* [PATCH net] openvswitch: Fix for force/commit action failures @ 2017-07-14 16:10 Greg Rose [not found] ` <1500048639-24169-1-git-send-email-gvrose8192-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 0 siblings, 1 reply; 4+ messages in thread From: Greg Rose @ 2017-07-14 16:10 UTC (permalink / raw) To: netdev; +Cc: Greg Rose, Pravin Shelar, dev, Joe Stringer When there is an established connection in direction A->B, it is possible to receive a packet on port B which then executes ct(commit,force) without first performing ct() - ie, a lookup. In this case, we would expect that this packet can delete the existing entry so that we can commit a connection with direction B->A. However, currently we only perform a check in skb_nfct_cached() for whether OVS_CS_F_TRACKED is set and OVS_CS_F_INVALID is not set, ie that a lookup previously occurred. In the above scenario, a lookup has not occurred but we should still be able to statelessly look up the existing entry and potentially delete the entry if it is in the opposite direction. This patch extends the check to also hint that if the action has the force flag set, then we will lookup the existing entry so that the force check at the end of skb_nfct_cached has the ability to delete the connection. Fixes: dd41d330b03 ("openvswitch: Add force commit.") CC: Pravin Shelar <pshelar@nicira.com> CC: dev@openvswitch.org Signed-off-by: Joe Stringer <joe@ovn.org> Signed-off-by: Greg Rose <gvrose8192@gmail.com> --- net/openvswitch/conntrack.c | 50 +++++++++++++++++++++++++++++++-------------- 1 file changed, 35 insertions(+), 15 deletions(-) diff --git a/net/openvswitch/conntrack.c b/net/openvswitch/conntrack.c index 08679eb..1260f2b 100644 --- a/net/openvswitch/conntrack.c +++ b/net/openvswitch/conntrack.c @@ -629,6 +629,33 @@ static int handle_fragments(struct net *net, struct sw_flow_key *key, return ct; } +struct nf_conn *ovs_ct_executed(struct net *net, + const struct sw_flow_key *key, + const struct ovs_conntrack_info *info, + struct sk_buff *skb, + bool *ct_executed) +{ + struct nf_conn *ct = NULL; + + /* If no ct, check if we have evidence that an existing conntrack entry + * might be found for this skb. This happens when we lose a skb->_nfct + * due to an upcall, or if the direction is being forced. If the + * connection was not confirmed, it is not cached and needs to be run + * through conntrack again. + */ + *ct_executed = (key->ct_state & OVS_CS_F_TRACKED) && + !(key->ct_state & OVS_CS_F_INVALID) && + (key->ct_zone == info->zone.id); + + if (*ct_executed || (!key->ct_state && info->force)) { + ct = ovs_ct_find_existing(net, &info->zone, info->family, skb, + !!(key->ct_state & + OVS_CS_F_NAT_MASK)); + } + + return ct; +} + /* Determine whether skb->_nfct is equal to the result of conntrack lookup. */ static bool skb_nfct_cached(struct net *net, const struct sw_flow_key *key, @@ -637,24 +664,17 @@ static bool skb_nfct_cached(struct net *net, { enum ip_conntrack_info ctinfo; struct nf_conn *ct; + bool ct_executed = true; ct = nf_ct_get(skb, &ctinfo); - /* If no ct, check if we have evidence that an existing conntrack entry - * might be found for this skb. This happens when we lose a skb->_nfct - * due to an upcall. If the connection was not confirmed, it is not - * cached and needs to be run through conntrack again. - */ - if (!ct && key->ct_state & OVS_CS_F_TRACKED && - !(key->ct_state & OVS_CS_F_INVALID) && - key->ct_zone == info->zone.id) { - ct = ovs_ct_find_existing(net, &info->zone, info->family, skb, - !!(key->ct_state - & OVS_CS_F_NAT_MASK)); - if (ct) - nf_ct_get(skb, &ctinfo); - } if (!ct) + ct = ovs_ct_executed(net, key, info, skb, &ct_executed); + + if (ct) + nf_ct_get(skb, &ctinfo); + else return false; + if (!net_eq(net, read_pnet(&ct->ct_net))) return false; if (!nf_ct_zone_equal_any(info->ct, nf_ct_zone(ct))) @@ -679,7 +699,7 @@ static bool skb_nfct_cached(struct net *net, return false; } - return true; + return ct_executed; } #ifdef CONFIG_NF_NAT_NEEDED -- 1.8.3.1 ^ permalink raw reply related [flat|nested] 4+ messages in thread
[parent not found: <1500048639-24169-1-git-send-email-gvrose8192-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>]
