[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20170425091022.GB2930@salvia>
Date: Tue, 25 Apr 2017 11:10:22 +0200
From: Pablo Neira Ayuso <pablo@...filter.org>
To: Linus Lüssing <linus.luessing@...3.blue>
Cc: netdev@...r.kernel.org, "David S . Miller" <davem@...emloft.net>,
Stephen Hemminger <stephen@...workplumber.org>,
Jozsef Kadlecsik <kadlec@...ckhole.kfki.hu>,
bridge@...ts.linux-foundation.org, netfilter-devel@...r.kernel.org,
coreteam@...filter.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH net v3] bridge: ebtables: fix reception of frames DNAT-ed
to bridge device/port
On Wed, Apr 19, 2017 at 09:47:33PM +0200, Linus Lüssing wrote:
> When trying to redirect bridged frames to the bridge device itself or
> a bridge port (brouting) via the dnat target then this currently fails:
>
> The ethernet destination of the frame is dnat'ed to the MAC address of
> the bridge device or port just fine. However, the IP code drops it in
> the beginning of ip_input.c/ip_rcv() as the dnat target left
> the skb->pkt_type as PACKET_OTHERHOST.
>
> Fixing this by resetting skb->pkt_type to an appropriate type after
> dnat'ing.
Applied, thanks.
One comment below.
> @@ -18,11 +19,32 @@ static unsigned int
> ebt_dnat_tg(struct sk_buff *skb, const struct xt_action_param *par)
> {
> const struct ebt_nat_info *info = par->targinfo;
> + struct net_device *dev;
>
> if (!skb_make_writable(skb, 0))
> return EBT_DROP;
>
> ether_addr_copy(eth_hdr(skb)->h_dest, info->mac);
> +
> + if (is_multicast_ether_addr(info->mac)) {
> + if (is_broadcast_ether_addr(info->mac))
> + skb->pkt_type = PACKET_BROADCAST;
> + else
> + skb->pkt_type = PACKET_MULTICAST;
> + } else {
> + rcu_read_lock();
I'm going to manually remove this explicit rcu_read_lock() here, no
need to resend. We're guaranteed to run from packet path with read
side lock from netfilter hooks. So we just save some cycles from
running this unnecessary nesting.
Let me know if I'm missing anything. Thanks!
Powered by blists - more mailing lists