[ovs-git] [openvswitch/ovs] a9e695: datapath-windows: Account for VLAN tag in tunnel D...
GitHub
noreply at github.com
Tue Nov 28 12:48:11 UTC 2017
Branch: refs/heads/master
Home: https://github.com/openvswitch/ovs
Commit: a9e6958101d082dbbdc096d01a803ab3a3eca549
https://github.com/openvswitch/ovs/commit/a9e6958101d082dbbdc096d01a803ab3a3eca549
Author: Shashank Ram <rams at vmware.com>
Date: 2017-11-28 (Tue, 28 Nov 2017)
Changed paths:
M datapath-windows/ovsext/Geneve.c
M datapath-windows/ovsext/Geneve.h
M datapath-windows/ovsext/Gre.c
M datapath-windows/ovsext/Gre.h
M datapath-windows/ovsext/Offload.c
M datapath-windows/ovsext/Offload.h
M datapath-windows/ovsext/Stt.c
M datapath-windows/ovsext/Stt.h
M datapath-windows/ovsext/Vxlan.c
M datapath-windows/ovsext/Vxlan.h
Log Message:
-----------
datapath-windows: Account for VLAN tag in tunnel Decap
Decap functions for tunneling protocols do not compute
the packet header offsets correctly when there is a VLAN
tag in the L2 header. This results in incorrect checksum
computation causing the packet to be dropped.
This patch adds support to account for the VLAN tag in the
packet if its present, and makes use of the OvsExtractLayers()
function to correctly compute the header offsets for different
layers.
Testing done:
- Tested Geneve, STT, Vxlan and Gre and verified that there
are no regressions.
- Verified that packets with VLAN tags are correctly handled
in the decap code of all tunneling protocols. Previously,
this would result in packet drops due to invalid checksums
being computed.
- Verified that non-VLAN tagged packets are handled correctly.
Signed-off-by: Shashank Ram <rams at vmware.com>
Acked-by: Anand Kumar <kumaranand at vmware.com>
Signed-off-by: Alin Gabriel Serdean <aserdean at ovn.org>
More information about the git
mailing list