From: Numan Siddique <nusiddiq-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
To: netdev-u79uwXL29TY76Z2rM5mHXA@public.gmane.org,
ovs dev <dev-yBygre7rU0TnMu66kgdUjQ@public.gmane.org>
Subject: [RFC] [net]openvswitch: Clear the ct flow key for the recirculated packet
Date: Thu, 16 Mar 2017 17:55:06 +0530 [thread overview]
Message-ID: <af0d1942-726b-b637-e8e3-2f4857bb00a2@redhat.com> (raw)
It is possible that the ct flow key information would have
gone stale for the packets received from the userspace due to
clone or ct_clear actions.
In the case of OVN, it adds ping responder flows, which modifies
the original icmp4 request packet to a reply packet. It uses the
OVS actions - clone and ct_clear. When the reply packet hits the
"ovs_ct_execute" function, and since the ct flow key info is not
cleared, the connection tracker doesn't set the state to
ESTABLISHED state.
Note: This patch is marked as RFC, as I am not sure if this is the correct
place to address this issue or it should be addressed in ovs-vswitchd
to set the OVS_KEY_ATTR_CT_STATE and other related attributes
properly for ct_clear action.
Signed-off-by: Numan Siddique <nusiddiq-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
---
net/openvswitch/flow.c | 5 +++++
1 file changed, 5 insertions(+)
diff --git a/net/openvswitch/flow.c b/net/openvswitch/flow.c
index 9d4bb8e..72b73db 100644
--- a/net/openvswitch/flow.c
+++ b/net/openvswitch/flow.c
@@ -836,6 +836,11 @@ int ovs_flow_key_extract_userspace(struct net *net, const struct nlattr *attr,
if (err)
return err;
+ /* Clear the ct flow key after key_extract to avoid using
+ * stale ct key information.
+ */
+ ovs_ct_fill_key(skb, key);
+
/* Check that we have conntrack original direction tuple metadata only
* for packets for which it makes sense. Otherwise the key may be
* corrupted due to overlapping key fields.
--
2.9.3
next reply other threads:[~2017-03-16 12:25 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-03-16 12:25 Numan Siddique [this message]
[not found] ` <af0d1942-726b-b637-e8e3-2f4857bb00a2-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2017-03-16 21:11 ` [RFC] [net]openvswitch: Clear the ct flow key for the recirculated packet Lance Richardson
[not found] ` <941889157.2725572.1489698695710.JavaMail.zimbra-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2017-03-17 6:05 ` Numan Siddique
2017-03-17 0:12 ` Joe Stringer
[not found] ` <CAPWQB7GAJYjHBY1EP+Xyq_9nigSAcKMHb-4eTfvBNf_LQ-NuGA-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2017-03-17 6:04 ` Numan Siddique
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=af0d1942-726b-b637-e8e3-2f4857bb00a2@redhat.com \
--to=nusiddiq-h+wxahxf7alqt0dzr+alfa@public.gmane.org \
--cc=dev-yBygre7rU0TnMu66kgdUjQ@public.gmane.org \
--cc=netdev-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).