedAt":"2024-05-23T14:21:58.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"controller: Further encapsulate the CT zone handling.\n\nMove more code into the new ct-zone module and encapsulate\nfunctionality that is strictly related to CT zone handling.\n\nSigned-off-by: Ales Musil \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"controller: Further encapsulate the CT zone handling."}},{"before":null,"after":"f6415c758a7cafc2d941ac887f4817a1c79e1a37","ref":"refs/heads/series_407891","pushedAt":"2024-05-23T14:20:18.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"controller: Move CT zone handling into separate module.\n\nMove the CT zone handling specific bits into it's own module. This\nallows for easier changes done within the module and separates the\nlogic that is unrelated from ovn-controller.\n\nSigned-off-by: Ales Musil \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"controller: Move CT zone handling into separate module."}},{"before":null,"after":"6affb63a59c75d864c649bf83d0ee6a5c031b419","ref":"refs/heads/series_407735","pushedAt":"2024-05-22T12:40:12.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"controller: Store src_mac, src_ip in svc_monitor struct.\n\nThese structure members are read in pinctrl_handler() in a separare thread.\nThis is unsafe: when IDL is re-connected or some IDL objects are freed\nafter svc_monitors list with svc_monitor structures, which point to\nsbrec_service_monitor is initialized, sb_svc_mon structure property can\npoint to wrong address, which then leads to segmentation fault in\nsvc_monitor_send_tcp_health_check__() and\nsvc_monitor_send_udp_health_check() on accessing svc_mon->sb_svc_mon.\n\nImagine situation:\n\nMain ovn-controller thread:\n1. Connects to SB and fills IDL with DB contents.\n2. run pinctrl_run() with pinctrl mutex and sync_svc_monitors() as a part\n of it.\n3. Release mutex.\n\n...\n4. Loss of OVNSB connection for any reason (network outage/inactivity probe\n timeout/etc), start new main-loop iteration, re-initialize IDL in\n ovsdb_idl_run() (which probably will destroy previous IDL objects).\n...\n\npinctrl thread:\n5. Awake from poll_block().\n... run new iteration in its main loop ...\n6. Acquire mutex lock.\n7. Run svc_monitors_run(), run svc_monitor_send_tcp_health_check__() or\n svc_monitor_send_udp_health_check(), which try to access IDL objects\n with outdated pointers.\n\n8. Segmentation fault:\n\nStack trace of thread 212406:\n __GI_strlen (libc.so.6)\n inet_pton (libc.so.6)\n ip_parse (ovn-controller)\n svc_monitor_send_tcp_health_check__.part.37 (ovn-controller)\n svc_monitor_send_health_check (ovn-controller)\n pinctrl_handler (ovn-controller)\n ovsthread_wrapper (ovn-controller)\n start_thread (libpthread.so.0)\n __clone (libc.so.6)\n\nThis patch removes unsafe access to IDL objects from pinctrl thread.\nNew svc_monitor structure members are used to store needed data.\n\nCC: Numan Siddique \nAcked-by: Ales Musil \nFixes: 8be01f4a5329 (\"Send service monitor health checks\")\nSigned-off-by: Vladislav Odintsov \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"controller: Store src_mac, src_ip in svc_monitor struct."}},{"before":"91c8b4c4b3baf2c8e7e808d0a692294d3556dba3","after":"517ef96755f24a85ab2c0c40e3c1dbd4562bd4d2","ref":"refs/heads/series_407637","pushedAt":"2024-05-21T20:43:53.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"Add support for overlay provider networks.\n\nIt is expected that a provider network logical switch has a localnet logical\nswitch port in order to bridge the overlay traffic to the underlay traffic.\nThere can be some usecases where a overlay logical switch (without\na localnet port) can act as a provider network and presently NAT doesn't\nwork as expected. This patch adds this support. A new config option\n\"overlay_provider_network\" is added to support this feature.\nThis feature gets enabled for a logical switch 'P' if:\n - The above option is set to true in the Logical_Switch.other_config\n column.\n - The logical switch 'P' doesn't have any localnet ports.\n - The logical router port of a router 'R' connecting to 'P'\n is a gateway router port.\n - And the logical router 'R' has only one gateway router port.\n\nIf all the above conditions are met, ovn-northd creates a chassisredirect\nport for the logical switch port (of type router) connecting to the\nrouter 'R'. For example, if the logical port is named as \"P-R\" and its\npeer router port is \"R-P\", then chassisredirect port cr-P-R is created\nalong with cr-R-P. Gateway chassis binding the cr-R-P also binds cr-P-R.\nThis ensures that the routing is centralized on this gateway chassis for\nthe traffic coming from switch \"P\" towards the router or vice versa.\nThis centralization is required in order to support NAT (both SNAT and\nDNAT). Distributed NAT (i.e if external_mac and router_port is set) is\nnot supported and instead the router port mac is used for such traffic.