X-Git-Url: https://pintos-os.org/cgi-bin/gitweb.cgi?a=blobdiff_plain;f=INSTALL.Linux;h=8ef2315777f7850ef29613378cd81ec3e06d48d2;hb=d308be1dff713f762e6ae18c1764115b866db5a8;hp=c7e4ed97d49aa356a019166aad0516ea351de519;hpb=22bcc0e70becd88bf895c44885d63704affe4284;p=openvswitch diff --git a/INSTALL.Linux b/INSTALL.Linux index c7e4ed97..8ef23157 100644 --- a/INSTALL.Linux +++ b/INSTALL.Linux @@ -46,9 +46,9 @@ INSTALL.userspace for more information. bridge") before starting the datapath. For optional support of ingress policing, you must enable kernel - configuration options NET_CLS_ACT, NET_CLS_U32, NET_SCH_INGRESS, - and NET_ACT_POLICE, either built-in or as modules. - (NET_CLS_POLICE is obsolete and not needed.) + configuration options NET_CLS_BASIC, NET_SCH_INGRESS, and + NET_ACT_POLICE, either built-in or as modules. (NET_CLS_POLICE is + obsolete and not needed.) If GRE tunneling is being used it is recommended that the kernel be compiled with IPv6 support (CONFIG_IPV6). This allows for @@ -117,11 +117,6 @@ following software: iproute2 (part of all major distributions and available at http://www.linux-foundation.org/en/Net:Iproute2). - - For debugging purposes, Open vSwitch expects that "tcpdump" is - installed as /usr/sbin/tcpdump. If tcpdump is not installed, or - if it is installed in a different location, then some Open - vSwitch log messages will not be as detailed. - You should ensure that /dev/urandom exists. To support TAP devices, you must also ensure that /dev/net/tun exists. @@ -171,7 +166,7 @@ Prerequisites section, follow the procedure below to build. To build the Linux kernel module, so that you can run the kernel-based switch, pass the location of the kernel build - directory on --with-l26. For example, to build for a running + directory on --with-linux. For example, to build for a running instance of Linux: % ./configure --with-linux=/lib/modules/`uname -r`/build @@ -268,13 +263,12 @@ installation, above, to listen on a Unix domain socket, to connect to any managers specified in the database itself, and to use the SSL configuration in the database: - % ovsdb-server /usr/local/etc/openvswitch/conf.db \ - --remote=punix:/usr/local/var/run/openvswitch/db.sock \ - --remote=db:Open_vSwitch,manager_options \ - --private-key=db:SSL,private_key \ - --certificate=db:SSL,certificate \ - --bootstrap-ca-cert=db:SSL,ca_cert \ - --pidfile --detach + % ovsdb-server --remote=punix:/usr/local/var/run/openvswitch/db.sock \ + --remote=db:Open_vSwitch,manager_options \ + --private-key=db:SSL,private_key \ + --certificate=db:SSL,certificate \ + --bootstrap-ca-cert=db:SSL,ca_cert \ + --pidfile --detach (If you built Open vSwitch without SSL support, then omit --private-key, --certificate, and --bootstrap-ca-cert.) @@ -288,8 +282,7 @@ ovsdb-tool (but running it at any time is harmless): Then start the main Open vSwitch daemon, telling it to connect to the same Unix domain socket: - % ovs-vswitchd unix:/usr/local/var/run/openvswitch/db.sock \ - --pidfile --detach + % ovs-vswitchd --pidfile --detach Now you may use ovs-vsctl to set up bridges and other Open vSwitch features. For example, to create a bridge named br0 and add ports