lp:~xnox/ubuntu-z-systems/+git/ovs

Get this repository:
git clone https://git.launchpad.net/~xnox/ubuntu-z-systems/+git/ovs

Import details

Import Status: Reviewed

This repository is an import of the Git repository at https://github.com/openvswitch/ovs.git.

The next import is scheduled to run .

Last successful import was .

Import started on juju-1e3bde-prod-lp-code-import-13 and finished taking 30 seconds — see the log
Import started on juju-1e3bde-prod-lp-code-import-12 and finished taking 40 seconds — see the log
Import started on juju-1e3bde-prod-lp-code-import-17 and finished taking 40 seconds — see the log
Import started on juju-1e3bde-prod-lp-code-import-17 and finished taking 40 seconds — see the log
Import started on juju-1e3bde-prod-lp-code-import-16 and finished taking 1 minute — see the log
Import started on juju-1e3bde-prod-lp-code-import-15 and finished taking 2 minutes — see the log
Import started on juju-1e3bde-prod-lp-code-import-13 and finished taking 25 seconds — see the log
Import started on juju-1e3bde-prod-lp-code-import-13 and finished taking 40 seconds — see the log
Import started on juju-1e3bde-prod-lp-code-import-17 and finished taking 30 seconds — see the log
Import started on juju-1e3bde-prod-lp-code-import-16 and finished taking 30 seconds — see the log

Branches

Name Last Modified Last Commit
branch-2.16 2022-10-03 16:07:55 UTC
dpdk: Use DPDK 20.11.6 release.

Author: Michael Phelan
Author Date: 2022-09-29 17:03:10 UTC

dpdk: Use DPDK 20.11.6 release.

Update OVS CLI and relevant documentation to use DPDK 20.11.6.

A bug was introduced in DPDK 20.11.5 by the commit
33f2e3756186 ("vhost: fix unsafe vring addresses modifications").
This bug can cause a deadlock when vIOMMU is enabled
and NUMA reallocation of the virtqueues happen.
A fix [1] has been posted and pushed to the DPDK 20.11 branch.
If a user wishes to avoid the issue then it is recommended to use
DPDK 20.11.4 until the release of DPDK 20.11.7.
It should be noted that DPDK 20.11.4 does not benefit from
the numerous bug fixes addressed since its release.
If a user wishes to benefit from these fixes it is recommended
to use DPDK 20.11.6.

[1] https://patches.dpdk.org/project/dpdk/patch/20220725203206.427083-2-david.marchand@redhat.com/
Signed-off-by: Michael Phelan <michael.phelan@intel.com>
Acked-by: Kevin Traynor <ktraynor@redhat.com>
Signed-off-by: Ian Stokes <ian.stokes@intel.com>

branch-2.15 2022-10-03 16:06:05 UTC
dpdk: Use DPDK 20.11.6 release.

Author: Michael Phelan
Author Date: 2022-09-29 17:00:44 UTC

dpdk: Use DPDK 20.11.6 release.

Update OVS CLI and relevant documentation to use DPDK 20.11.6.

A bug was introduced in DPDK 20.11.5 by the commit
33f2e3756186 ("vhost: fix unsafe vring addresses modifications").
This bug can cause a deadlock when vIOMMU is enabled and
NUMA reallocation of the virtqueues happen.
A fix [1] has been posted and pushed to the DPDK 20.11 branch.
If a user wishes to avoid the issue then it is recommended to use
DPDK 20.11.4 until the release of DPDK 20.11.7.
It should be noted that DPDK 20.11.4 does not benefit from
the numerous bug fixes addressed since its release.
If a user wishes to benefit from these fixes it is recommended
to use DPDK 20.11.6.

[1] https://patches.dpdk.org/project/dpdk/patch/20220725203206.427083-2-david.marchand@redhat.com/

Signed-off-by: Michael Phelan <michael.phelan@intel.com>
Acked-by: Kevin Traynor <ktraynor@redhat.com>
Signed-off-by: Ian Stokes <ian.stokes@intel.com>

branch-2.14 2022-10-03 16:01:02 UTC
dpdk: Use DPDK 19.11.13 release.

