-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BPF] send RST to midflow TCP packets from unknown streams #8933
Open
tomastigera
wants to merge
2
commits into
projectcalico:master
Choose a base branch
from
tomastigera:tomas-bpf-spoof-tests
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
[BPF] send RST to midflow TCP packets from unknown streams #8933
tomastigera
wants to merge
2
commits into
projectcalico:master
from
tomastigera:tomas-bpf-spoof-tests
+112
−6
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
marvin-tigera
added
release-note-required
Change has user-facing impact (no matter how small)
docs-pr-required
Change is not yet documented
labels
Jun 20, 2024
tomastigera
changed the title
[BPF] send RST to midflow TCp packets from unknown streams
[BPF] send RST to midflow TCP packets from unknown streams
Jun 20, 2024
tomastigera
force-pushed
the
tomas-bpf-spoof-tests
branch
3 times, most recently
from
June 25, 2024 07:25
22554ca
to
546e370
Compare
fasaxc
requested changes
Jun 25, 2024
iptables.Rule{ | ||
Match: iptables.Match().MarkMatchesWithMask(tcdefs.MarkSeenFallThrough, tcdefs.MarkSeenFallThroughMask), | ||
Comment: []string{fmt.Sprintf("%s packets from unknown flows.", d.ruleRenderer.IptablesFilterDenyAction())}, | ||
Comment: []string{fmt.Sprintf("%s packets from unknown TCP flows.", d.ruleRenderer.IptablesFilterDenyAction())}, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Suggested change
Comment: []string{fmt.Sprintf("%s packets from unknown TCP flows.", d.ruleRenderer.IptablesFilterDenyAction())}, | |
Comment: []string{fmt.Sprintf("%s packets from unknown non-TCP flows.", d.ruleRenderer.IptablesFilterDenyAction())}, |
tomastigera
force-pushed
the
tomas-bpf-spoof-tests
branch
from
June 25, 2024 12:12
546e370
to
193638f
Compare
For a smooth switch from iptables to ebpf mode, we do not want to interrupt existing connections. If we see midflow packets, we pass them to the host stack. If the stack can verify that they belong to an existing conntrack, we let them through and we learn the conntrack. We drop the rest. However, there are some situations when we can see a stray TCP packet during ebpf mode, for instance when a pod dies and ECMP kicks in and sends a packet to a different host. If such a packet gets dropped, the end of the connections remains stuck. This change sends an RST to such a stream instead of just dropping the packets so that the end host can break the connection. Fixes projectcalico#8882
tomastigera
force-pushed
the
tomas-bpf-spoof-tests
branch
from
June 28, 2024 10:53
193638f
to
05a2b7c
Compare
only a single unrelated failure fixed here #8952 |
fasaxc
approved these changes
Jun 28, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
docs-pr-required
Change is not yet documented
release-note-required
Change has user-facing impact (no matter how small)
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
Fixes #8882
Related issues/PRs
Todos
Release Note
Reminder for the reviewer
Make sure that this PR has the correct labels and milestone set.
Every PR needs one
docs-*
label.docs-pr-required
: This change requires a change to the documentation that has not been completed yet.docs-completed
: This change has all necessary documentation completed.docs-not-required
: This change has no user-facing impact and requires no docs.Every PR needs one
release-note-*
label.release-note-required
: This PR has user-facing changes. Most PRs should have this label.release-note-not-required
: This PR has no user-facing changes.Other optional labels:
cherry-pick-candidate
: This PR should be cherry-picked to an earlier release. For bug fixes only.needs-operator-pr
: This PR is related to install and requires a corresponding change to the operator.