\n\nReported-at: https://issues.redhat.com/browse/FDP-364\nSigned-off-by: Numan Siddique \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"Add support for overlay provider networks."}},{"before":"d6d72800ad677560fd54cb47290b103c5bb19508","after":"91c8b4c4b3baf2c8e7e808d0a692294d3556dba3","ref":"refs/heads/series_407637","pushedAt":"2024-05-21T20:42:51.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"northd: Refactor chassisresident port checking.\n\nThe implementation of util functions \"is_cr_port()\" and \"is_l3dgw_port()\"\nare confusing and not very intuitive. This patch adds some\ndocumentation. It also renames the struct ovn_port member 'l3dgw_port'\nto 'primary_port'. If struct ovn_port->primary_port is set, then it\nmeans 'ovn_port' instance is a chassis resident port and it is derived\nfrom the primary port. An upcoming patch creates a chassisresident port\neven for a logical switch port of type \"patch\" and hence renamed to\navoid confusion.\n\nSigned-off-by: Numan Siddique \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"northd: Refactor chassisresident port checking."}},{"before":null,"after":"d6d72800ad677560fd54cb47290b103c5bb19508","ref":"refs/heads/series_407637","pushedAt":"2024-05-21T20:41:12.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"northd: Don't reparse lport's addresses while adding L2_LKUP flows.\n\nThe addresses are already parsed and stored in the \"struct ovn_port\"'s\nlsp_addrs field.\n\nSigned-off-by: Numan Siddique \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"northd: Don't reparse lport's addresses while adding L2_LKUP flows."}},{"before":null,"after":"3225bc38460c531d6470a957b85a010af7492ae5","ref":"refs/heads/series_407460","pushedAt":"2024-05-20T19:20:12.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"tests: Ignore ovs-vswitchd received packet on unknown port.\n\nThe ovs-vswitchd daemon may in some situations, typically during\nteardown, log a warning level message 'received packet on unknown\nport ...'.\n\nIgnore this message.\n\nReported-at: https://launchpad.net/bugs/2066194\nSigned-off-by: Frode Nordahl \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"tests: Ignore ovs-vswitchd received packet on unknown port."}},{"before":null,"after":"5a3a8aa15723c903f8a5978542efe8049d6f1887","ref":"refs/heads/series_407434","pushedAt":"2024-05-20T15:40:02.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"ovn-nbctl: Show bfd option man for lr-policy-add command.\n\nAdd missing bfd option in ovn-nbctl manual for lr-policy-add command\n\nFixes: 62d5491c0155 (\"northd: Add BFD support for ECMP route policy.\")\nSigned-off-by: Lorenzo Bianconi \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"ovn-nbctl: Show bfd option man for lr-policy-add command."}},{"before":null,"after":"9c9fb8139fa1c7764f0a56cd0003f970b42cc91e","ref":"refs/heads/series_407395","pushedAt":"2024-05-20T09:40:36.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"northd: Fix an issue wrt mac binding aging.\n\nIssue:\nIn case of a Logical_Router without mac_binding_age_threshold set or a\nLogical_Router with an incorrectly formatted mac_binding_threshold\noption, entries were not being purged from the Mac Binding table in\nSouthBound.\n\nThis was because in the function `en_mac_binding_aging_run` in case of\nan invalid mac_binding_threshold entry or if mac_binding_threshold is\nnot set we are returning from the loop instead of iterating through the\nremaining LRs. As a result, subsequent runs of the aging_waker node are\nalso not scehduled and we end up not purging any MAC Bindings.\n\nFix:\nThis patch fixes this issue by changing the return to a continue so that\nwe skip the current LR but continue processing for the remaining LRs.\n\nFixes: 78851b6ffb58 (\"Support CIDR-based MAC binding aging threshold.\")\nSigned-off-by: Indrajitt Valsaraj \nAcked-by: Naveen Yerramneni \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"northd: Fix an issue wrt mac binding aging."}},{"before":null,"after":"8ecac7614263b2b80cd942671803f5a51ebc4ae5","ref":"refs/heads/series_407132","pushedAt":"2024-05-17T05:20:16.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"northd: Fix an issue wrt mac binding aging.\n\nIssue:\nIn case of a Logical_Router without mac_binding_age_threshold set or a\nLogical_Router with an incorrectly formatted mac_binding_threshold\noption, entries were not being purged from the Mac Binding table in\nSouthBound.\n\nThis was because in the function `en_mac_binding_aging_run` in case of\nan invalid mac_binding_threshold entry or if mac_binding_threshold is\nnot set we are returning from the loop instead of iterating through the\nremaining LRs. As a result, subsequent runs of the aging_waker node are\nalso not scehduled and we end up not purging any MAC Bindings.\n\nFix:\nThis patch fixes this issue by changing the return to a continue so that\nwe skip the current LR but continue processing for the remaining LRs.\n\nFixes: 78851b6ffb58 (\"Support CIDR-based MAC binding aging threshold.