Author: Michael Phelan
Author Date: 2022-09-22 14:52:10 UTC

dpdk: Use DPDK 19.11.13 release.

Update OVS CLI and relevant documentation to use DPDK 19.11.13.

DPDK 19.11.13 contains fixes for the CVEs listed below:
CVE-2022-28199 [1]
CVE-2022-2132 [2]

A bug was introduced in DPDK 19.11.12 by the commit

1e68fe334ff0 ("vhost: fix unsafe vring addresses modifications").

This bug can cause a deadlock when vIOMMU is enabled and
NUMA reallocation of the virtqueues happen.
A fix [3] has been posted and is due to be included in
the DPDK 19.11.14 release.
If a user wishes to avoid the issue then it is recommended to use
DPDK 19.11.11 until the release of DPDK 19.11.14.

It should be noted that DPDK 19.11.11 does not benefit from the
numerous bug and CVE fixes addressed since its release.
If a user wishes to benefit from these fixes it is recommended
to use DPDK 19.11.13.

[1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28199
[2] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2132
[3] https://patches.dpdk.org/project/dpdk/patch/20220725203206.427083-2-david.marchand@redhat.com/

Signed-off-by: Michael Phelan <michael.phelan@intel.com>
Acked-by: Kevin Traynor <ktraynor@redhat.com>
Signed-off-by: Ian Stokes <ian.stokes@intel.com>

branch-2.13 2022-10-03 15:59:28 UTC
dpdk: Use DPDK 19.11.13 release.

Author: Michael Phelan
Author Date: 2022-09-22 14:51:27 UTC

dpdk: Use DPDK 19.11.13 release.

Update OVS CLI and relevant documentation to use DPDK 19.11.13.

DPDK 19.11.13 contains fixes for the CVEs listed below:
CVE-2022-28199 [1]
CVE-2022-2132 [2]

A bug was introduced in DPDK 19.11.12 by the commit 1e68fe334ff0 ("vhost: fix unsafe vring addresses modifications").
This bug can cause a deadlock when vIOMMU is enabled and NUMA reallocation of the virtqueues happen.
A fix [3] has been posted and is due to be included in the DPDK 19.11.14 release.
If a user wishes to avoid the issue then it is recommended to use DPDK 19.11.11 until the release of DPDK 19.11.14.
It should be noted that DPDK 19.11.11 does not benefit from the numerous bug and CVE fixes addressed since its release.
If a user wishes to benefit from these fixes it is recommended to use DPDK 19.11.13.

[1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28199
[2] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2132
[3] https://patches.dpdk.org/project/dpdk/patch/20220725203206.427083-2-david.marchand@redhat.com/

Signed-off-by: Michael Phelan <michael.phelan@intel.com>
Acked-by: Kevin Traynor <ktraynor@redhat.com>
Signed-off-by: Ian Stokes <ian.stokes@intel.com>

master 2022-09-26 23:17:56 UTC
lib: Add support for sets of UUIDs.

Author: Dumitru Ceara
Author Date: 2022-09-16 15:50:25 UTC

lib: Add support for sets of UUIDs.

Part of the uuidset implementation is taken from the OVN codebase where
it was added via commit 0e77b3bcbfe2 ("ovn-northd-ddlog: New
implementation of ovn-northd based on ddlog.").

We now extend that, adding a few helpers and tests.

Co-authored-by: Leonid Ryzhyk <lryzhyk@vmware.com>
Signed-off-by: Leonid Ryzhyk <lryzhyk@vmware.com>
Co-authored-by: Justin Pettit <jpettit@ovn.org>
Signed-off-by: Justin Pettit <jpettit@ovn.org>
Co-authored-by: Ben Pfaff <blp@ovn.org>
Signed-off-by: Ben Pfaff <blp@ovn.org>
Signed-off-by: Dumitru Ceara <dceara@redhat.com>
Reviewed-by: Ales Musil <amusil@redhat.com>
Signed-off-by: Ilya Maximets <i.maximets@ovn.org>

branch-2.17 2022-09-26 22:50:51 UTC
m4: Test avx512 for x86 only.