* Re: [PATCH net] openvswitch: Fix for force/commit action failures [not found] ` <1500048639-24169-1-git-send-email-gvrose8192-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> @ 2017-07-14 18:29 ` Joe Stringer 2017-07-14 18:42 ` Joe Stringer 1 sibling, 0 replies; 4+ messages in thread From: Joe Stringer @ 2017-07-14 18:29 UTC (permalink / raw) To: Greg Rose; +Cc: ovs dev, netdev On 14 July 2017 at 09:10, Greg Rose <gvrose8192-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> wrote: > When there is an established connection in direction A->B, it is > possible to receive a packet on port B which then executes > ct(commit,force) without first performing ct() - ie, a lookup. > In this case, we would expect that this packet can delete the existing > entry so that we can commit a connection with direction B->A. However, > currently we only perform a check in skb_nfct_cached() for whether > OVS_CS_F_TRACKED is set and OVS_CS_F_INVALID is not set, ie that a > lookup previously occurred. In the above scenario, a lookup has not > occurred but we should still be able to statelessly look up the > existing entry and potentially delete the entry if it is in the > opposite direction. > > This patch extends the check to also hint that if the action has the > force flag set, then we will lookup the existing entry so that the > force check at the end of skb_nfct_cached has the ability to delete > the connection. > > Fixes: dd41d330b03 ("openvswitch: Add force commit.") > CC: Pravin Shelar <pshelar-l0M0P4e3n4LQT0dZR+AlfA@public.gmane.org> > CC: dev-yBygre7rU0TnMu66kgdUjQ@public.gmane.org > Signed-off-by: Joe Stringer <joe-LZ6Gd1LRuIk@public.gmane.org> > Signed-off-by: Greg Rose <gvrose8192-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> > --- Thanks for the fix. Reviewed-by: Joe Stringer <joe-LZ6Gd1LRuIk@public.gmane.org> ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH net] openvswitch: Fix for force/commit action failures [not found] ` <1500048639-24169-1-git-send-email-gvrose8192-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2017-07-14 18:29 ` Joe Stringer @ 2017-07-14 18:42 ` Joe Stringer [not found] ` <CAPWQB7F2uw1hTmbbzQS6bjy15EbGO26LmFpUXzLSwmCt_N31Xw-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org> 1 sibling, 1 reply; 4+ messages in thread From: Joe Stringer @ 2017-07-14 18:42 UTC (permalink / raw) To: Greg Rose; +Cc: ovs dev, netdev On 14 July 2017 at 09:10, Greg Rose <gvrose8192-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> wrote: > When there is an established connection in direction A->B, it is > possible to receive a packet on port B which then executes > ct(commit,force) without first performing ct() - ie, a lookup. > In this case, we would expect that this packet can delete the existing > entry so that we can commit a connection with direction B->A. However, > currently we only perform a check in skb_nfct_cached() for whether > OVS_CS_F_TRACKED is set and OVS_CS_F_INVALID is not set, ie that a > lookup previously occurred. In the above scenario, a lookup has not > occurred but we should still be able to statelessly look up the > existing entry and potentially delete the entry if it is in the > opposite direction. > > This patch extends the check to also hint that if the action has the > force flag set, then we will lookup the existing entry so that the > force check at the end of skb_nfct_cached has the ability to delete > the connection. > > Fixes: dd41d330b03 ("openvswitch: Add force commit.") > CC: Pravin Shelar <pshelar-l0M0P4e3n4LQT0dZR+AlfA@public.gmane.org> > CC: dev-yBygre7rU0TnMu66kgdUjQ@public.gmane.org > Signed-off-by: Joe Stringer <joe-LZ6Gd1LRuIk@public.gmane.org> > Signed-off-by: Greg Rose <gvrose8192-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> > --- > net/openvswitch/conntrack.c | 50 +++++++++++++++++++++++++++++++-------------- > 1 file changed, 35 insertions(+), 15 deletions(-) > > diff --git a/net/openvswitch/conntrack.c b/net/openvswitch/conntrack.c > index 08679eb..1260f2b 100644 > --- a/net/openvswitch/conntrack.c > +++ b/net/openvswitch/conntrack.c > @@ -629,6 +629,33 @@ static int handle_fragments(struct net *net, struct sw_flow_key *key, > return ct; > } > > +struct nf_conn *ovs_ct_executed(struct net *net, > + const struct sw_flow_key *key, > + const struct ovs_conntrack_info *info, > + struct sk_buff *skb, > + bool *ct_executed) Actually, some compilers will report this new warning: net/openvswitch/conntrack.c:632:16: warning: symbol 'ovs_ct_executed' was not declared. Should it be static? Could you make this function static and repost? Thanks. ^ permalink raw reply [flat|nested] 4+ messages in thread
