net/sched: act_api: fix miss set post_ct for ovs after do conntrack in act_ct
When openvswitch conntrack offload with act_ct action. The first rule
do conntrack in the act_ct in tc subsystem. And miss the next rule in
the tc and fallback to the ovs datapath but miss set post_ct flag
which will lead the ct_state_key with -trk flag.
Fixes: 7baf2429a1
("net/sched: cls_flower add CT_FLAGS_INVALID flag support")
Signed-off-by: wenxu <wenxu@ucloud.cn>
Reviewed-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
ce225298a0
commit
d29334c15d
|
@ -285,6 +285,7 @@ struct nf_bridge_info {
|
||||||
struct tc_skb_ext {
|
struct tc_skb_ext {
|
||||||
__u32 chain;
|
__u32 chain;
|
||||||
__u16 mru;
|
__u16 mru;
|
||||||
|
bool post_ct;
|
||||||
};
|
};
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
|
@ -271,9 +271,11 @@ static void ovs_ct_update_key(const struct sk_buff *skb,
|
||||||
/* This is called to initialize CT key fields possibly coming in from the local
|
/* This is called to initialize CT key fields possibly coming in from the local
|
||||||
* stack.
|
* stack.
|
||||||
*/
|
*/
|
||||||
void ovs_ct_fill_key(const struct sk_buff *skb, struct sw_flow_key *key)
|
void ovs_ct_fill_key(const struct sk_buff *skb,
|
||||||
|
struct sw_flow_key *key,
|
||||||
|
bool post_ct)
|
||||||
{
|
{
|
||||||
ovs_ct_update_key(skb, NULL, key, false, false);
|
ovs_ct_update_key(skb, NULL, key, post_ct, false);
|
||||||
}
|
}
|
||||||
|
|
||||||
int ovs_ct_put_key(const struct sw_flow_key *swkey,
|
int ovs_ct_put_key(const struct sw_flow_key *swkey,
|
||||||
|
@ -1332,7 +1334,7 @@ int ovs_ct_clear(struct sk_buff *skb, struct sw_flow_key *key)
|
||||||
if (skb_nfct(skb)) {
|
if (skb_nfct(skb)) {
|
||||||
nf_conntrack_put(skb_nfct(skb));
|
nf_conntrack_put(skb_nfct(skb));
|
||||||
nf_ct_set(skb, NULL, IP_CT_UNTRACKED);
|
nf_ct_set(skb, NULL, IP_CT_UNTRACKED);
|
||||||
ovs_ct_fill_key(skb, key);
|
ovs_ct_fill_key(skb, key, false);
|
||||||
}
|
}
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
|
|
|
@ -25,7 +25,8 @@ int ovs_ct_execute(struct net *, struct sk_buff *, struct sw_flow_key *,
|
||||||
const struct ovs_conntrack_info *);
|
const struct ovs_conntrack_info *);
|
||||||
int ovs_ct_clear(struct sk_buff *skb, struct sw_flow_key *key);
|
int ovs_ct_clear(struct sk_buff *skb, struct sw_flow_key *key);
|
||||||
|
|
||||||
void ovs_ct_fill_key(const struct sk_buff *skb, struct sw_flow_key *key);
|
void ovs_ct_fill_key(const struct sk_buff *skb, struct sw_flow_key *key,
|
||||||
|
bool post_ct);
|
||||||
int ovs_ct_put_key(const struct sw_flow_key *swkey,
|
int ovs_ct_put_key(const struct sw_flow_key *swkey,
|
||||||
const struct sw_flow_key *output, struct sk_buff *skb);
|
const struct sw_flow_key *output, struct sk_buff *skb);
|
||||||
void ovs_ct_free_action(const struct nlattr *a);
|
void ovs_ct_free_action(const struct nlattr *a);
|
||||||
|
@ -74,7 +75,8 @@ static inline int ovs_ct_clear(struct sk_buff *skb,
|
||||||
}
|
}
|
||||||
|
|
||||||
static inline void ovs_ct_fill_key(const struct sk_buff *skb,
|
static inline void ovs_ct_fill_key(const struct sk_buff *skb,
|
||||||
struct sw_flow_key *key)
|
struct sw_flow_key *key,
|
||||||
|
bool post_ct)
|
||||||
{
|
{
|
||||||
key->ct_state = 0;
|
key->ct_state = 0;
|
||||||
key->ct_zone = 0;
|
key->ct_zone = 0;
|
||||||
|
|
|
@ -857,6 +857,7 @@ int ovs_flow_key_extract(const struct ip_tunnel_info *tun_info,
|
||||||
#if IS_ENABLED(CONFIG_NET_TC_SKB_EXT)
|
#if IS_ENABLED(CONFIG_NET_TC_SKB_EXT)
|
||||||
struct tc_skb_ext *tc_ext;
|
struct tc_skb_ext *tc_ext;
|
||||||
#endif
|
#endif
|
||||||
|
bool post_ct = false;
|
||||||
int res, err;
|
int res, err;
|
||||||
|
|
||||||
/* Extract metadata from packet. */
|
/* Extract metadata from packet. */
|
||||||
|
@ -895,6 +896,7 @@ int ovs_flow_key_extract(const struct ip_tunnel_info *tun_info,
|
||||||
tc_ext = skb_ext_find(skb, TC_SKB_EXT);
|
tc_ext = skb_ext_find(skb, TC_SKB_EXT);
|
||||||
key->recirc_id = tc_ext ? tc_ext->chain : 0;
|
key->recirc_id = tc_ext ? tc_ext->chain : 0;
|
||||||
OVS_CB(skb)->mru = tc_ext ? tc_ext->mru : 0;
|
OVS_CB(skb)->mru = tc_ext ? tc_ext->mru : 0;
|
||||||
|
post_ct = tc_ext ? tc_ext->post_ct : false;
|
||||||
} else {
|
} else {
|
||||||
key->recirc_id = 0;
|
key->recirc_id = 0;
|
||||||
}
|
}
|
||||||
|
@ -904,7 +906,7 @@ int ovs_flow_key_extract(const struct ip_tunnel_info *tun_info,
|
||||||
|
|
||||||
err = key_extract(skb, key);
|
err = key_extract(skb, key);
|
||||||
if (!err)
|
if (!err)
|
||||||
ovs_ct_fill_key(skb, key); /* Must be after key_extract(). */
|
ovs_ct_fill_key(skb, key, post_ct); /* Must be after key_extract(). */
|
||||||
return err;
|
return err;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -1629,6 +1629,7 @@ int tcf_classify_ingress(struct sk_buff *skb,
|
||||||
return TC_ACT_SHOT;
|
return TC_ACT_SHOT;
|
||||||
ext->chain = last_executed_chain;
|
ext->chain = last_executed_chain;
|
||||||
ext->mru = qdisc_skb_cb(skb)->mru;
|
ext->mru = qdisc_skb_cb(skb)->mru;
|
||||||
|
ext->post_ct = qdisc_skb_cb(skb)->post_ct;
|
||||||
}
|
}
|
||||||
|
|
||||||
return ret;
|
return ret;
|
||||||
|
|
Loading…
Reference in New Issue