Author: Cheng Li
Author Date: 2022-09-16 09:56:18 UTC

m4: Test avx512 for x86 only.

'as' command of arm version may don't support option '--64', this
patch is to move the avx512 test into x86 branch to avoid this.

Fixes: 352b6c7116cd ("dpif-lookup: add avx512 gather implementation.")
Tested-by: Harry van Haaren <harry.van.haaren@intel.com>
Signed-off-by: Cheng Li <lic121@chinatelecom.cn>
Signed-off-by: Ilya Maximets <i.maximets@ovn.org>

branch-3.0 2022-09-26 22:50:51 UTC
m4: Test avx512 for x86 only.

Author: Cheng Li
Author Date: 2022-09-16 09:56:18 UTC

m4: Test avx512 for x86 only.

'as' command of arm version may don't support option '--64', this
patch is to move the avx512 test into x86 branch to avoid this.

Fixes: 352b6c7116cd ("dpif-lookup: add avx512 gather implementation.")
Tested-by: Harry van Haaren <harry.van.haaren@intel.com>
Signed-off-by: Cheng Li <lic121@chinatelecom.cn>
Signed-off-by: Ilya Maximets <i.maximets@ovn.org>

dpdk-latest 2022-09-13 15:48:04 UTC
system-dpdk: Update vhost tests to be compatible with DPDK 22.07.

Author: Sunil Pai G
Author Date: 2022-09-02 08:36:59 UTC

system-dpdk: Update vhost tests to be compatible with DPDK 22.07.

The DPDK commit [1] improves the socket layer logs in the vhost library
to ease log filtering and debugging.
Update the system-dpdk vhost tests to reflect this change.

[1] c85c35b1d447 ("vhost: improve socket layer logs")

Signed-off-by: Sunil Pai G <sunil.pai.g@intel.com>
Signed-off-by: Ian Stokes <ian.stokes@intel.com>

branch-2.12 2021-10-21 21:59:38 UTC
Prepare for 2.12.5.

Author: Ilya Maximets
Author Date: 2021-10-21 21:58:08 UTC

Prepare for 2.12.5.

Acked-by: Alin-Gabriel Serdean <aserdean@ovn.org>
Acked-by: Ian Stokes <ian.stokes@intel.com>
Acked-by: Aaron Conole <aconole@redhat.com>
Signed-off-by: Ilya Maximets <i.maximets@ovn.org>

branch-2.7 2021-09-30 06:58:15 UTC
datapath-windows:adjust Offset when processing packet in POP_VLAN action

Author: wilsonpeng
Author Date: 2021-09-30 04:56:26 UTC

datapath-windows:adjust Offset when processing packet in POP_VLAN action

In one typical setup, on the Windows VM running OVS Windows Kernel, a Geneva
packet with 8021.q VLAN tag is received. Then it may do POP_VLAN action
processing in Actions.c, if the packet does not have Ieee8021QNetBufferListInfo
in the oob of the packet, it will be processed by function OvsPopVlanInPktBuf().
In the function it will go on remove VLAN header present in the nbl, but related
layers is never readjusted for the offset value at this moment. As a result, it
will cause function OvsValidateIPChecksum drop the packet.

Reported-at:https://github.com/openvswitch/ovs-issues/issues/225
Signed-off-by: wilsonpeng <pweisong@vmware.com>
Signed-off-by: Alin-Gabriel Serdean <aserdean@ovn.org>

branch-2.8 2021-09-30 06:57:59 UTC
datapath-windows:adjust Offset when processing packet in POP_VLAN action

Author: wilsonpeng
Author Date: 2021-09-30 04:56:26 UTC

datapath-windows:adjust Offset when processing packet in POP_VLAN action

In one typical setup, on the Windows VM running OVS Windows Kernel, a Geneva
packet with 8021.q VLAN tag is received. Then it may do POP_VLAN action
processing in Actions.c, if the packet does not have Ieee8021QNetBufferListInfo
in the oob of the packet, it will be processed by function OvsPopVlanInPktBuf().
In the function it will go on remove VLAN header present in the nbl, but related
layers is never readjusted for the offset value at this moment. As a result, it
will cause function OvsValidateIPChecksum drop the packet.

