netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH net] bridge: notify user space after fdb update
@ 2014-05-27 22:45 Jon Maxwell
  2014-05-28 14:19 ` Sergei Shtylyov
  2014-05-28 15:02 ` Vlad Yasevich
  0 siblings, 2 replies; 8+ messages in thread
From: Jon Maxwell @ 2014-05-27 22:45 UTC (permalink / raw)
  To: stephen
  Cc: davem, makita.toshiaki, vyasevic, bridge, netdev, linux-kernel,
	jpirko, jmaxwell37, jmaxwell

There has been a number incidents recently where customers running KVM have
reported that VM hosts on different Hypervisors are unreachable. Based on
pcap traces we found that the bridge was broadcasting the ARP request out
onto the network. However some NICs have an inbuilt switch which on occasions
were broadcasting the VMs ARP request back through the physical NIC on the
Hypervisor. This resulted in the bridge changing ports and incorrectly learning
that the VMs mac address was external. As a result the ARP reply was directed
back onto the external network and VM never updated it's ARP cache. This patch
will notify the bridge command, after a fdb has been updated to identify such
port toggling.

Signed-off-by: Jon Maxwell <jmaxwell37@gmail.com>
---
 net/bridge/br_fdb.c | 8 +++++++-
 1 file changed, 7 insertions(+), 1 deletion(-)

diff --git a/net/bridge/br_fdb.c b/net/bridge/br_fdb.c
index 9203d5a..f3ee2da 100644
--- a/net/bridge/br_fdb.c
+++ b/net/bridge/br_fdb.c
@@ -487,6 +487,7 @@ void br_fdb_update(struct net_bridge *br, struct net_bridge_port *source,
 {
 	struct hlist_head *head = &br->hash[br_mac_hash(addr, vid)];
 	struct net_bridge_fdb_entry *fdb;
+	bool fdb_modified = 0;
 
 	/* some users want to always flood. */
 	if (hold_time(br) == 0)
@@ -507,10 +508,15 @@ void br_fdb_update(struct net_bridge *br, struct net_bridge_port *source,
 					source->dev->name);
 		} else {
 			/* fastpath: update of existing entry */
-			fdb->dst = source;
+			if (unlikely(source != fdb->dst)) {
+					fdb->dst = source;
+					fdb_modified = 1;
+				}
 			fdb->updated = jiffies;
 			if (unlikely(added_by_user))
 				fdb->added_by_user = 1;
+			if (unlikely(fdb_modified))
+				fdb_notify(br, fdb, RTM_NEWNEIGH);
 		}
 	} else {
 		spin_lock(&br->hash_lock);
-- 
1.8.3.1

^ permalink raw reply related	[flat|nested] 8+ messages in thread

* Re: [PATCH net] bridge: notify user space after fdb update
  2014-05-27 22:45 [PATCH net] bridge: notify user space after fdb update Jon Maxwell
@ 2014-05-28 14:19 ` Sergei Shtylyov
  2014-05-28 15:02 ` Vlad Yasevich
  1 sibling, 0 replies; 8+ messages in thread
From: Sergei Shtylyov @ 2014-05-28 14:19 UTC (permalink / raw)
  To: Jon Maxwell, stephen
  Cc: vyasevic, jpirko, netdev, jmaxwell, bridge, linux-kernel, davem

Hello.

On 05/28/2014 02:45 AM, Jon Maxwell wrote:

> There has been a number incidents recently where customers running KVM have
> reported that VM hosts on different Hypervisors are unreachable. Based on
> pcap traces we found that the bridge was broadcasting the ARP request out
> onto the network. However some NICs have an inbuilt switch which on occasions
> were broadcasting the VMs ARP request back through the physical NIC on the
> Hypervisor. This resulted in the bridge changing ports and incorrectly learning
> that the VMs mac address was external. As a result the ARP reply was directed
> back onto the external network and VM never updated it's ARP cache. This patch
> will notify the bridge command, after a fdb has been updated to identify such
> port toggling.

