X-Git-Url: http://git.onelab.eu/?a=blobdiff_plain;f=INSTALL.Linux;h=8ef2315777f7850ef29613378cd81ec3e06d48d2;hb=dfbe0a908a3ea42b737c000d0e3a5511b6cdb8f1;hp=318c9a7526513c9dec8e6025f676f49a14fa45eb;hpb=8a2d6596f2cb43c097957ed6e003eb5225dd5003;p=sliver-openvswitch.git diff --git a/INSTALL.Linux b/INSTALL.Linux index 318c9a752..8ef231577 100644 --- a/INSTALL.Linux +++ b/INSTALL.Linux @@ -46,9 +46,9 @@ INSTALL.userspace for more information. bridge") before starting the datapath. For optional support of ingress policing, you must enable kernel - configuration options NET_CLS_ACT, NET_CLS_U32, NET_SCH_INGRESS, - and NET_ACT_POLICE, either built-in or as modules. - (NET_CLS_POLICE is obsolete and not needed.) + configuration options NET_CLS_BASIC, NET_SCH_INGRESS, and + NET_ACT_POLICE, either built-in or as modules. (NET_CLS_POLICE is + obsolete and not needed.) If GRE tunneling is being used it is recommended that the kernel be compiled with IPv6 support (CONFIG_IPV6). This allows for @@ -117,11 +117,6 @@ following software: iproute2 (part of all major distributions and available at http://www.linux-foundation.org/en/Net:Iproute2). - - For debugging purposes, Open vSwitch expects that "tcpdump" is - installed as /usr/sbin/tcpdump. If tcpdump is not installed, or - if it is installed in a different location, then some Open - vSwitch log messages will not be as detailed. - You should ensure that /dev/urandom exists. To support TAP devices, you must also ensure that /dev/net/tun exists. @@ -171,7 +166,7 @@ Prerequisites section, follow the procedure below to build. To build the Linux kernel module, so that you can run the kernel-based switch, pass the location of the kernel build - directory on --with-l26. For example, to build for a running + directory on --with-linux. For example, to build for a running instance of Linux: % ./configure --with-linux=/lib/modules/`uname -r`/build @@ -182,7 +177,7 @@ Prerequisites section, follow the procedure below to build. when invoking the configure script. For example, to build for MIPS with Linux: - % ./configure --with-linux=/path/to/linux-2.6 KARCH=mips + % ./configure --with-linux=/path/to/linux KARCH=mips The configure script accepts a number of other options and honors additional environment variables. For a full list, invoke @@ -199,7 +194,7 @@ Prerequisites section, follow the procedure below to build. 6. If you built kernel modules, you may load them with "insmod", e.g.: - % insmod datapath/linux-2.6/openvswitch_mod.ko + % insmod datapath/linux/openvswitch_mod.ko You may need to specify a full path to insmod, e.g. /sbin/insmod. To verify that the modules have been loaded, run "/sbin/lsmod" and @@ -268,13 +263,12 @@ installation, above, to listen on a Unix domain socket, to connect to any managers specified in the database itself, and to use the SSL configuration in the database: - % ovsdb-server /usr/local/etc/openvswitch/conf.db \ - --remote=punix:/usr/local/var/run/openvswitch/db.sock \ - --remote=db:Open_vSwitch,manager_options \ - --private-key=db:SSL,private_key \ - --certificate=db:SSL,certificate \ - --bootstrap-ca-cert=db:SSL,ca_cert \ - --pidfile --detach + % ovsdb-server --remote=punix:/usr/local/var/run/openvswitch/db.sock \ + --remote=db:Open_vSwitch,manager_options \ + --private-key=db:SSL,private_key \ + --certificate=db:SSL,certificate \ + --bootstrap-ca-cert=db:SSL,ca_cert \ + --pidfile --detach (If you built Open vSwitch without SSL support, then omit --private-key, --certificate, and --bootstrap-ca-cert.) @@ -288,8 +282,7 @@ ovsdb-tool (but running it at any time is harmless): Then start the main Open vSwitch daemon, telling it to connect to the same Unix domain socket: - % ovs-vswitchd unix:/usr/local/var/run/openvswitch/db.sock \ - --pidfile --detach + % ovs-vswitchd --pidfile --detach Now you may use ovs-vsctl to set up bridges and other Open vSwitch features. For example, to create a bridge named br0 and add ports