Reported-at:https://github.com/openvswitch/ovs-issues/issues/225
Signed-off-by: wilsonpeng <pweisong@vmware.com>
Signed-off-by: Alin-Gabriel Serdean <aserdean@ovn.org>

branch-2.9 2021-09-30 06:57:36 UTC
datapath-windows:adjust Offset when processing packet in POP_VLAN action

Author: wilsonpeng
Author Date: 2021-09-30 04:56:26 UTC

datapath-windows:adjust Offset when processing packet in POP_VLAN action

In one typical setup, on the Windows VM running OVS Windows Kernel, a Geneva
packet with 8021.q VLAN tag is received. Then it may do POP_VLAN action
processing in Actions.c, if the packet does not have Ieee8021QNetBufferListInfo
in the oob of the packet, it will be processed by function OvsPopVlanInPktBuf().
In the function it will go on remove VLAN header present in the nbl, but related
layers is never readjusted for the offset value at this moment. As a result, it
will cause function OvsValidateIPChecksum drop the packet.

Reported-at:https://github.com/openvswitch/ovs-issues/issues/225
Signed-off-by: wilsonpeng <pweisong@vmware.com>
Signed-off-by: Alin-Gabriel Serdean <aserdean@ovn.org>

branch-2.10 2021-09-30 06:57:06 UTC
datapath-windows:adjust Offset when processing packet in POP_VLAN action

Author: wilsonpeng
Author Date: 2021-09-30 04:56:26 UTC

datapath-windows:adjust Offset when processing packet in POP_VLAN action

In one typical setup, on the Windows VM running OVS Windows Kernel, a Geneva
packet with 8021.q VLAN tag is received. Then it may do POP_VLAN action
processing in Actions.c, if the packet does not have Ieee8021QNetBufferListInfo
in the oob of the packet, it will be processed by function OvsPopVlanInPktBuf().
In the function it will go on remove VLAN header present in the nbl, but related
layers is never readjusted for the offset value at this moment. As a result, it
will cause function OvsValidateIPChecksum drop the packet.

Reported-at:https://github.com/openvswitch/ovs-issues/issues/225
Signed-off-by: wilsonpeng <pweisong@vmware.com>
Signed-off-by: Alin-Gabriel Serdean <aserdean@ovn.org>

branch-2.11 2021-09-30 06:56:35 UTC
datapath-windows:adjust Offset when processing packet in POP_VLAN action

Author: wilsonpeng
Author Date: 2021-09-30 04:56:26 UTC

datapath-windows:adjust Offset when processing packet in POP_VLAN action

In one typical setup, on the Windows VM running OVS Windows Kernel, a Geneva
packet with 8021.q VLAN tag is received. Then it may do POP_VLAN action
processing in Actions.c, if the packet does not have Ieee8021QNetBufferListInfo
in the oob of the packet, it will be processed by function OvsPopVlanInPktBuf().
In the function it will go on remove VLAN header present in the nbl, but related
layers is never readjusted for the offset value at this moment. As a result, it
will cause function OvsValidateIPChecksum drop the packet.

Reported-at:https://github.com/openvswitch/ovs-issues/issues/225
Signed-off-by: wilsonpeng <pweisong@vmware.com>
Signed-off-by: Alin-Gabriel Serdean <aserdean@ovn.org>

branch-2.6 2021-02-10 16:40:15 UTC
Prepare for 2.6.11.

Author: Ilya Maximets
Author Date: 2021-02-10 15:06:32 UTC

Prepare for 2.6.11.

