Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/614589/?format=api
{ "id": 614589, "url": "http://patchwork.ozlabs.org/api/patches/614589/?format=api", "web_url": "http://patchwork.ozlabs.org/project/netdev/patch/20160425183120.11331.19865.stgit@ahduyck-xeon-server/", "project": { "id": 7, "url": "http://patchwork.ozlabs.org/api/projects/7/?format=api", "name": "Linux network development", "link_name": "netdev", "list_id": "netdev.vger.kernel.org", "list_email": "netdev@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20160425183120.11331.19865.stgit@ahduyck-xeon-server>", "list_archive_url": null, "date": "2016-04-25T18:31:20", "name": "[net-next,4/8] vxlan: Add checksum check to the features check function", "commit_ref": null, "pull_url": null, "state": "deferred", "archived": true, "hash": "cd27a2fa0962e8486e5a7fe89f300725881291dc", "submitter": { "id": 67293, "url": "http://patchwork.ozlabs.org/api/people/67293/?format=api", "name": "Alexander Duyck", "email": "aduyck@mirantis.com" }, "delegate": { "id": 34, "url": "http://patchwork.ozlabs.org/api/users/34/?format=api", "username": "davem", "first_name": "David", "last_name": "Miller", "email": "davem@davemloft.net" }, "mbox": "http://patchwork.ozlabs.org/project/netdev/patch/20160425183120.11331.19865.stgit@ahduyck-xeon-server/mbox/", "series": [], "comments": "http://patchwork.ozlabs.org/api/patches/614589/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/614589/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<netdev-owner@vger.kernel.org>", "X-Original-To": "patchwork-incoming@ozlabs.org", "Delivered-To": "patchwork-incoming@ozlabs.org", "Received": [ "from vger.kernel.org (vger.kernel.org [209.132.180.67])\n\tby ozlabs.org (Postfix) with ESMTP id 3qtvv269hMz9t3n\n\tfor <patchwork-incoming@ozlabs.org>;\n\tTue, 26 Apr 2016 04:31:26 +1000 (AEST)", "(majordomo@vger.kernel.org) by vger.kernel.org via listexpand\n\tid S933363AbcDYSbX (ORCPT <rfc822;patchwork-incoming@ozlabs.org>);\n\tMon, 25 Apr 2016 14:31:23 -0400", "from mail-pf0-f181.google.com ([209.85.192.181]:33333 \"EHLO\n\tmail-pf0-f181.google.com\" rhost-flags-OK-OK-OK-OK) by vger.kernel.org\n\twith ESMTP id S933040AbcDYSbW (ORCPT\n\t<rfc822;netdev@vger.kernel.org>); Mon, 25 Apr 2016 14:31:22 -0400", "by mail-pf0-f181.google.com with SMTP id 206so20645433pfu.0\n\tfor <netdev@vger.kernel.org>; Mon, 25 Apr 2016 11:31:22 -0700 (PDT)", "from [192.168.1.143] (static-50-53-29-36.bvtn.or.frontiernet.net.\n\t[50.53.29.36]) by smtp.gmail.com with ESMTPSA id\n\tw15sm30506025pfa.34.2016.04.25.11.31.20\n\t(version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);\n\tMon, 25 Apr 2016 11:31:21 -0700 (PDT)" ], "Authentication-Results": "ozlabs.org; dkim=pass (1024-bit key;\n\tunprotected) header.d=mirantis.com header.i=@mirantis.com\n\theader.b=RPS+1/v9; dkim-atps=neutral", "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=mirantis.com; s=google;\n\th=subject:from:to:date:message-id:in-reply-to:references:user-agent\n\t:mime-version:content-transfer-encoding;\n\tbh=2oEgTb1jk+hV3CVPMd2dRe87VUFChihyAseqt/LXfMs=;\n\tb=RPS+1/v92ezdPZDQJwzYcHwdI5QZp739RkOa/qaJ8+NFArWMnaP10O4kcXDvXh2G4m\n\tw2iFFd6a5azW2bp9ljtGR3O+HBuMs9W2Cm1feRNJiZIyx2JybEt3KmMjbUVsHspjaAaR\n\t8rOtLVP29ukrxlWcOH/iZ/kpG6CiTVfZQsqG8=", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=1e100.net; s=20130820;\n\th=x-gm-message-state:subject:from:to:date:message-id:in-reply-to\n\t:references:user-agent:mime-version:content