> Signed-off-by: Jon Maxwell <jmaxwell37@gmail.com>
> ---
>   net/bridge/br_fdb.c | 8 +++++++-
>   1 file changed, 7 insertions(+), 1 deletion(-)

> diff --git a/net/bridge/br_fdb.c b/net/bridge/br_fdb.c
> index 9203d5a..f3ee2da 100644
> --- a/net/bridge/br_fdb.c
> +++ b/net/bridge/br_fdb.c
> @@ -487,6 +487,7 @@ void br_fdb_update(struct net_bridge *br, struct net_bridge_port *source,
>   {
>   	struct hlist_head *head = &br->hash[br_mac_hash(addr, vid)];
>   	struct net_bridge_fdb_entry *fdb;
> +	bool fdb_modified = 0;

    s/0/false/.

>
>   	/* some users want to always flood. */
>   	if (hold_time(br) == 0)
> @@ -507,10 +508,15 @@ void br_fdb_update(struct net_bridge *br, struct net_bridge_port *source,
>   					source->dev->name);
>   		} else {
>   			/* fastpath: update of existing entry */
> -			fdb->dst = source;
> +			if (unlikely(source != fdb->dst)) {
> +					fdb->dst = source;
> +					fdb_modified = 1;

   s/1/true/.

> +				}
>   			fdb->updated = jiffies;
>   			if (unlikely(added_by_user))
>   				fdb->added_by_user = 1;
> +			if (unlikely(fdb_modified))
> +				fdb_notify(br, fdb, RTM_NEWNEIGH);
>   		}
>   	} else {
>   		spin_lock(&br->hash_lock);

WBR, Sergei

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH net] bridge: notify user space after fdb update
  2014-05-27 22:45 [PATCH net] bridge: notify user space after fdb update Jon Maxwell
  2014-05-28 14:19 ` Sergei Shtylyov
@ 2014-05-28 15:02 ` Vlad Yasevich
  1 sibling, 0 replies; 8+ messages in thread
From: Vlad Yasevich @ 2014-05-28 15:02 UTC (permalink / raw)
  To: Jon Maxwell, stephen
  Cc: jpirko, netdev, jmaxwell, bridge, linux-kernel, davem

On 05/27/2014 06:45 PM, Jon Maxwell wrote:
> There has been a number incidents recently where customers running KVM have
> reported that VM hosts on different Hypervisors are unreachable. Based on
> pcap traces we found that the bridge was broadcasting the ARP request out
> onto the network. However some NICs have an inbuilt switch which on occasions
> were broadcasting the VMs ARP request back through the physical NIC on the
> Hypervisor. This resulted in the bridge changing ports and incorrectly learning
> that the VMs mac address was external. As a result the ARP reply was directed
> back onto the external network and VM never updated it's ARP cache. This patch
> will notify the bridge command, after a fdb has been updated to identify such
> port toggling.
> 
> Signed-off-by: Jon Maxwell <jmaxwell37@gmail.com>
> ---
>  net/bridge/br_fdb.c | 8 +++++++-
>  1 file changed, 7 insertions(+), 1 deletion(-)
> 
> diff --git a/net/bridge/br_fdb.c b/net/bridge/br_fdb.c
> index 9203d5a..f3ee2da 100644
> --- a/net/bridge/br_fdb.c
> +++ b/net/bridge/br_fdb.c
> @@ -487,6 +487,7 @@ void br_fdb_update(struct net_bridge *br, struct net_bridge_port *source,
>  {
>  	struct hlist_head *head = &br->hash[br_mac_hash(addr, vid)];
>  	struct net_bridge_fdb_entry *fdb;
> +	bool fdb_modified = 0;
>  
>  	/* some users want to always flood. */
>  	if (hold_time(br) == 0)
> @@ -507,10 +508,15 @@ void br_fdb_update(struct net_bridge *br, struct net_bridge_port *source,
>  					source->dev->name);
>  		} else {
>  			/* fastpath: update of existing entry */
> -			fdb->dst = source;
> +			if (unlikely(source != fdb->dst)) {
> +					fdb->dst = source;
> +					fdb_modified = 1;
> +				}

This looks over-indented.