Acked-by: Flavio Leitner <fbl@sysclose.org>
Signed-off-by: Ilya Maximets <i.maximets@ovn.org>

branch-2.5 2021-02-10 16:40:13 UTC
Prepare for 2.5.13.

Author: Ilya Maximets
Author Date: 2021-02-10 15:06:24 UTC

Prepare for 2.5.13.

Acked-by: Flavio Leitner <fbl@sysclose.org>
Signed-off-by: Ilya Maximets <i.maximets@ovn.org>

ovn-ddlog-patches 2019-10-03 16:41:03 UTC
Export 'count_1bits' function needed by ddlog.

Author: Justin Pettit
Author Date: 2019-10-03 16:39:31 UTC

Export 'count_1bits' function needed by ddlog.

dpdk-hwol 2019-06-20 15:49:02 UTC
netdev-dpdk: Prefix network structures with rte_.

Author: David Marchand
Author Date: 2019-06-04 09:29:08 UTC

netdev-dpdk: Prefix network structures with rte_.

Following a rework of dpdk network structures names [1], update the
concerned parts.

Ran Olivier script [2]:
sh prefix-net-rte.sh $(find -name "*dpdk*.c")
sh prefix-net-rte.sh $(find -name "*dpdk*.h")
sh prefix-net-rte.sh $(find -name "*rte*.c")
sh prefix-net-rte.sh $(find -name "*rte*.h")

1: http://mails.dpdk.org/archives/dev/2019-May/132612.html
2: http://mails.dpdk.org/archives/dev/2019-May/133081.html

Signed-off-by: David Marchand <david.marchand@redhat.com>
Signed-off-by: Ian Stokes <ian.stokes@intel.com>

branch-2.4 2019-03-18 20:37:42 UTC
travis: Remove sparse support.

Author: Ben Pfaff
Author Date: 2018-10-16 20:57:10 UTC

travis: Remove sparse support.

"sparse" failed to build with this old branch, see e.g.
https://travis-ci.org/openvswitch/ovs/jobs/436851158

Signed-off-by: Ben Pfaff <blp@ovn.org>

branch-2.0 2019-02-04 20:45:25 UTC
odp-util: Stop parse odp actions if nlattr is overflow

Author: Yifeng Sun
Author Date: 2019-02-01 23:56:04 UTC

odp-util: Stop parse odp actions if nlattr is overflow

`encap = nl_msg_start_nested(key, OVS_KEY_ATTR_ENCAP)` ensures that
key->size >= (encap + NLA_HDRLEN), so the `if` statement is safe.

Reported-at: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11306
Signed-off-by: Yifeng Sun <pkusunyifeng@gmail.com>
Signed-off-by: Ben Pfaff <blp@ovn.org>

branch-2.1 2019-02-04 20:45:18 UTC
odp-util: Stop parse odp actions if nlattr is overflow

Author: Yifeng Sun
Author Date: 2019-02-01 23:56:04 UTC

odp-util: Stop parse odp actions if nlattr is overflow

`encap = nl_msg_start_nested(key, OVS_KEY_ATTR_ENCAP)` ensures that
key->size >= (encap + NLA_HDRLEN), so the `if` statement is safe.

Reported-at: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11306
Signed-off-by: Yifeng Sun <pkusunyifeng@gmail.com>
Signed-off-by: Ben Pfaff <blp@ovn.org>

branch-2.2 2019-02-04 20:45:11 UTC
odp-util: Stop parse odp actions if nlattr is overflow

Author: Yifeng Sun
Author Date: 2019-02-01 23:56:04 UTC

odp-util: Stop parse odp actions if nlattr is overflow

`encap = nl_msg_start_nested(key, OVS_KEY_ATTR_ENCAP)` ensures that
key->size >= (encap + NLA_HDRLEN), so the `if` statement is safe.

