28 Jul, 2012
1 commit
-
This reverts commit 5b3e7e6cb5771bedda51cdb6f715d1da8cd9e644.
The problem that the original commit was attempting to fix can
never happen in practice because validation is done one a per-flow
basis rather than a per-packet basis. Adding additional checks at
runtime is unnecessary and inconsistent with the rest of the code.CC: Dan Carpenter
Signed-off-by: Jesse Gross
Signed-off-by: David S. Miller
23 Jul, 2012
1 commit
-
If there is no OVS_SAMPLE_ATTR_ACTIONS set then "acts_list" is NULL and
it leads to a NULL dereference when we call nla_len(acts_list). This
is a static checker fix, not something I have seen in testing.Signed-off-by: Dan Carpenter
Signed-off-by: David S. Miller
21 Jul, 2012
3 commits
-
Jesse Gross says:
====================
A few bug fixes and small enhancements for net-next/3.6.
...
Ansis Atteka (1):
openvswitch: Do not send notification if ovs_vport_set_options() failedBen Pfaff (1):
openvswitch: Check gso_type for correct sk_buff in queue_gso_packets().Jesse Gross (2):
openvswitch: Enable retrieval of TCP flags from IPv6 traffic.
openvswitch: Reset upper layer protocol info on internal devices.Leo Alterman (1):
openvswitch: Fix typo in documentation.Pravin B Shelar (1):
openvswitch: Check currect return value from skb_gso_segment()Raju Subramanian (1):
openvswitch: Replace Nicira Networks.
====================Signed-off-by: David S. Miller
-
At the point where it was used, skb_shinfo(skb)->gso_type referred to a
post-GSO sk_buff. Thus, it would always be 0. We want to know the pre-GSO
gso_type, so we need to obtain it before segmenting.Before this change, the kernel would pass inconsistent data to userspace:
packets for UDP fragments with nonzero offset would be passed along with
flow keys that indicate a zero offset (that is, the flow key for "later"
fragments claimed to be "first" fragments). This inconsistency tended
to confuse Open vSwitch userspace, causing it to log messages about
"failed to flow_del" the flows with "later" fragments.Signed-off-by: Ben Pfaff
Signed-off-by: Jesse Gross -
Fix return check typo.
Signed-off-by: Pravin B Shelar
Signed-off-by: Jesse Gross
26 May, 2012
1 commit
-
It's possible that packets that are sent on internal devices (from
the OVS perspective) have already traversed the local IP stack.
After they go through the internal device, they will again travel
through the IP stack which may get confused by the presence of
existing information in the skb. The problem can be observed
when switching between namespaces. This clears out that information
to avoid problems but deliberately leaves other metadata alone.
This is to provide maximum flexibility in chaining together OVS
and other Linux components.Signed-off-by: Jesse Gross
17 May, 2012
1 commit
16 May, 2012
1 commit
-
Standardize the net core ratelimited logging functions.
Coalesce formats, align arguments.
Change a printk then vprintk sequence to use printf extension %pV.Signed-off-by: Joe Perches
Signed-off-by: David S. Miller
14 May, 2012
1 commit
-
"skb" is non-NULL here, for example we dereference it in skb_clone().
The intent was to test "nskb" which was just set.Signed-off-by: Dan Carpenter
Acked-by: Jesse Gross
Signed-off-by: David S. Miller
08 May, 2012
1 commit
-
When the kernel validates set TCP/UDP port actions, it looks at
the ports in the existing flow to make sure that the L4 header exists.
However, these actions always use the IPv4 version of the struct.
Following patch fixes this by checking for flow ip protocol first.Signed-off-by: Pravin B Shelar
Signed-off-by: Jesse Gross
04 May, 2012
2 commits
-
Replaced all instances of Nicira Networks(, Inc) to Nicira, Inc.
Signed-off-by: Raju Subramanian
Signed-off-by: Ben Pfaff
Signed-off-by: Jesse Gross -
This patch fixes a possible lock-up bug where rtnl_lock might not
get released.Signed-off-by: Ansis Atteka
Signed-off-by: Jesse Gross
16 Apr, 2012
1 commit
-
Use of "unsigned int" is preferred to bare "unsigned" in net tree.