-vlad

>  			fdb->updated = jiffies;
>  			if (unlikely(added_by_user))
>  				fdb->added_by_user = 1;
> +			if (unlikely(fdb_modified))
> +				fdb_notify(br, fdb, RTM_NEWNEIGH);
>  		}
>  	} else {
>  		spin_lock(&br->hash_lock);
> 

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH net] bridge: notify user space after fdb update
  2014-05-29  7:27 Jon Maxwell
                   ` (2 preceding siblings ...)
  2014-05-30 14:32 ` Stephen Hemminger
@ 2014-06-02  5:15 ` David Miller
  3 siblings, 0 replies; 8+ messages in thread
From: David Miller @ 2014-06-02  5:15 UTC (permalink / raw)
  To: jmaxwell37
  Cc: vyasevic, jpirko, netdev, jmaxwell, bridge, linux-kernel, stephen

From: Jon Maxwell <jmaxwell37@gmail.com>
Date: Thu, 29 May 2014 17:27:16 +1000

> There has been a number incidents recently where customers running KVM have
> reported that VM hosts on different Hypervisors are unreachable. Based on
> pcap traces we found that the bridge was broadcasting the ARP request out
> onto the network. However some NICs have an inbuilt switch which on occasions
> were broadcasting the VMs ARP request back through the physical NIC on the
> Hypervisor. This resulted in the bridge changing ports and incorrectly learning
> that the VMs mac address was external. As a result the ARP reply was directed
> back onto the external network and VM never updated it's ARP cache. This patch
> will notify the bridge command, after a fdb has been updated to identify such
> port toggling.
> 
> Signed-off-by: Jon Maxwell <jmaxwell37@gmail.com>

Applied, thanks.

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH net] bridge: notify user space after fdb update
  2014-05-29  7:27 Jon Maxwell
  2014-05-29  7:55 ` Jiri Pirko
  2014-05-29  9:15 ` Toshiaki Makita
@ 2014-05-30 14:32 ` Stephen Hemminger
  2014-06-02  5:15 ` David Miller
  3 siblings, 0 replies; 8+ messages in thread
From: Stephen Hemminger @ 2014-05-30 14:32 UTC (permalink / raw)
  To: Jon Maxwell
  Cc: vyasevic, jpirko, netdev, jmaxwell, bridge, linux-kernel, davem

On Thu, 29 May 2014 17:27:16 +1000
Jon Maxwell <jmaxwell37@gmail.com> wrote:

> There has been a number incidents recently where customers running KVM have
> reported that VM hosts on different Hypervisors are unreachable. Based on
> pcap traces we found that the bridge was broadcasting the ARP request out
> onto the network. However some NICs have an inbuilt switch which on occasions
> were broadcasting the VMs ARP request back through the physical NIC on the
> Hypervisor. This resulted in the bridge changing ports and incorrectly learning
> that the VMs mac address was external. As a result the ARP reply was directed
> back onto the external network and VM never updated it's ARP cache. This patch
> will notify the bridge command, after a fdb has been updated to identify such
> port toggling.
> 
> Signed-off-by: Jon Maxwell <jmaxwell37@gmail.com>

Acked-by: Stephen Hemminger <stephen@networkplumber.org>

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH net] bridge: notify user space after fdb update
  2014-05-29  7:27 Jon Maxwell
  2014-05-29  7:55 ` Jiri Pirko
@ 2014-05-29  9:15 ` Toshiaki Makita
  2014-05-30 14:32 ` Stephen Hemminger
  2014-06-02  5:15 ` David Miller
  3 siblings, 0 replies; 8+ messages in thread
From: Toshiaki Makita @ 2014-05-29  9:15 UTC (permalink / raw)
  To: Jon Maxwell, stephen
  Cc: vyasevic, jpirko, netdev, jmaxwell, bridge, linux-kernel, davem

(2014/05/29 16:27), Jon Maxwell wrote:
> There has been a number incidents recently where customers running KVM have
> reported that VM hosts on different Hypervisors are unreachable. Based on
> pcap traces we found that the bridge was broadcasting the ARP request out
> onto the network. However some NICs have an inbuilt switch which on occasions
> were broadcasting the VMs ARP request back through the physical NIC on the
> Hypervisor. This resulted in the bridge changing ports and incorrectly learning
> that the VMs mac address was external. As a result the ARP reply was directed
> back onto the external network and VM never updated it's ARP cache. This patch
> will notify the bridge command, after a fdb has been updated to identify such
> port toggling.
> 
> Signed-off-by: Jon Maxwell <jmaxwell37@gmail.com>

Acked-by: Toshiaki Makita <makita.toshiaki@lab.ntt.co.jp>

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH net] bridge: notify user space after fdb update
  2014-05-29  7:27 Jon Maxwell
@ 2014-05-29  7:55 ` Jiri Pirko
  2014-05-29  9:15 ` Toshiaki Makita
                   ` (2 subsequent siblings)
  3 siblings, 0 replies; 8+ messages in thread
From: Jiri Pirko @ 2014-05-29  7:55 UTC (permalink / raw)
  To: Jon Maxwell
  Cc: stephen, davem, makita.toshiaki, vyasevic, bridge, netdev,
	linux-kernel, jpirko, jmaxwell