-transfer-encoding;\n\tbh=2oEgTb1jk+hV3CVPMd2dRe87VUFChihyAseqt/LXfMs=;\n\tb=PQvHeQ+R5DUgU4Vq3x0SMOr5/6PTuqpBcpH+dNGXdnFtmdWuVOAN4k/zk1ROioIAEL\n\tT2PAuDXZS22OEkk6bMo4WdY4pavGNvRovVUy8wCKRrSxRTiiH7JJgPQ9Wlhw0kaeuXQF\n\tz3fb+hLkCO1hMPoOImAwmUruUYgkkYZXdSzXmXdD78rUYa+HM9nD4p5PgNIxs0vFp5Nc\n\trz4kP0VjuSVUtVYjxenh15aNFk2k7XXDJtg+4MP6wE6vkwkOahBRcX3aFOpF1Yg3CyB2\n\tyqgu1VgVzADpA7iPF7jQiE2mDUE0DQ28hNXlXLfXDIQTjTLvyVcn+3uPbyVm3+8fe62T\n\tAbiQ==", "X-Gm-Message-State": "AOPr4FVADwYsNWzN+rYzxG1dBbgFAD6YdbwahqKeO4ZmYJ+yzQi696lb879TeTaPWfaSnI3z", "X-Received": "by 10.98.28.84 with SMTP id c81mr30692723pfc.131.1461609081585; \n\tMon, 25 Apr 2016 11:31:21 -0700 (PDT)", "Subject": "[net-next PATCH 4/8] vxlan: Add checksum check to the features\n\tcheck function", "From": "Alexander Duyck <aduyck@mirantis.com>", "To": "talal@mellanox.com, netdev@vger.kernel.org, davem@davemloft.net,\n\tgalp@mellanox.com, ogerlitz@mellanox.com, eranbe@mellanox.com", "Date": "Mon, 25 Apr 2016 11:31:20 -0700", "Message-ID": "<20160425183120.11331.19865.stgit@ahduyck-xeon-server>", "In-Reply-To": "<20160425182442.11331.88349.stgit@ahduyck-xeon-server>", "References": "<20160425182442.11331.88349.stgit@ahduyck-xeon-server>", "User-Agent": "StGit/0.17.1-dirty", "MIME-Version": "1.0", "Content-Type": "text/plain; charset=\"utf-8\"", "Content-Transfer-Encoding": "7bit", "Sender": "netdev-owner@vger.kernel.org", "Precedence": "bulk", "List-ID": "<netdev.vger.kernel.org>", "X-Mailing-List": "netdev@vger.kernel.org" }, "content": "We need to perform an additional check on the inner headers to determine if\nwe can offload the checksum for them. Previously this check didn't occur\nso we would generate an invalid frame in the case of an IPv6 header\nencapsulated inside of an IPv4 tunnel. To fix this I added a secondary\ncheck to vxlan_features_check so that we can verify that we can offload the\ninner checksum.\n\nSigned-off-by: Alexander Duyck <aduyck@mirantis.com>\n---\n include/linux/if_ether.h | 5 +++++\n include/net/vxlan.h | 4 +++-\n 2 files changed, 8 insertions(+), 1 deletion(-)", "diff": "diff --git a/include/linux/if_ether.h b/include/linux/if_ether.h\nindex d5569734f672..548fd535fd02 100644\n--- a/include/linux/if_ether.h\n+++ b/include/linux/if_ether.h\n@@ -28,6 +28,11 @@ static inline struct ethhdr *eth_hdr(const struct sk_buff *skb)\n \treturn (struct ethhdr *)skb_mac_header(skb);\n }\n \n+static inline struct ethhdr *inner_eth_hdr(const struct sk_buff *skb)\n+{\n+\treturn (struct ethhdr *)skb_inner_mac_header(skb);\n+}\n+\n int eth_header_parse(const struct sk_buff *skb, unsigned char *haddr);\n \n extern ssize_t sysfs_format_mac(char *buf, const unsigned char *addr, int len);\ndiff --git a/include/net/vxlan.h b/include/net/vxlan.h\nindex 673e9f9e6da7..b8803165df91 100644\n--- a/include/net/vxlan.h\n+++ b/include/net/vxlan.h\n@@ -317,7 +317,9 @@ static inline netdev_features_t vxlan_features_check(struct sk_buff *skb,\n \t (skb->inner_protocol_type != ENCAP_TYPE_ETHER ||\n \t skb->inner_protocol != htons(ETH_P_TEB) ||\n \t (skb_inner_mac_header(skb) - skb_transport_header(skb) !=\n-\t sizeof(struct udphdr) + sizeof(struct vxlanhdr))))\n+\t sizeof(struct udphdr) + sizeof(struct vxlanhdr)) ||\n+\t (skb->ip_summed != CHECKSUM_NONE &&\n+\t !can_checksum_protocol(features, inner_eth_hdr(skb)->h_proto))))\n \t\treturn features & ~(NETIF_F_CSUM_MASK | NETIF_F_GSO_MASK);\n \n \treturn features;\n", "prefixes": [ "net-next", "4/8" ] }