Reported-at: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11306
Signed-off-by: Yifeng Sun <pkusunyifeng@gmail.com>
Signed-off-by: Ben Pfaff <blp@ovn.org>

branch-2.3 2019-02-04 20:45:05 UTC
odp-util: Stop parse odp actions if nlattr is overflow

Author: Yifeng Sun
Author Date: 2019-02-01 23:56:04 UTC

odp-util: Stop parse odp actions if nlattr is overflow

`encap = nl_msg_start_nested(key, OVS_KEY_ATTR_ENCAP)` ensures that
key->size >= (encap + NLA_HDRLEN), so the `if` statement is safe.

Reported-at: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11306
Signed-off-by: Yifeng Sun <pkusunyifeng@gmail.com>
Signed-off-by: Ben Pfaff <blp@ovn.org>

branch-1.4 2015-01-19 18:10:45 UTC
pktbuf: Always initialize '*bufferp' even when 'pb == NULL'.

Author: Ben Pfaff
Author Date: 2015-01-17 17:21:04 UTC

pktbuf: Always initialize '*bufferp' even when 'pb == NULL'.

Otherwise if a service connection (which does not have buffers) attempts
to use buffers, '*bufferp' will be uninitialized, which can cause a
segfault in the caller.

Found using OFtest configured to use service (active rather than passive)
connections.

Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Thomas Graf <tgraf@noironetworks.com>

branch-1.9 2015-01-19 18:09:56 UTC
pktbuf: Always initialize '*bufferp' even when 'pb == NULL'.

Author: Ben Pfaff
Author Date: 2015-01-17 17:21:04 UTC

pktbuf: Always initialize '*bufferp' even when 'pb == NULL'.

Otherwise if a service connection (which does not have buffers) attempts
to use buffers, '*bufferp' will be uninitialized, which can cause a
segfault in the caller.

Found using OFtest configured to use service (active rather than passive)
connections.

Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Thomas Graf <tgraf@noironetworks.com>

branch-1.11 2015-01-19 18:09:53 UTC
pktbuf: Always initialize '*bufferp' even when 'pb == NULL'.

Author: Ben Pfaff
Author Date: 2015-01-17 17:21:04 UTC

pktbuf: Always initialize '*bufferp' even when 'pb == NULL'.

Otherwise if a service connection (which does not have buffers) attempts
to use buffers, '*bufferp' will be uninitialized, which can cause a
segfault in the caller.

Found using OFtest configured to use service (active rather than passive)
connections.

Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Thomas Graf <tgraf@noironetworks.com>

dpdk-travis-build-test 2014-09-09 22:29:06 UTC
travis: fix DPDK build

Author: Daniele Di Proietto
Author Date: 2014-09-09 22:17:00 UTC

travis: fix DPDK build

Signed-off-by: Daniele Di Proietto <ddiproietto@vmware.com>
Signed-off-by: Ben Pfaff <blp@nicira.com>

ext-320 2014-07-28 22:04:58 UTC
work

Author: Ben Pfaff
Author Date: 2014-07-28 17:58:09 UTC

work

elephant 2014-07-25 19:05:20 UTC
Initial check-in of kernel-based elephant flow detection.

Author: Justin Pettit
Author Date: 2014-04-28 21:25:06 UTC

Initial check-in of kernel-based elephant flow detection.

Areas to work on:

    - Doesn't populate "elephant-flows" field.
    - Doesn't properly handle tunnels.
    - Doesn't have clean way to query elephant table.
    - Double-check locking.
    - Should use names instead of number for mechanism.
    - When changing detection mechanism, should clear old table.
    - Breaks unit tests

branch-1.10 2014-06-23 03:33:01 UTC
ofproto-dpif: Configure datapath max-idle through ovs-vsctl.

Author: Alex Wang
Author Date: 2014-06-20 01:31:19 UTC

ofproto-dpif: Configure datapath max-idle through ovs-vsctl.

This patch adds a new configuration option, "max-idle" to the
Bridge "other-config" column. This sets how long datapath flows,
for the configured bridge, are cached in the datapath before
ovs-vswitchd thread expires them.

This commit is a backport of commit 72310b04 (upcall: Configure
datapath max-idle through ovs-vsctl.).