Signed-off-by: Eric Dumazet
Signed-off-by: David S. Miller
11 Apr, 2012
1 commit
10 Apr, 2012
1 commit
-
There is no need to send a notification if ovs_vport_set_options() failed
and ovs_vport_cmd_set() did not change anything.Signed-off-by: Ansis Atteka
Signed-off-by: Jesse Gross
03 Apr, 2012
2 commits
-
We currently check that a packet is IPv4 and TCP before fetching the
TCP flags. This enables fetching from IPv6 packets as well.Reported-by: Michael Mao
Signed-off-by: Jesse Gross -
When collecting TCP flags we check that the IP header indicates that
a TCP header is present but not that the packet is actually long
enough to contain the header. This adds a check to prevent reading
off the end of the packet.In practice, this is only likely to result in reading of bad data and
not a crash due to the presence of struct skb_shared_info at the end
of the packet.Signed-off-by: Jesse Gross
02 Apr, 2012
1 commit
-
These macros contain a hidden goto, and are thus extremely error
prone and make code hard to audit.Signed-off-by: David S. Miller
29 Mar, 2012
1 commit
-
Remove all #inclusions of asm/system.h preparatory to splitting and killing
it. Performed with the following command:perl -p -i -e 's!^#\s*include\s*.*\n!!' `grep -Irl '^#\s*include\s*' *`
Signed-off-by: David Howells
10 Mar, 2012
1 commit
08 Mar, 2012
1 commit
-
When modifying IP addresses or ports on a UDP packet we don't
correctly follow the rules for unchecksummed packets. This meant
that packets without a checksum can be given a incorrect new checksum
and packets with a checksum can become marked as being unchecksummed.
This fixes it to handle those requirements.Signed-off-by: Jesse Gross
07 Mar, 2012
1 commit
-
When OVS_VPORT_ATTR_NAME is specified and dp_ifindex is nonzero, the
logical behavior would be for the vport name lookup scope to be limited
to the specified datapath, but in fact the dp_ifindex value was ignored.
This commit causes the search scope to be honored.Signed-off-by: Ben Pfaff
Signed-off-by: Jesse Gross
16 Feb, 2012
1 commit
-
Use eth_hw_addr_random() instead of calling random_ether_addr()
to set addr_assign_type correctly to NET_ADDR_RANDOM.Reset the state to NET_ADDR_PERM as soon as the MAC get
changed via .ndo_set_mac_address.v2: adapt to renamed eth_hw_addr_random()
Signed-off-by: Danny Kukawka
Signed-off-by: David S. Miller
18 Jan, 2012
1 commit
-
The logic to split up the list of datapaths into multiple Netlink messages
was simply wrong, causing the list to be terminated after the first part.
Only about the first 50 datapaths would be dumped. This fixes the
problem.Reported-by: Paul Ingram
Signed-off-by: Ben Pfaff
Signed-off-by: Jesse Gross
Signed-off-by: David S. Miller
17 Jan, 2012
2 commits
-
For net part, remove duplicate included header.
Signed-off-by: Shan Wei
Signed-off-by: David S. Miller -
remove version.h includes in net/openswitch/ as reported by make versioncheck.
Signed-off-by: Devendra Naga
Signed-off-by: David S. Miller
07 Dec, 2011
1 commit
-
We're unlikely to hit this leak, but the static checkers complain if we
don't take care of it.Signed-off-by: Dan Carpenter
Acked-by: Jesse Gross
Signed-off-by: David S. Miller
04 Dec, 2011
1 commit
-
Open vSwitch is a multilayer Ethernet switch targeted at virtualized
environments. In addition to supporting a variety of features
expected in a traditional hardware switch, it enables fine-grained
programmatic extension and flow-based control of the network.
This control is useful in a wide variety of applications but is
particularly important in multi-server virtualization deployments,
which are often characterized by highly dynamic endpoints and the need
to maintain logical abstractions for multiple tenants.The Open vSwitch datapath provides an in-kernel fast path for packet
forwarding. It is complemented by a userspace daemon, ovs-vswitchd,
which is able to accept configuration from a variety of sources and
translate it into packet processing rules.See http://openvswitch.org for more information and userspace
utilities.Signed-off-by: Jesse Gross