From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Miller Subject: Re: [PATCH next 0/2] ipvlan: packet scrub Date: Fri, 15 Dec 2017 11:37:14 -0500 (EST) Message-ID: <20171215.113714.411085018538590697.davem@davemloft.net> References: <20171213224012.202819-1-mahesh@bandewar.net> Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Cc: netdev@vger.kernel.org, edumazet@google.com, maheshb@google.com To: mahesh@bandewar.net Return-path: Received: from shards.monkeyblade.net ([184.105.139.130]:52814 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756783AbdLOQhQ (ORCPT ); Fri, 15 Dec 2017 11:37:16 -0500 In-Reply-To: <20171213224012.202819-1-mahesh@bandewar.net> Sender: netdev-owner@vger.kernel.org List-ID: From: Mahesh Bandewar Date: Wed, 13 Dec 2017 14:40:12 -0800 > From: Mahesh Bandewar > > While crossing namespace boundary IPvlan aggressively scrubs packets. > This is creating problems. First thing is that scrubbing changes the > packet type in skb meta-data to PACKET_HOST. This causes erroneous > packet delivery when dev_forward_skb() has already marked the packet > type as OTHER_HOST. > > On the egress side scrubbing just before calling dev_queue_xmit() > creates another set of problems. Scrubbing remove skb->sk so the > prio update gets missed and more seriously, socket back-pressure > fails making TSQ not function correctly. > > The first patch in the series just reverts the earlier change which > was adding a mac-check, but that is unnecessary if packet_type that > dev_forward_skb() has set is honored. The second path removes two of > the scrubs which are causing problems described above. Series applied, thanks for following up on this.