lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <50AB447E.3010904@oracle.com>
Date:	Tue, 20 Nov 2012 16:51:10 +0800
From:	"zheng.li" <zheng.x.li@...cle.com>
To:	Jay Vosburgh <fubar@...ibm.com>
CC:	netdev@...r.kernel.org, andy@...yhouse.net,
	linux-kernel@...r.kernel.org, davem@...emloft.net,
	joe.jin@...cle.com
Subject: Re: [PATCH] bonding: rlb mode of bond should not alter ARP originating
 via bridge

After i applied my prior patch to the latest kernel and tested ,i change
the patch as this. The prior patch is running ok on 2.6.32,but after
2.6.32 it runs no effect ,it still cause domu(which arp through bridge
via bonding) network intermittently unreachable. I found the reason is
that the alb_monitor of bonding(after 2.6.32) send unicast arp reply
which using rlb_client_info's assigned slave's MAC,so cause peer host
update arp cache of domu with wrong MAC to cause domu unreachable again.
The rlb_client_info is created when rlb_arp_xmit sending ARP request.
rlb_client_info contain local IP with assigned
slave,it will cause all local ip's ARP use slave's mac by
rlb_update_client function.

Bug reproduced rate: 100%.

So i change the patch also affect the ARP request to don't through rlb
to no create rlb_client_info. Applied the new patch on the latest
version,it runs ok.

So,the patch should affect ARP request and reply to work well.

bond_alb_monitor -> rlb_update_rx_clients --> rlb_update_client

rlb_update_client(struct rlb_client_info *client_info)
{
   for (i = 0; i < RLB_ARP_BURST_SIZE; i++) {
		struct sk_buff *skb;

		skb = arp_create(ARPOP_REPLY, ETH_P_ARP,
                                //peer host's IP
				 client_info->ip_dst,
				 client_info->slave->dev,
                                //Domu 's IP
				 client_info->ip_src,
                          //peer host's MAC which be set in rlb_arp_recv
				 client_info->mac_dst,
//use slave's MAC to send unicast arp reply to peer ,so cause peer host
//update MAC of domu with wrong mac address.
				 client_info->slave->dev->dev_addr,
				 client_info->mac_dst);
.......
}

Thanks
Zheng Li


> Zheng Li <zheng.x.li@...cle.com> wrote:
> 
>> ARP traffic passing through a bridge and out via the bond (when the bond is a 
>> port of the bridge) should not have its source MAC address adjusted by the 
>> receive load balance code in rlb_arp_xmit.
> 
> 	This patch differs from prior versions in that it does more than
> what's described here; it also disables the receive load balance logic
> for any ARPs (request or reply) that are passing through the bond (not
> of local origin).  For ARP replies, that's mostly harmless, as the ARPs
> passing through will simply always be sent from one particular slave
> (the active slave) instead of being balanced.
> 
> 	For ARP requests, though, they are already always sent via the
> active slave, but there is also some logic in rlb_arp_xmit to limit the
> side effects from the broadcast ARP, in particular this part:
> 
> 		/* The ARP reply packets must be delayed so that
> 		 * they can cancel out the influence of the ARP request.
> 		 */
> 		bond->alb_info.rlb_update_delay_counter = RLB_UPDATE_DELAY;
> 
> 		/* arp requests are broadcast and are sent on the primary
> 		 * the arp request will collapse all clients on the subnet to
> 		 * the primary slave. We must register these clients to be
> 		 * updated with their assigned mac.
> 		 */
> 		rlb_req_update_subnet_clients(bond, arp->ip_src);
> 
> 	that arranges for clients to be given ARP updates for their
> slave assignments (which may change to the active slave, due to the ARP
> broadcast being sent via the active slave).
> 
> 	I think the ARP reply side of this is fine (and is what is
> described in teh changelog), but the ARP request behavior change is new
> with this version.
> 
> 	Since prior versions of the patch didn't cause this code to be
> skipped, is this change intentional?
> 
> 	Did you check to see if the above logic is necessary for ARP
> requests passing through via a bridge to prevent peers from "stacking"
> (in terms of load balance assignment) on the active slave due to bridged
> ARP traffic?
> 
> 	-J
> 
>> Signed-off-by: Zheng Li <zheng.x.li@...cle.com>
>> Cc: Jay Vosburgh <fubar@...ibm.com>
>> Cc: Andy Gospodarek <andy@...yhouse.net>
>> Cc: "David S. Miller" <davem@...emloft.net>
>>
>> ---
>> drivers/net/bonding/bond_alb.c |    6 ++++++
>> drivers/net/bonding/bonding.h  |   13 +++++++++++++
>> 2 files changed, 19 insertions(+), 0 deletions(-)
>>
>> diff --git a/drivers/net/bonding/bond_alb.c b/drivers/net/bonding/bond_alb.c
>> index e15cc11..75f6f0d 100644
>> --- a/drivers/net/bonding/bond_alb.c
>> +++ b/drivers/net/bonding/bond_alb.c
>> @@ -694,6 +694,12 @@ static struct slave *rlb_arp_xmit(struct sk_buff *skb, struct bonding *bond)
>> 	struct arp_pkt *arp = arp_pkt(skb);
>> 	struct slave *tx_slave = NULL;
>>
>> +	/* Only modify ARP's MAC if it originates locally;
>> +	 * don't change ARPs arriving via a bridge.
>> +	 */
>> +	if (!bond_slave_has_mac(bond, arp->mac_src))
>> +		return NULL;
>> +
>> 	if (arp->op_code == htons(ARPOP_REPLY)) {
>> 		/* the arp must be sent on the selected
>> 		* rx channel
>> diff --git a/drivers/net/bonding/bonding.h b/drivers/net/bonding/bonding.h
>> index f8af2fc..6dded56 100644
>> --- a/drivers/net/bonding/bonding.h
>> +++ b/drivers/net/bonding/bonding.h
>> @@ -22,6 +22,7 @@
>> #include <linux/in6.h>
>> #include <linux/netpoll.h>
>> #include <linux/inetdevice.h>
>> +#include <linux/etherdevice.h>
>> #include "bond_3ad.h"
>> #include "bond_alb.h"
>>
>> @@ -450,6 +451,18 @@ static inline void bond_destroy_proc_dir(struct bond_net *bn)
>> }
>> #endif
>>
>> +static inline struct slave *bond_slave_has_mac(struct bonding *bond,
>> +					       const u8 *mac)
>> +{
>> +	int i = 0;
>> +	struct slave *tmp;
>> +
>> +	bond_for_each_slave(bond, tmp, i)
>> +		if (ether_addr_equal_64bits(mac, tmp->dev->dev_addr))
>> +			return tmp;
>> +
>> +	return NULL;
>> +}
>>
>> /* exported from bond_main.c */
>> extern int bond_net_id;
>> -- 
>> 1.7.6.5
> 
> ---
> 	-Jay Vosburgh, IBM Linux Technology Center, fubar@...ibm.com
> 


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