[parent not found: <CAPWQB7F2uw1hTmbbzQS6bjy15EbGO26LmFpUXzLSwmCt_N31Xw-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>]
* Re: [PATCH net] openvswitch: Fix for force/commit action failures [not found] ` <CAPWQB7F2uw1hTmbbzQS6bjy15EbGO26LmFpUXzLSwmCt_N31Xw-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org> @ 2017-07-14 18:44 ` Greg Rose 0 siblings, 0 replies; 4+ messages in thread From: Greg Rose @ 2017-07-14 18:44 UTC (permalink / raw) To: Joe Stringer; +Cc: ovs dev, netdev On 07/14/2017 11:42 AM, Joe Stringer wrote: > On 14 July 2017 at 09:10, Greg Rose <gvrose8192-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> wrote: > > When there is an established connection in direction A->B, it is > > possible to receive a packet on port B which then executes > > ct(commit,force) without first performing ct() - ie, a lookup. > > In this case, we would expect that this packet can delete the existing > > entry so that we can commit a connection with direction B->A. However, > > currently we only perform a check in skb_nfct_cached() for whether > > OVS_CS_F_TRACKED is set and OVS_CS_F_INVALID is not set, ie that a > > lookup previously occurred. In the above scenario, a lookup has not > > occurred but we should still be able to statelessly look up the > > existing entry and potentially delete the entry if it is in the > > opposite direction. > > > > This patch extends the check to also hint that if the action has the > > force flag set, then we will lookup the existing entry so that the > > force check at the end of skb_nfct_cached has the ability to delete > > the connection. > > > > Fixes: dd41d330b03 ("openvswitch: Add force commit.") > > CC: Pravin Shelar <pshelar-l0M0P4e3n4LQT0dZR+AlfA@public.gmane.org> > > CC: dev-yBygre7rU0TnMu66kgdUjQ@public.gmane.org > > Signed-off-by: Joe Stringer <joe-LZ6Gd1LRuIk@public.gmane.org> > > Signed-off-by: Greg Rose <gvrose8192-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> > > --- > > net/openvswitch/conntrack.c | 50 +++++++++++++++++++++++++++++++-------------- > > 1 file changed, 35 insertions(+), 15 deletions(-) > > > > diff --git a/net/openvswitch/conntrack.c b/net/openvswitch/conntrack.c > > index 08679eb..1260f2b 100644 > > --- a/net/openvswitch/conntrack.c > > +++ b/net/openvswitch/conntrack.c > > @@ -629,6 +629,33 @@ static int handle_fragments(struct net *net, struct sw_flow_key *key, > > return ct; > > } > > > > +struct nf_conn *ovs_ct_executed(struct net *net, > > + const struct sw_flow_key *key, > > + const struct ovs_conntrack_info *info, > > + struct sk_buff *skb, > > + bool *ct_executed) > > Actually, some compilers will report this new warning: > net/openvswitch/conntrack.c:632:16: warning: symbol 'ovs_ct_executed' > was not declared. Should it be static? > > Could you make this function static and repost? > > Thanks. > Yes, I just saw that too. Need to update my compiler for my primary build machine. I'll send a V2... Thanks! - Greg ^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2017-07-14 18:44 UTC | newest] Thread overview: 4+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2017-07-14 16:10 [PATCH net] openvswitch: Fix for force/commit action failures Greg Rose [not found] ` <1500048639-24169-1-git-send-email-gvrose8192-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2017-07-14 18:29 ` Joe Stringer 2017-07-14 18:42 ` Joe Stringer [not found] ` <CAPWQB7F2uw1hTmbbzQS6bjy15EbGO26LmFpUXzLSwmCt_N31Xw-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org> 2017-07-14 18:44 ` Greg Rose
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).