28 Jul, 2012

1 commit

  • This reverts commit 5b3e7e6cb5771bedda51cdb6f715d1da8cd9e644.

    The problem that the original commit was attempting to fix can
    never happen in practice because validation is done one a per-flow
    basis rather than a per-packet basis. Adding additional checks at
    runtime is unnecessary and inconsistent with the rest of the code.

    CC: Dan Carpenter
    Signed-off-by: Jesse Gross
    Signed-off-by: David S. Miller

    Jesse Gross
     

23 Jul, 2012

1 commit


21 Jul, 2012

3 commits

  • Jesse Gross says:

    ====================
    A few bug fixes and small enhancements for net-next/3.6.
    ...
    Ansis Atteka (1):
    openvswitch: Do not send notification if ovs_vport_set_options() failed

    Ben Pfaff (1):
    openvswitch: Check gso_type for correct sk_buff in queue_gso_packets().

    Jesse Gross (2):
    openvswitch: Enable retrieval of TCP flags from IPv6 traffic.
    openvswitch: Reset upper layer protocol info on internal devices.

    Leo Alterman (1):
    openvswitch: Fix typo in documentation.

    Pravin B Shelar (1):
    openvswitch: Check currect return value from skb_gso_segment()

    Raju Subramanian (1):
    openvswitch: Replace Nicira Networks.
    ====================

    Signed-off-by: David S. Miller

    David S. Miller
     
  • At the point where it was used, skb_shinfo(skb)->gso_type referred to a
    post-GSO sk_buff. Thus, it would always be 0. We want to know the pre-GSO
    gso_type, so we need to obtain it before segmenting.

    Before this change, the kernel would pass inconsistent data to userspace:
    packets for UDP fragments with nonzero offset would be passed along with
    flow keys that indicate a zero offset (that is, the flow key for "later"
    fragments claimed to be "first" fragments). This inconsistency tended
    to confuse Open vSwitch userspace, causing it to log messages about
    "failed to flow_del" the flows with "later" fragments.

    Signed-off-by: Ben Pfaff
    Signed-off-by: Jesse Gross

    Ben Pfaff
     
  • Fix return check typo.

    Signed-off-by: Pravin B Shelar
    Signed-off-by: Jesse Gross

    Pravin B Shelar
     

26 May, 2012

1 commit

  • It's possible that packets that are sent on internal devices (from
    the OVS perspective) have already traversed the local IP stack.
    After they go through the internal device, they will again travel
    through the IP stack which may get confused by the presence of
    existing information in the skb. The problem can be observed
    when switching between namespaces. This clears out that information
    to avoid problems but deliberately leaves other metadata alone.
    This is to provide maximum flexibility in chaining together OVS
    and other Linux components.

    Signed-off-by: Jesse Gross

    Jesse Gross
     

17 May, 2012

1 commit


16 May, 2012

1 commit


14 May, 2012

1 commit


08 May, 2012

1 commit


04 May, 2012

2 commits


16 Apr, 2012

1 commit


11 Apr, 2012

1 commit


10 Apr, 2012

1 commit


03 Apr, 2012

2 commits


02 Apr, 2012

1 commit


29 Mar, 2012

1 commit


10 Mar, 2012

1 commit


08 Mar, 2012

1 commit

  • When modifying IP addresses or ports on a UDP packet we don't
    correctly follow the rules for unchecksummed packets. This meant
    that packets without a checksum can be given a incorrect new checksum
    and packets with a checksum can become marked as being unchecksummed.
    This fixes it to handle those requirements.

    Signed-off-by: Jesse Gross

    Jesse Gross
     

07 Mar, 2012

1 commit


16 Feb, 2012

1 commit


18 Jan, 2012

1 commit

  • The logic to split up the list of datapaths into multiple Netlink messages
    was simply wrong, causing the list to be terminated after the first part.
    Only about the first 50 datapaths would be dumped. This fixes the
    problem.

    Reported-by: Paul Ingram
    Signed-off-by: Ben Pfaff
    Signed-off-by: Jesse Gross
    Signed-off-by: David S. Miller

    Ben Pfaff
     

17 Jan, 2012

2 commits


07 Dec, 2011

1 commit


04 Dec, 2011

1 commit

  • Open vSwitch is a multilayer Ethernet switch targeted at virtualized
    environments. In addition to supporting a variety of features
    expected in a traditional hardware switch, it enables fine-grained
    programmatic extension and flow-based control of the network.
    This control is useful in a wide variety of applications but is
    particularly important in multi-server virtualization deployments,
    which are often characterized by highly dynamic endpoints and the need
    to maintain logical abstractions for multiple tenants.

    The Open vSwitch datapath provides an in-kernel fast path for packet
    forwarding. It is complemented by a userspace daemon, ovs-vswitchd,
    which is able to accept configuration from a variety of sources and
    translate it into packet processing rules.

    See http://openvswitch.org for more information and userspace
    utilities.

    Signed-off-by: Jesse Gross

    Jesse Gross