Thu, May 29, 2014 at 09:27:16AM CEST, jmaxwell37@gmail.com wrote:
>There has been a number incidents recently where customers running KVM have
>reported that VM hosts on different Hypervisors are unreachable. Based on
>pcap traces we found that the bridge was broadcasting the ARP request out
>onto the network. However some NICs have an inbuilt switch which on occasions
>were broadcasting the VMs ARP request back through the physical NIC on the
>Hypervisor. This resulted in the bridge changing ports and incorrectly learning
>that the VMs mac address was external. As a result the ARP reply was directed
>back onto the external network and VM never updated it's ARP cache. This patch
>will notify the bridge command, after a fdb has been updated to identify such
>port toggling.
>
>Signed-off-by: Jon Maxwell <jmaxwell37@gmail.com>

Reviewed-by: Jiri Pirko <jiri@resnulli.us>

^ permalink raw reply	[flat|nested] 8+ messages in thread

* [PATCH net] bridge: notify user space after fdb update
@ 2014-05-29  7:27 Jon Maxwell
  2014-05-29  7:55 ` Jiri Pirko
                   ` (3 more replies)
  0 siblings, 4 replies; 8+ messages in thread
From: Jon Maxwell @ 2014-05-29  7:27 UTC (permalink / raw)
  To: stephen
  Cc: davem, makita.toshiaki, vyasevic, bridge, netdev, linux-kernel,
	jpirko, jmaxwell, jmaxwell37

There has been a number incidents recently where customers running KVM have
reported that VM hosts on different Hypervisors are unreachable. Based on
pcap traces we found that the bridge was broadcasting the ARP request out
onto the network. However some NICs have an inbuilt switch which on occasions
were broadcasting the VMs ARP request back through the physical NIC on the
Hypervisor. This resulted in the bridge changing ports and incorrectly learning
that the VMs mac address was external. As a result the ARP reply was directed
back onto the external network and VM never updated it's ARP cache. This patch
will notify the bridge command, after a fdb has been updated to identify such
port toggling.

Signed-off-by: Jon Maxwell <jmaxwell37@gmail.com>
---
 net/bridge/br_fdb.c | 8 +++++++-
 1 file changed, 7 insertions(+), 1 deletion(-)

diff --git a/net/bridge/br_fdb.c b/net/bridge/br_fdb.c
index 9203d5a..474d36f 100644
--- a/net/bridge/br_fdb.c
+++ b/net/bridge/br_fdb.c
@@ -487,6 +487,7 @@ void br_fdb_update(struct net_bridge *br, struct net_bridge_port *source,
 {
 	struct hlist_head *head = &br->hash[br_mac_hash(addr, vid)];
 	struct net_bridge_fdb_entry *fdb;
+	bool fdb_modified = false;
 
 	/* some users want to always flood. */
 	if (hold_time(br) == 0)
@@ -507,10 +508,15 @@ void br_fdb_update(struct net_bridge *br, struct net_bridge_port *source,
 					source->dev->name);
 		} else {
 			/* fastpath: update of existing entry */
-			fdb->dst = source;
+			if (unlikely(source != fdb->dst)) {
+				fdb->dst = source;
+				fdb_modified = true;
+			}
 			fdb->updated = jiffies;
 			if (unlikely(added_by_user))
 				fdb->added_by_user = 1;
+			if (unlikely(fdb_modified))
+				fdb_notify(br, fdb, RTM_NEWNEIGH);
 		}
 	} else {
 		spin_lock(&br->hash_lock);
-- 
1.8.3.1

^ permalink raw reply related	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2014-06-02  5:15 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-05-27 22:45 [PATCH net] bridge: notify user space after fdb update Jon Maxwell
2014-05-28 14:19 ` Sergei Shtylyov
2014-05-28 15:02 ` Vlad Yasevich
2014-05-29  7:27 Jon Maxwell
2014-05-29  7:55 ` Jiri Pirko
2014-05-29  9:15 ` Toshiaki Makita
2014-05-30 14:32 ` Stephen Hemminger
2014-06-02  5:15 ` David Miller

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).