Signed-off-by: Alex Wang <alexw@nicira.com>
Acked-by: Joe Stringer <joestringer@nicira.com>

branch-1.6 2014-03-20 18:15:09 UTC
cfm: Define old_cfm_fault as 'enum cfm_fault_reason'.

Author: Alex Wang
Author Date: 2014-03-19 23:19:28 UTC

cfm: Define old_cfm_fault as 'enum cfm_fault_reason'.

CFM fault variable type has been changed to 'enum cfm_fault_reason' for
long time. However, inside cfm_run(), the old_cfm_fault is still defined
as boolean. This commit fixes the issue.

Found by inspection.

Signed-off-by: Alex Wang <alexw@nicira.com>
Acked-by: Ben Pfaff <blp@nicira.com>

branch-1.7 2014-03-20 18:10:44 UTC
cfm: Define old_cfm_fault as 'enum cfm_fault_reason'.

Author: Alex Wang
Author Date: 2014-03-19 23:19:28 UTC

cfm: Define old_cfm_fault as 'enum cfm_fault_reason'.

CFM fault variable type has been changed to 'enum cfm_fault_reason' for
long time. However, inside cfm_run(), the old_cfm_fault is still defined
as boolean. This commit fixes the issue.

Found by inspection.

Signed-off-by: Alex Wang <alexw@nicira.com>
Acked-by: Ben Pfaff <blp@nicira.com>

branch-1.8 2014-03-20 18:09:02 UTC
cfm: Define old_cfm_fault as 'enum cfm_fault_reason'.

Author: Alex Wang
Author Date: 2014-03-19 23:19:28 UTC

cfm: Define old_cfm_fault as 'enum cfm_fault_reason'.

CFM fault variable type has been changed to 'enum cfm_fault_reason' for
long time. However, inside cfm_run(), the old_cfm_fault is still defined
as boolean. This commit fixes the issue.

Found by inspection.

Signed-off-by: Alex Wang <alexw@nicira.com>
Acked-by: Ben Pfaff <blp@nicira.com>

branch-1.5 2013-03-12 16:17:16 UTC
ovsdb: Fix memory leak.

Author: Ben Pfaff
Author Date: 2013-01-24 19:33:35 UTC

ovsdb: Fix memory leak.

Signed-off-by: Ben Pfaff <blp@nicira.com>
Acked-by: Ethan Jackson <ethan@nicira.com>

vlan-maint 2012-07-10 16:50:22 UTC
ofproto: Preserve in_port across trips through the datapath.

Author: Ben Pfaff
Author Date: 2012-07-10 16:50:22 UTC

ofproto: Preserve in_port across trips through the datapath.

When a "packet out" sent a packet to the datapath and then the datapath
sent the packet back via ODP_ACTION_ATTR_CONTROLLER, the in_port included
in the "packet out" was lost (it became OFPP_LOCAL) because the datapath's
"execute" operation doesn't accept an in_port.

This commit fixes the problem by including the in_port in the userdata
argument to ODP_ACTION_ATTR_CONTROLLER.

NICS-15.
Reported-by: Zoltan Kiss <zoltan.kiss@citrix.com>
CC: David Tsai <dtsai@nicira.com>
Signed-off-by: Ben Pfaff <blp@nicira.com>

branch-1.2 2012-07-02 17:18:13 UTC
ovs-vswitchd: Call mlockall() from the daemon, not the parent or monitor.

Author: Ben Pfaff
Author Date: 2012-06-29 16:22:59 UTC

ovs-vswitchd: Call mlockall() from the daemon, not the parent or monitor.

mlockall(2) says:

       Memory locks are not inherited by a child created via fork(2) and are
       automatically removed (unlocked) during an execve(2) or when the
       process terminates.

which means that --mlockall was ineffective in combination with --detach
or --monitor or both. Both are used in the most common production
configuration of Open vSwitch, so this means that --mlockall has never been
effective in production.

