19 Sep, 2012

1 commit


15 Sep, 2012

1 commit

  • Conflicts:
    net/netfilter/nfnetlink_log.c
    net/netfilter/xt_LOG.c

    Rather easy conflict resolution, the 'net' tree had bug fixes to make
    sure we checked if a socket is a time-wait one or not and elide the
    logging code if so.

    Whereas on the 'net-next' side we are calculating the UID and GID from
    the creds using different interfaces due to the user namespace changes
    from Eric Biederman.

    Signed-off-by: David S. Miller

    David S. Miller
     

11 Sep, 2012

1 commit

  • It is a frequent mistake to confuse the netlink port identifier with a
    process identifier. Try to reduce this confusion by renaming fields
    that hold port identifiers portid instead of pid.

    I have carefully avoided changing the structures exported to
    userspace to avoid changing the userspace API.

    I have successfully built an allyesconfig kernel with this change.

    Signed-off-by: "Eric W. Biederman"
    Acked-by: Stephen Hemminger
    Signed-off-by: David S. Miller

    Eric W. Biederman
     

05 Sep, 2012

1 commit


04 Sep, 2012

2 commits


03 Sep, 2012

1 commit


01 Sep, 2012

1 commit

  • The callback function of call_rcu() just calls a kfree(), so we
    can use kfree_rcu() instead of call_rcu() + callback function.

    spatch with a semantic match is used to found this problem.
    (http://coccinelle.lip6.fr/)

    Signed-off-by: Wei Yongjun
    Acked-by: Jesse Gross
    Signed-off-by: David S. Miller

    Wei Yongjun
     

23 Aug, 2012

1 commit

  • Following patch adds support for network namespace to openvswitch.
    Since it must release devices when namespaces are destroyed, a
    side effect of this patch is that the module no longer keeps a
    refcount but instead cleans up any state when it is unloaded.

    Signed-off-by: Pravin B Shelar
    Signed-off-by: Jesse Gross

    Pravin B Shelar
     

07 Aug, 2012

1 commit

  • When installing a flow with an action to set a particular field we
    need to validate that the packets that are part of the flow actually
    contain that header. With IP we use zeroed addresses and with TCP/UDP
    the check is for zeroed ports. This check is overly broad and can catch
    packets like DHCP requests that have a zero source address in a
    legitimate header. This changes the check to look for a zeroed protocol
    number for IP or for both ports be zero for TCP/UDP before considering
    the header to not exist.

    Reported-by: Ethan Jackson
    Signed-off-by: Jesse Gross

    Jesse Gross
     

28 Jul, 2012

1 commit

  • This reverts commit 5b3e7e6cb5771bedda51cdb6f715d1da8cd9e644.

    The problem that the original commit was attempting to fix can
    never happen in practice because validation is done one a per-flow
    basis rather than a per-packet basis. Adding additional checks at
    runtime is unnecessary and inconsistent with the rest of the code.

    CC: Dan Carpenter
    Signed-off-by: Jesse Gross
    Signed-off-by: David S. Miller

    Jesse Gross
     

23 Jul, 2012

1 commit


21 Jul, 2012

3 commits

  • Jesse Gross says:

    ====================
    A few bug fixes and small enhancements for net-next/3.6.
    ...
    Ansis Atteka (1):
    openvswitch: Do not send notification if ovs_vport_set_options() failed

    Ben Pfaff (1):
    openvswitch: Check gso_type for correct sk_buff in queue_gso_packets().

    Jesse Gross (2):
    openvswitch: Enable retrieval of TCP flags from IPv6 traffic.
    openvswitch: Reset upper layer protocol info on internal devices.

    Leo Alterman (1):
    openvswitch: Fix typo in documentation.

    Pravin B Shelar (1):
    openvswitch: Check currect return value from skb_gso_segment()

    Raju Subramanian (1):
    openvswitch: Replace Nicira Networks.
    ====================

    Signed-off-by: David S. Miller

    David S. Miller
     
  • At the point where it was used, skb_shinfo(skb)->gso_type referred to a
    post-GSO sk_buff. Thus, it would always be 0. We want to know the pre-GSO
    gso_type, so we need to obtain it before segmenting.

    Before this change, the kernel would pass inconsistent data to userspace:
    packets for UDP fragments with nonzero offset would be passed along with
    flow keys that indicate a zero offset (that is, the flow key for "later"
    fragments claimed to be "first" fragments). This inconsistency tended
    to confuse Open vSwitch userspace, causing it to log messages about
    "failed to flow_del" the flows with "later" fragments.

    Signed-off-by: Ben Pfaff
    Signed-off-by: Jesse Gross

    Ben Pfaff
     
  • Fix return check typo.

    Signed-off-by: Pravin B Shelar
    Signed-off-by: Jesse Gross

    Pravin B Shelar
     

26 May, 2012

1 commit

  • It's possible that packets that are sent on internal devices (from
    the OVS perspective) have already traversed the local IP stack.
    After they go through the internal device, they will again travel
    through the IP stack which may get confused by the presence of
    existing information in the skb. The problem can be observed
    when switching between namespaces. This clears out that information
    to avoid problems but deliberately leaves other metadata alone.
    This is to provide maximum flexibility in chaining together OVS
    and other Linux components.

    Signed-off-by: Jesse Gross

    Jesse Gross
     

17 May, 2012

1 commit


16 May, 2012

1 commit


14 May, 2012

1 commit


08 May, 2012

1 commit


04 May, 2012

2 commits


16 Apr, 2012

1 commit


11 Apr, 2012

1 commit


10 Apr, 2012

1 commit


03 Apr, 2012

2 commits


02 Apr, 2012

1 commit


29 Mar, 2012

1 commit


10 Mar, 2012

1 commit


08 Mar, 2012

1 commit

  • When modifying IP addresses or ports on a UDP packet we don't
    correctly follow the rules for unchecksummed packets. This meant
    that packets without a checksum can be given a incorrect new checksum
    and packets with a checksum can become marked as being unchecksummed.
    This fixes it to handle those requirements.

    Signed-off-by: Jesse Gross

    Jesse Gross
     

07 Mar, 2012

1 commit


16 Feb, 2012

1 commit


18 Jan, 2012

1 commit

  • The logic to split up the list of datapaths into multiple Netlink messages
    was simply wrong, causing the list to be terminated after the first part.
    Only about the first 50 datapaths would be dumped. This fixes the
    problem.

    Reported-by: Paul Ingram
    Signed-off-by: Ben Pfaff
    Signed-off-by: Jesse Gross
    Signed-off-by: David S. Miller

    Ben Pfaff
     

17 Jan, 2012

2 commits


07 Dec, 2011

1 commit


04 Dec, 2011

1 commit

  • Open vSwitch is a multilayer Ethernet switch targeted at virtualized
    environments. In addition to supporting a variety of features
    expected in a traditional hardware switch, it enables fine-grained
    programmatic extension and flow-based control of the network.
    This control is useful in a wide variety of applications but is
    particularly important in multi-server virtualization deployments,
    which are often characterized by highly dynamic endpoints and the need
    to maintain logical abstractions for multiple tenants.

    The Open vSwitch datapath provides an in-kernel fast path for packet
    forwarding. It is complemented by a userspace daemon, ovs-vswitchd,
    which is able to accept configuration from a variety of sources and
    translate it into packet processing rules.

    See http://openvswitch.org for more information and userspace
    utilities.

    Signed-off-by: Jesse Gross

    Jesse Gross