summaryrefslogtreecommitdiff
path: root/drivers/hwmon/adcxx.c
diff options
context:
space:
mode:
authorDumitru Ceara <dceara@redhat.com>2020-10-07 17:48:03 +0200
committerJakub Kicinski <kuba@kernel.org>2020-10-08 12:20:35 -0700
commit8aa7b526dc0b5dbf40c1b834d76a667ad672a410 (patch)
treec2d91bdca0d89dcca33d511aaa682f9e8e20d016 /drivers/hwmon/adcxx.c
parentd42ee76ecb6c49d499fc5eb32ca34468d95dbc3e (diff)
openvswitch: handle DNAT tuple collision
With multiple DNAT rules it's possible that after destination translation the resulting tuples collide. For example, two openvswitch flows: nw_dst=10.0.0.10,tp_dst=10, actions=ct(commit,table=2,nat(dst=20.0.0.1:20)) nw_dst=10.0.0.20,tp_dst=10, actions=ct(commit,table=2,nat(dst=20.0.0.1:20)) Assuming two TCP clients initiating the following connections: 10.0.0.10:5000->10.0.0.10:10 10.0.0.10:5000->10.0.0.20:10 Both tuples would translate to 10.0.0.10:5000->20.0.0.1:20 causing nf_conntrack_confirm() to fail because of tuple collision. Netfilter handles this case by allocating a null binding for SNAT at egress by default. Perform the same operation in openvswitch for DNAT if no explicit SNAT is requested by the user and allocate a null binding for SNAT for packets in the "original" direction. Reported-at: https://bugzilla.redhat.com/1877128 Suggested-by: Florian Westphal <fw@strlen.de> Fixes: 05752523e565 ("openvswitch: Interface with NAT.") Signed-off-by: Dumitru Ceara <dceara@redhat.com> Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Diffstat (limited to 'drivers/hwmon/adcxx.c')
0 files changed, 0 insertions, 0 deletions