Received: by 10.213.65.68 with SMTP id h4csp85053imn; Thu, 15 Mar 2018 10:15:49 -0700 (PDT) X-Google-Smtp-Source: AG47ELsUlD5sY5qMybTsb0bGRetWmbevpL7YNwtgYvISKh9+DZABP8mcX2gaKn/f2wM4B257mB9X X-Received: by 10.99.119.9 with SMTP id s9mr6488624pgc.276.1521134149673; Thu, 15 Mar 2018 10:15:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521134149; cv=none; d=google.com; s=arc-20160816; b=a+VsZ5p4y2x2Lon6Px+RjS7bU/jLUsdRDlRcTz8Ye4sAGPi4KRn4Hc2SaCRm4vCwOE bk2uDb0sXTxOYpnkn9viurQV6AVsi94+9RSuXTp1G+mimuHh95QGT7MRqQUBSgGehHpo 4L97UaAQQPb7AMgSMXkKIpSIlI8pkMNauKKPPDIuX93wscvMkrLEGcDDSHISxtQJAov2 7fZTLOfjVVUQTxTOU1tGCR7GJniM6IOMRuQm+wkvhMUKvOxCCoPAlHEJ8QXfKqlJTDED wHxS6WsQil3b/5iLlpDWMGYsKe0HL6vB0u8ed5x2mySNAJZnF0bYO+2QsvYvO2rYnwuk Zfgg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition :content-transfer-encoding:subject:cc:to:from:date:message-id :mime-version:dkim-signature:arc-authentication-results; bh=VUEVqHWNJURB7X/N62CwJVFqKgK08Ogy9J/48+EKY6I=; b=Yh+jQjaoFgiMJxYD3m49eOzmst0EHawPzKmFDWvQE0TA7743tXnlWwPPriirW26Y9G XnqA8Ot7Aqw4eT0KwOVlzD91PnznqznavkhYEUp2avwwTvNap17+8Vv5FxC0PcbwIc7H PB/mr+GQfR80NGjNQKRqEyn+8Nwfpog2WM6JOAxqipfXuBywYbZUQcnPRkivysPSRYAg 7tsAcrcgCUTVeV84FTvcnsImy2cNJOoA6npN2lHc9SLxv/EkaWJcoWbspb6NS0fpxgZY HL0tSTe7ueVeIt/Oh8naTtdqYH3SJedCT8a0OLsO7vDGk4KjOcU+S8Qg/w+0cg9A8U5e FiSQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=oFOYFQ7u; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n5si2302487pgs.106.2018.03.15.10.15.34; Thu, 15 Mar 2018 10:15:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=oFOYFQ7u; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752253AbeCOROb (ORCPT + 99 others); Thu, 15 Mar 2018 13:14:31 -0400 Received: from userp2130.oracle.com ([156.151.31.86]:45578 "EHLO userp2130.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751834AbeCORO3 (ORCPT ); Thu, 15 Mar 2018 13:14:29 -0400 Received: from pps.filterd (userp2130.oracle.com [127.0.0.1]) by userp2130.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w2FGnMHw073233; Thu, 15 Mar 2018 17:14:03 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=mime-version : message-id : date : from : to : cc : subject : content-type : content-transfer-encoding; s=corp-2017-10-26; bh=VUEVqHWNJURB7X/N62CwJVFqKgK08Ogy9J/48+EKY6I=; b=oFOYFQ7ujhef2nMQgRsSsMZwA4XuBsTyNY1CX1WmrJTmhyAokrCceRvNkBA0Qifb9Q7O ZRphI7vt2zp3dJqAu06GgWmYbyt1xAQpb/fR0KEw2nrUs0LAPwXAL4Zu6lTYv0mMp6G9 Sxa7hVoAr1e9NI/jWstHmzyq3F63PTqQCdPlD2eod20hIv7q/NkixCxdSxd+hQFSNlbj u52oZDYWRiWZpbhuNkC1NjR5Tc4wqlIKCrQEEP0XxLlzTsOWa6mveP3wMwu3XuN2Cr6c ijckE+aCSj2zEOqwGYDgu9WsiuC/Y8fMTqiNde6KUV2hQEsy8urS7N0cbcawLTxgqh2B VA== Received: from aserv0021.oracle.com (aserv0021.oracle.com [141.146.126.233]) by userp2130.oracle.com with ESMTP id 2gqvpb044a-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 15 Mar 2018 17:14:03 +0000 Received: from aserv0121.oracle.com (aserv0121.oracle.com [141.146.126.235]) by aserv0021.oracle.com (8.14.4/8.14.4) with ESMTP id w2FHE2lq018027 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 15 Mar 2018 17:14:02 GMT Received: from abhmp0011.oracle.com (abhmp0011.oracle.com [141.146.116.17]) by aserv0121.oracle.com (8.14.4/8.13.8) with ESMTP id w2FHE1U5014974; Thu, 15 Mar 2018 17:14:02 GMT MIME-Version: 1.0 Message-ID: <0d84d286-9965-45cb-93c8-379ca1b2441e@default> Date: Thu, 15 Mar 2018 10:14:01 -0700 (PDT) From: Liran Alon To: Cc: , , , , , , Subject: Re: [PATCH] net: dev_forward_skb(): Scrub packet's per-netns info only when crossing netns X-Mailer: Zimbra on Oracle Beehive Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Content-Disposition: inline X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8832 signatures=668690 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=1 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=652 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1803150169 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ----- shmulik.ladkani@gmail.com wrote: > On Thu, 15 Mar 2018 09:35:51 -0700 (PDT) Liran Alon > wrote: > > ----- shmulik.ladkani@gmail.com wrote: > >=20 > > > On Thu, 15 Mar 2018 08:01:03 -0700 (PDT) Liran Alon > > > wrote: =20 > > > >=20 > > > > I still think that default behavior should be to zero skb->mark > only =20 > > > when skb =20 > > > > cross netdevs in different netns. =20 > > >=20 > > > But the previous default was scrub the mark in *both* xnet and > > > non-xnet > > > situations. > > >=20 > > > Therefore, there might be users which RELY on this (strange) > default > > > behavior in their same-netns-veth-pair setups. > > > Meaning, changing the default behavior might break their apps > relying > > > on > > > the former default behavior. > > >=20 > > > This is why the "disable mark scrubbing in non-xnet case" should > be > > > opt-in. =20 > >=20 > > We think the same. > > The only difference is that I think this for now should be > controllable > > by a global /proc/sys/net/core file instead of giving a flexible > per-netdev > > control. > > Because that is a larger change that could be done later. >=20 > A flags attribute to veth newlink is a very scoped change. > User controls this per veth creation. > This is way more neat than /proc/sys/net and provides the desired > granular > control. >=20 > Also, scoping this to veth has the advantage of not affecting the many > other > dev_forward_skb callers. Agreed. But isn't this an issue also for the many others (& future) callers of dev_forward_skb()? This seems problematic to me. This will kinda leave a kernel interface with broken default behavior for backwards comparability. A flag to netdev or /proc/sys/net/core to "fix" default behavior will avoid this. >=20 > Regards, > Shmulik