Signed-off-by: Ben Pfaff <blp@nicira.com>

branch-1.3 2012-07-02 17:17:59 UTC
ovs-vswitchd: Call mlockall() from the daemon, not the parent or monitor.

Author: Ben Pfaff
Author Date: 2012-06-29 16:22:59 UTC

ovs-vswitchd: Call mlockall() from the daemon, not the parent or monitor.

mlockall(2) says:

       Memory locks are not inherited by a child created via fork(2) and are
       automatically removed (unlocked) during an execve(2) or when the
       process terminates.

which means that --mlockall was ineffective in combination with --detach
or --monitor or both. Both are used in the most common production
configuration of Open vSwitch, so this means that --mlockall has never been
effective in production.

Signed-off-by: Ben Pfaff <blp@nicira.com>

branch-1.1 2011-08-02 19:22:37 UTC
Prepare Open vSwitch 1.1.2 release.

Author: Justin Pettit
Author Date: 2011-08-02 19:22:37 UTC

Prepare Open vSwitch 1.1.2 release.

wdp 2011-03-03 17:54:33 UTC
wdp-xflow: Remove wx structure from global list when closing.

Author: Ben Pfaff
Author Date: 2011-03-03 17:54:33 UTC

wdp-xflow: Remove wx structure from global list when closing.

Fixes a use-after-free error in wx_run().

Reported-by: Hao Zheng <hzheng@nicira.com>

lts-1.0 2010-11-16 23:17:38 UTC
netdev: Fix carrier status for down interfaces.

Author: Jesse Gross
Author Date: 2010-10-27 22:29:16 UTC

netdev: Fix carrier status for down interfaces.

Currently netdev_get_carrier() returns both a carrier status and
an error code. However, usage of the error code was inconsistent:
most callers either ignored it or didn't perform their task if an
error occured, which prevented bond rebalancing. This makes the
handling consistent by translating an error into a down status in
the netdev library.

Bug #3959

lts-1.0a 2010-10-09 00:18:35 UTC
Release Open vSwitch 1.0.2

Author: Justin Pettit
Author Date: 2010-10-09 00:15:05 UTC

Release Open vSwitch 1.0.2

openflow-1.0 2010-03-25 15:24:23 UTC
dpif-linux: Fix file descriptor leak.

Author: Tetsuo NAKAGAWA
Author Date: 2010-03-25 14:54:15 UTC

dpif-linux: Fix file descriptor leak.

get_major() opens /proc/devices to get the openvswitch major number
but never closes the FD.

xs5.7 2009-12-17 17:56:01 UTC
initscript: pass complete path to pidfile to status command

Author: Ian Campbell
Author Date: 2009-12-17 14:46:52 UTC

initscript: pass complete path to pidfile to status command

Older versions of RHEL/CentOS used pifof in preference to the pidfile
and hence we got away with passing just the basename instead of
including the full path. Using pidof first doesn't make much sense and
this was fixed in RHEL 5 update 4 (see https://bugzilla.redhat.com/show_bug.cgi?id=440658)

This means that on RHEL 5.4 "service vswitch status" always returned
"ovs-vswitchd is stopped" even if it was running. Fix this issue by
passing in the correct pidfile name.

Signed-off-by: Ian Campbell <ian.campbell@citrix.com>

for-nox/0.4 2009-01-26 09:05:39 UTC
For SNAT, don't store the pre-fragment L2 header before actions are applied.

Author: Justin Pettit
Author Date: 2009-01-26 09:05:39 UTC

For SNAT, don't store the pre-fragment L2 header before actions are applied.

The IP fragment code doesn't always write the L2 header when generating
new fragments. This problem was fixed in an earlier commit.
Unfortunately, we stored the pre-fragment L2 header when the packet
first arrived--before other packet modifications were applied. This
meant that the results of any OpenFlow L2 modification actions were lost.
This patch pushes the storage of the L2 header until right before the
packet is transmitted (and possibly refragmented).

Thanks to Dan for catching this behavior.

144 of 44 results
This repository contains Public information 
Everyone can see this information.