Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

V1.7.8 release #487

Merged
merged 114 commits into from
Nov 4, 2019
Merged

V1.7.8 release #487

merged 114 commits into from
Nov 4, 2019

Conversation

ywc689
Copy link
Collaborator

@ywc689 ywc689 commented Nov 4, 2019

[ Feature ]

  • IPVS IPv6 tunnel forwarding mode
  • IPVS IPv6 over IPv4 tunnel forwarding mode (NAT64 tunnel)
  • Enable dedicated queue for bonding mode 4
  • Simple ipset and outwall route for IPv4
  • DPVS asynchronous logging
  • DPVS memory pool
  • Add more debug info

[ Bugfix ]

  • Fix keepalived vrrp process crash problem
  • Fix IPv4 fragment problem for OSPF protocol
  • Fix crash problem when cpu worker number over DPVS_MAX_LCORE
  • Fix serveral problems in ip_vs_redirect
  • Simplify dpvs msg and fix its crash problem
  • Fix inaccuracy problem when carry for DPVS timer
  • Fix contention problem for DPVS global timer
  • Fix templated-conn invalidation problem for DPVS persistent sessions
  • Fix some memory leak problems
  • Fix some formatting problem

weiyanhua and others added 30 commits November 7, 2018 14:54
mismatch of rte_lcore_id and rte_socket_id
…vice in function dp_vs_get_svc;

it may cause dpvs crash when keepalived restart.
fix ipvsadm conhash support
fix bug for get service/dest(double free)
ip_vs_service.c: fix possible use after free
keepalived: fix crash when remove all RS(s) from virtual service group
ip_vs_dest.c: remove useless codes
During nat64 test, the below issue is met on IPv6-side (aka wan side).
Provided that dpvs's gateway IPv6 address is  fcbd:dc00:46::1.

1) When the outgoing packet destined to IPv6 client is sent out from dpvs, we
   need to resolve dpvs's gateway mac address. So the below neighbour
   solicitation is sent from dpvs to its IPv6 gateway.

   (:: -> ff02::1:ff00:1) that includes info, "Neighbour Solicitation for
   fcbd:dc00:46::1".

   And the related neighbour entry, E1, is created on core A.

        E1: (fcbd:dc00:46::1, 00:00:00:00:00:00, dpdk1, DPVS_NUD_S_SEND)

2) The coresponding neighbour advertisement is received on core B.

   (fe80:274:9cff:fe0e:1441 -> ff02::1) that includes info, "Neighbour
   Advertisement fcbd:dc00:46::1 (rtr, ovr) is at 00:74:9c:0e:14:41".

   Also within ndisc_recv_na(), target address, "fcbd:dc00:46::1" should
   be used to find the neighbour entry instead of source-ip address,
   "fe80:274:9cff:fe0e:1441".

   Since the neighbour entry is not found on core B, we just create the below
   entry, E2 directly with the state of "DPVS_NUD_S_REACHABLE" and then sync it
   to the other cores. Lastly, the entry, E1 created on core A gets resolved
   accordingly.

        E2: (fcbd:dc00:46::1, 00:74:9c:0e:14:41, dpdk1, DPVS_NUD_S_REACHABLE)
Copy link
Collaborator

@mscbg mscbg left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1

Copy link
Collaborator

@ytwang0320 ytwang0320 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approve+1

@ywc689 ywc689 merged commit a6d51aa into master Nov 4, 2019
@ywc689 ywc689 deleted the v1.7.8-release branch November 4, 2019 11:50
ytwang0320 pushed a commit to ytwang0320/dpvs that referenced this pull request Dec 22, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants