Message ID | 20190824165846.79627-1-jpettit@ovn.org |
---|---|
State | Changes Requested |
Delegated to: | David Miller |
Headers | show |
Series | [net,1/2] openvswitch: Properly set L4 keys on "later" IP fragments. | expand |
On Sat, Aug 24, 2019 at 9:58 AM Justin Pettit <jpettit@ovn.org> wrote: > > When IP fragments are reassembled before being sent to conntrack, the > key from the last fragment is used. Unless there are reordering > issues, the last fragment received will not contain the L4 ports, so the > key for the reassembled datagram won't contain them. This patch updates > the key once we have a reassembled datagram. > > Signed-off-by: Justin Pettit <jpettit@ovn.org> > --- > net/openvswitch/conntrack.c | 4 ++++ > 1 file changed, 4 insertions(+) > > diff --git a/net/openvswitch/conntrack.c b/net/openvswitch/conntrack.c > index 848c6eb55064..f40ad2a42086 100644 > --- a/net/openvswitch/conntrack.c > +++ b/net/openvswitch/conntrack.c > @@ -524,6 +524,10 @@ static int handle_fragments(struct net *net, struct sw_flow_key *key, > return -EPFNOSUPPORT; > } > > + /* The key extracted from the fragment that completed this datagram > + * likely didn't have an L4 header, so regenerate it. */ > + ovs_flow_key_update(skb, key); > + > key->ip.frag = OVS_FRAG_TYPE_NONE; > skb_clear_hash(skb); > skb->ignore_df = 1; > -- Looks good to me. Acked-by: Pravin B Shelar <pshelar@ovn.org> Thanks, Pravin.
On Sun, Aug 25, 2019 at 9:54 AM Pravin Shelar <pshelar@ovn.org> wrote: > > On Sat, Aug 24, 2019 at 9:58 AM Justin Pettit <jpettit@ovn.org> wrote: > > > > When IP fragments are reassembled before being sent to conntrack, the > > key from the last fragment is used. Unless there are reordering > > issues, the last fragment received will not contain the L4 ports, so the > > key for the reassembled datagram won't contain them. This patch updates > > the key once we have a reassembled datagram. > > > > Signed-off-by: Justin Pettit <jpettit@ovn.org> > > --- > > net/openvswitch/conntrack.c | 4 ++++ > > 1 file changed, 4 insertions(+) > > > > diff --git a/net/openvswitch/conntrack.c b/net/openvswitch/conntrack.c > > index 848c6eb55064..f40ad2a42086 100644 > > --- a/net/openvswitch/conntrack.c > > +++ b/net/openvswitch/conntrack.c > > @@ -524,6 +524,10 @@ static int handle_fragments(struct net *net, struct sw_flow_key *key, > > return -EPFNOSUPPORT; > > } > > > > + /* The key extracted from the fragment that completed this datagram > > + * likely didn't have an L4 header, so regenerate it. */ > > + ovs_flow_key_update(skb, key); > > + > > key->ip.frag = OVS_FRAG_TYPE_NONE; > > skb_clear_hash(skb); > > skb->ignore_df = 1; > > -- > > Looks good to me. > > Acked-by: Pravin B Shelar <pshelar@ovn.org> > Actually I am not sure about this change. caller of this function (ovs_ct_execute()) does skb-pull and push of L2 header, calling ovs_flow_key_update() is not safe here, it expect skb data to point to L2 header.
From: Pravin Shelar <pshelar@ovn.org> Date: Sun, 25 Aug 2019 13:40:58 -0700 > On Sun, Aug 25, 2019 at 9:54 AM Pravin Shelar <pshelar@ovn.org> wrote: >> >> On Sat, Aug 24, 2019 at 9:58 AM Justin Pettit <jpettit@ovn.org> wrote: >> > >> > When IP fragments are reassembled before being sent to conntrack, the >> > key from the last fragment is used. Unless there are reordering >> > issues, the last fragment received will not contain the L4 ports, so the >> > key for the reassembled datagram won't contain them. This patch updates >> > the key once we have a reassembled datagram. >> > >> > Signed-off-by: Justin Pettit <jpettit@ovn.org> >> > --- >> > net/openvswitch/conntrack.c | 4 ++++ >> > 1 file changed, 4 insertions(+) >> > >> > diff --git a/net/openvswitch/conntrack.c b/net/openvswitch/conntrack.c >> > index 848c6eb55064..f40ad2a42086 100644 >> > --- a/net/openvswitch/conntrack.c >> > +++ b/net/openvswitch/conntrack.c >> > @@ -524,6 +524,10 @@ static int handle_fragments(struct net *net, struct sw_flow_key *key, >> > return -EPFNOSUPPORT; >> > } >> > >> > + /* The key extracted from the fragment that completed this datagram >> > + * likely didn't have an L4 header, so regenerate it. */ >> > + ovs_flow_key_update(skb, key); >> > + >> > key->ip.frag = OVS_FRAG_TYPE_NONE; >> > skb_clear_hash(skb); >> > skb->ignore_df = 1; >> > -- >> >> Looks good to me. >> >> Acked-by: Pravin B Shelar <pshelar@ovn.org> >> > Actually I am not sure about this change. caller of this function > (ovs_ct_execute()) does skb-pull and push of L2 header, calling > ovs_flow_key_update() is not safe here, it expect skb data to point to > L2 header. Agreed, also the comment needs to be formatted properly ala: /* blah * blah */ instead of: /* blah * blah */
> On Aug 25, 2019, at 1:40 PM, Pravin Shelar <pshelar@ovn.org> wrote: > > Actually I am not sure about this change. caller of this function > (ovs_ct_execute()) does skb-pull and push of L2 header, calling > ovs_flow_key_update() is not safe here, it expect skb data to point to > L2 header. Thanks for the feedback, Pravin and David. Greg Rose has a revised version that will address the issues you raised and also make it so that we don't bother re-extracting the L2 headers. He'll hopefully get that out today once we've done some internal testing on it. --Justin
diff --git a/net/openvswitch/conntrack.c b/net/openvswitch/conntrack.c index 848c6eb55064..f40ad2a42086 100644 --- a/net/openvswitch/conntrack.c +++ b/net/openvswitch/conntrack.c @@ -524,6 +524,10 @@ static int handle_fragments(struct net *net, struct sw_flow_key *key, return -EPFNOSUPPORT; } + /* The key extracted from the fragment that completed this datagram + * likely didn't have an L4 header, so regenerate it. */ + ovs_flow_key_update(skb, key); + key->ip.frag = OVS_FRAG_TYPE_NONE; skb_clear_hash(skb); skb->ignore_df = 1;
When IP fragments are reassembled before being sent to conntrack, the key from the last fragment is used. Unless there are reordering issues, the last fragment received will not contain the L4 ports, so the key for the reassembled datagram won't contain them. This patch updates the key once we have a reassembled datagram. Signed-off-by: Justin Pettit <jpettit@ovn.org> --- net/openvswitch/conntrack.c | 4 ++++ 1 file changed, 4 insertions(+)