15 Sep, 2012

1 commit

  • Conflicts:
    net/netfilter/nfnetlink_log.c
    net/netfilter/xt_LOG.c

    Rather easy conflict resolution, the 'net' tree had bug fixes to make
    sure we checked if a socket is a time-wait one or not and elide the
    logging code if so.

    Whereas on the 'net-next' side we are calculating the UID and GID from
    the creds using different interfaces due to the user namespace changes
    from Eric Biederman.

    Signed-off-by: David S. Miller

    David S. Miller
     

11 Sep, 2012

1 commit

  • It is a frequent mistake to confuse the netlink port identifier with a
    process identifier. Try to reduce this confusion by renaming fields
    that hold port identifiers portid instead of pid.

    I have carefully avoided changing the structures exported to
    userspace to avoid changing the userspace API.

    I have successfully built an allyesconfig kernel with this change.

    Signed-off-by: "Eric W. Biederman"
    Acked-by: Stephen Hemminger
    Signed-off-by: David S. Miller

    Eric W. Biederman
     

04 Sep, 2012

1 commit


23 Aug, 2012

1 commit

  • Following patch adds support for network namespace to openvswitch.
    Since it must release devices when namespaces are destroyed, a
    side effect of this patch is that the module no longer keeps a
    refcount but instead cleans up any state when it is unloaded.

    Signed-off-by: Pravin B Shelar
    Signed-off-by: Jesse Gross

    Pravin B Shelar
     

07 Aug, 2012

1 commit

  • When installing a flow with an action to set a particular field we
    need to validate that the packets that are part of the flow actually
    contain that header. With IP we use zeroed addresses and with TCP/UDP
    the check is for zeroed ports. This check is overly broad and can catch
    packets like DHCP requests that have a zero source address in a
    legitimate header. This changes the check to look for a zeroed protocol
    number for IP or for both ports be zero for TCP/UDP before considering
    the header to not exist.

    Reported-by: Ethan Jackson
    Signed-off-by: Jesse Gross

    Jesse Gross
     

21 Jul, 2012

3 commits

  • Jesse Gross says:

    ====================
    A few bug fixes and small enhancements for net-next/3.6.
    ...
    Ansis Atteka (1):
    openvswitch: Do not send notification if ovs_vport_set_options() failed

    Ben Pfaff (1):
    openvswitch: Check gso_type for correct sk_buff in queue_gso_packets().

    Jesse Gross (2):
    openvswitch: Enable retrieval of TCP flags from IPv6 traffic.
    openvswitch: Reset upper layer protocol info on internal devices.

    Leo Alterman (1):
    openvswitch: Fix typo in documentation.

    Pravin B Shelar (1):
    openvswitch: Check currect return value from skb_gso_segment()

    Raju Subramanian (1):
    openvswitch: Replace Nicira Networks.
    ====================

    Signed-off-by: David S. Miller

    David S. Miller
     
  • At the point where it was used, skb_shinfo(skb)->gso_type referred to a
    post-GSO sk_buff. Thus, it would always be 0. We want to know the pre-GSO
    gso_type, so we need to obtain it before segmenting.

    Before this change, the kernel would pass inconsistent data to userspace:
    packets for UDP fragments with nonzero offset would be passed along with
    flow keys that indicate a zero offset (that is, the flow key for "later"
    fragments claimed to be "first" fragments). This inconsistency tended
    to confuse Open vSwitch userspace, causing it to log messages about
    "failed to flow_del" the flows with "later" fragments.

    Signed-off-by: Ben Pfaff
    Signed-off-by: Jesse Gross

    Ben Pfaff
     
  • Fix return check typo.

    Signed-off-by: Pravin B Shelar
    Signed-off-by: Jesse Gross

    Pravin B Shelar
     

17 May, 2012

1 commit


14 May, 2012

1 commit


08 May, 2012

1 commit


04 May, 2012

2 commits


11 Apr, 2012

1 commit


10 Apr, 2012

1 commit


02 Apr, 2012

1 commit


29 Mar, 2012

1 commit


07 Mar, 2012

1 commit


18 Jan, 2012

1 commit

  • The logic to split up the list of datapaths into multiple Netlink messages
    was simply wrong, causing the list to be terminated after the first part.
    Only about the first 50 datapaths would be dumped. This fixes the
    problem.

    Reported-by: Paul Ingram
    Signed-off-by: Ben Pfaff
    Signed-off-by: Jesse Gross
    Signed-off-by: David S. Miller

    Ben Pfaff
     

17 Jan, 2012

1 commit


04 Dec, 2011

1 commit

  • Open vSwitch is a multilayer Ethernet switch targeted at virtualized
    environments. In addition to supporting a variety of features
    expected in a traditional hardware switch, it enables fine-grained
    programmatic extension and flow-based control of the network.
    This control is useful in a wide variety of applications but is
    particularly important in multi-server virtualization deployments,
    which are often characterized by highly dynamic endpoints and the need
    to maintain logical abstractions for multiple tenants.

    The Open vSwitch datapath provides an in-kernel fast path for packet
    forwarding. It is complemented by a userspace daemon, ovs-vswitchd,
    which is able to accept configuration from a variety of sources and
    translate it into packet processing rules.

    See http://openvswitch.org for more information and userspace
    utilities.

    Signed-off-by: Jesse Gross

    Jesse Gross