\")\nSigned-off-by: Indrajitt Valsaraj \nAcked-by: Naveen Yerramneni \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"northd: Fix an issue wrt mac binding aging."}},{"before":null,"after":"784a69ae75b543f96e646853c9a2b7f873d98860","ref":"refs/heads/series_406998","pushedAt":"2024-05-16T06:20:00.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"northd: Fix an issue wrt mac binding aging.\n\nIssue:\nIn case of a Logical_Router without mac_binding_age_threshold set or a\nLogical_Router with an incorrectly formatted mac_binding_threshold\noption, entries were not being purged from the Mac Binding table in\nSouthBound.\n\nThis was because in the function `en_mac_binding_aging_run` in case of\nan invalid mac_binding_threshold entry or if mac_binding_threshold is\nnot set we are returning from the loop instead of iterating through the\nremaining LRs. As a result, subsequent runs of the aging_waker node are\nalso not scehduled and we end up not purging any MAC Bindings.\n\nFix:\nThis patch fixes this issue by changing the return to a continue so that\nwe skip the current LR but continue processing for the remaining LRs.\n\nFixes: 78851b6ffb58 (\"Support CIDR-based MAC binding aging threshold.\")\nSigned-off-by: Indrajitt Valsaraj \nAcked-by: Naveen Yerramneni \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"northd: Fix an issue wrt mac binding aging."}},{"before":null,"after":"501f61f2b4c804e0fa07fd1eff417721830d84ae","ref":"refs/heads/series_406994","pushedAt":"2024-05-16T05:39:58.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"northd: Fix an issue wrt mac binding aging.\n\nIssue:\nIn case of a Logical_Router without mac_binding_age_threshold set or a\nLogical_Router with an incorrectly formatted mac_binding_threshold option,\nentries were not being purged from the Mac Binding table in SouthBound.\n\nThis was because in the function `en_mac_binding_aging_run` in case of\nan invalid mac_binding_threshold entry or if mac_binding_threshold is\nnot set we are returning from the loop instead of iterating through the\nremaining LRs. As a result, subsequent runs of the aging_waker node are\nalso not scehduled and we end up not purging any MAC Bindings.\n\nFix:\nThis patch fixes this issue by changing the return to a continue so that\nwe skip the current LR but continue processing for the remaining LRs.\n\nFixes: 78851b6ffb58 (\"northd: Support CIDR-based MAC binding aging threshold.\")\nSigned-off-by: Indrajitt Valsaraj \nAcked-by: Naveen Yerramneni \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"northd: Fix an issue wrt mac binding aging."}},{"before":null,"after":"92adc9408b952a99c4e2e4e23c527eff0c55df29","ref":"refs/heads/series_406784","pushedAt":"2024-05-14T19:40:11.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ovsrobot","name":null,"path":"/ovsrobot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/45605505?s=80&v=4"},"commit":{"message":"controller: Store src_mac, src_ip in svc_monitor struct.\n\nThese structure members are read in pinctrl_handler() in a separare thread.\nThis is unsafe: when IDL is re-connected or some IDL objects are freed\nafter svc_monitors list with svc_monitor structures, which point to\nsbrec_service_monitor is initialized, sb_svc_mon structure property can\npoint to wrong address, which then leads to segmentation fault in\nsvc_monitor_send_tcp_health_check__() and\nsvc_monitor_send_udp_health_check() on accessing svc_mon->sb_svc_mon.\n\nImagine situation:\n\nMain ovn-controller thread:\n1. Connects to SB and fills IDL with DB contents.\n2. run pinctrl_run() with pinctrl mutex and sync_svc_monitors() as a part\n of it.\n3. Release mutex.\n\n...\n4. Loss of OVNSB connection for any reason (network outage/inactivity probe\n timeout/etc), start new main-loop iteration, re-initialize IDL in\n ovsdb_idl_run() (which probably will destroy previous IDL objects).\n...\n\npinctrl thread:\n5. Awake from poll_block().\n... run new iteration in its main loop ...\n6. Aqcuire mutex lock.\n7. Run svc_monitors_run(), run svc_monitor_send_tcp_health_check__() or\n svc_monitor_send_udp_health_check(), which try to access IDL objects\n with outdated pointers.\n\n8. Segmentation fault:\n\nStack trace of thread 212406:\n>> __GI_strlen (libc.so.6)\n>> inet_pton (libc.so.6)\n>> ip_parse (ovn-controller)\n>> svc_monitor_send_tcp_health_check__.part.37 (ovn-controller)\n>> svc_monitor_send_health_check (ovn-controller)\n>> pinctrl_handler (ovn-controller)\n>> ovsthread_wrapper (ovn-controller)\n>> start_thread (libpthread.so.0)\n>> __clone (libc.so.6)\n\nThis patch removes unsafe access to IDL objects from pinctrl thread.\nNew svc_monitor structure members are used to store needed data.\n\nCC: Numan Siddique \nFixes: 8be01f4a5329 (\"Send service monitor health checks\")\nSigned-off-by: Vladislav Odintsov \nSigned-off-by: 0-day Robot ","shortMessageHtmlLink":"controller: Store src_mac, src_ip in svc_monitor struct."}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEWTUoRQA","startCursor":null,"endCursor":null}},"title":"Activity ยท ovsrobot/ovn"}