15 Sep, 2012
1 commit
-
Conflicts:
net/netfilter/nfnetlink_log.c
net/netfilter/xt_LOG.cRather easy conflict resolution, the 'net' tree had bug fixes to make
sure we checked if a socket is a time-wait one or not and elide the
logging code if so.Whereas on the 'net-next' side we are calculating the UID and GID from
the creds using different interfaces due to the user namespace changes
from Eric Biederman.Signed-off-by: David S. Miller
11 Sep, 2012
1 commit
-
It is a frequent mistake to confuse the netlink port identifier with a
process identifier. Try to reduce this confusion by renaming fields
that hold port identifiers portid instead of pid.I have carefully avoided changing the structures exported to
userspace to avoid changing the userspace API.I have successfully built an allyesconfig kernel with this change.
Signed-off-by: "Eric W. Biederman"
Acked-by: Stephen Hemminger
Signed-off-by: David S. Miller
04 Sep, 2012
1 commit
-
Use hash table to store ports of datapath. Allow 64K ports per switch.
Signed-off-by: Pravin B Shelar
Signed-off-by: Jesse Gross
23 Aug, 2012
1 commit
-
Following patch adds support for network namespace to openvswitch.
Since it must release devices when namespaces are destroyed, a
side effect of this patch is that the module no longer keeps a
refcount but instead cleans up any state when it is unloaded.Signed-off-by: Pravin B Shelar
Signed-off-by: Jesse Gross
07 Aug, 2012
1 commit
-
When installing a flow with an action to set a particular field we
need to validate that the packets that are part of the flow actually
contain that header. With IP we use zeroed addresses and with TCP/UDP
the check is for zeroed ports. This check is overly broad and can catch
packets like DHCP requests that have a zero source address in a
legitimate header. This changes the check to look for a zeroed protocol
number for IP or for both ports be zero for TCP/UDP before considering
the header to not exist.Reported-by: Ethan Jackson
Signed-off-by: Jesse Gross
21 Jul, 2012
3 commits
-
Jesse Gross says:
====================
A few bug fixes and small enhancements for net-next/3.6.
...
Ansis Atteka (1):
openvswitch: Do not send notification if ovs_vport_set_options() failedBen Pfaff (1):
openvswitch: Check gso_type for correct sk_buff in queue_gso_packets().Jesse Gross (2):
openvswitch: Enable retrieval of TCP flags from IPv6 traffic.
openvswitch: Reset upper layer protocol info on internal devices.Leo Alterman (1):
openvswitch: Fix typo in documentation.Pravin B Shelar (1):
openvswitch: Check currect return value from skb_gso_segment()Raju Subramanian (1):
openvswitch: Replace Nicira Networks.
====================Signed-off-by: David S. Miller
-
At the point where it was used, skb_shinfo(skb)->gso_type referred to a
post-GSO sk_buff. Thus, it would always be 0. We want to know the pre-GSO
gso_type, so we need to obtain it before segmenting.Before this change, the kernel would pass inconsistent data to userspace:
packets for UDP fragments with nonzero offset would be passed along with
flow keys that indicate a zero offset (that is, the flow key for "later"
fragments claimed to be "first" fragments). This inconsistency tended
to confuse Open vSwitch userspace, causing it to log messages about
"failed to flow_del" the flows with "later" fragments.Signed-off-by: Ben Pfaff
Signed-off-by: Jesse Gross -
Fix return check typo.
Signed-off-by: Pravin B Shelar
Signed-off-by: Jesse Gross
17 May, 2012
1 commit
14 May, 2012
1 commit
-
"skb" is non-NULL here, for example we dereference it in skb_clone().
The intent was to test "nskb" which was just set.Signed-off-by: Dan Carpenter
Acked-by: Jesse Gross
Signed-off-by: David S. Miller
08 May, 2012
1 commit
-
When the kernel validates set TCP/UDP port actions, it looks at
the ports in the existing flow to make sure that the L4 header exists.
However, these actions always use the IPv4 version of the struct.
Following patch fixes this by checking for flow ip protocol first.Signed-off-by: Pravin B Shelar
Signed-off-by: Jesse Gross
04 May, 2012
2 commits
-
Replaced all instances of Nicira Networks(, Inc) to Nicira, Inc.
Signed-off-by: Raju Subramanian
Signed-off-by: Ben Pfaff
Signed-off-by: Jesse Gross -
This patch fixes a possible lock-up bug where rtnl_lock might not
get released.Signed-off-by: Ansis Atteka
Signed-off-by: Jesse Gross
11 Apr, 2012
1 commit
10 Apr, 2012
1 commit
-
There is no need to send a notification if ovs_vport_set_options() failed
and ovs_vport_cmd_set() did not change anything.Signed-off-by: Ansis Atteka
Signed-off-by: Jesse Gross
02 Apr, 2012
1 commit
-
These macros contain a hidden goto, and are thus extremely error
prone and make code hard to audit.Signed-off-by: David S. Miller
29 Mar, 2012
1 commit
-
Remove all #inclusions of asm/system.h preparatory to splitting and killing
it. Performed with the following command:perl -p -i -e 's!^#\s*include\s*.*\n!!' `grep -Irl '^#\s*include\s*' *`
Signed-off-by: David Howells
07 Mar, 2012
1 commit
-
When OVS_VPORT_ATTR_NAME is specified and dp_ifindex is nonzero, the
logical behavior would be for the vport name lookup scope to be limited
to the specified datapath, but in fact the dp_ifindex value was ignored.
This commit causes the search scope to be honored.Signed-off-by: Ben Pfaff
Signed-off-by: Jesse Gross
18 Jan, 2012
1 commit
-
The logic to split up the list of datapaths into multiple Netlink messages
was simply wrong, causing the list to be terminated after the first part.
Only about the first 50 datapaths would be dumped. This fixes the
problem.Reported-by: Paul Ingram
Signed-off-by: Ben Pfaff
Signed-off-by: Jesse Gross
Signed-off-by: David S. Miller
17 Jan, 2012
1 commit
-
remove version.h includes in net/openswitch/ as reported by make versioncheck.
Signed-off-by: Devendra Naga
Signed-off-by: David S. Miller
04 Dec, 2011
1 commit
-
Open vSwitch is a multilayer Ethernet switch targeted at virtualized
environments. In addition to supporting a variety of features
expected in a traditional hardware switch, it enables fine-grained
programmatic extension and flow-based control of the network.
This control is useful in a wide variety of applications but is
particularly important in multi-server virtualization deployments,
which are often characterized by highly dynamic endpoints and the need
to maintain logical abstractions for multiple tenants.The Open vSwitch datapath provides an in-kernel fast path for packet
forwarding. It is complemented by a userspace daemon, ovs-vswitchd,
which is able to accept configuration from a variety of sources and
translate it into packet processing rules.See http://openvswitch.org for more information and userspace
utilities.Signed-off-by: Jesse Gross