Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

v1.14 Backports 2024-02-16 #30800

Merged
merged 3 commits into from Feb 16, 2024
Merged

v1.14 Backports 2024-02-16 #30800

merged 3 commits into from Feb 16, 2024

Conversation

sayboras
Copy link
Member

@sayboras sayboras commented Feb 16, 2024

pchaigno and others added 3 commits February 16, 2024 00:29
[ upstream commit c19a84e ]

This error can happen if a state is being destroyed while packets are in
flight. It should be rare as the window in the kernel where it can
happen is very short.

Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
Signed-off-by: Tam Mach <tam.mach@cilium.io>
[ upstream commit 3c479d4 ]

The test output are riddled with logs such as:

    Defaulted container "cilium-agent" out of: cilium-agent, config
    (init), mount-cgroup (init), apply-sysctl-overwrites (init),
    mount-bpf-fs (init), clean-cilium-state (init),
    install-cni-binaries (init)

This gets particularly noisy when waiting for the key rotation to
complete, during which time we run kubectl exec repeatedly. This commit
fixes it.

Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
Signed-off-by: Tam Mach <tam.mach@cilium.io>
[ upstream commit 12e3ae9 ]

When the Pod generates a TCP stream larger than MSS, it may be sent as a
GSO large packet. We observed in such a case, SRv6-encapsulated packet
is dropped.

The root cause was a misuse of ctx_adjust_hroom. We call it
ctx_adjust_hroom(ctx, growth, BPF_ADJ_ROOM_MAC, 0), but this way, the
helper is not aware of what kind of encapsulation we want to perform, so
it doesn't adjust skb->inner_protocol (should be ETH_P_IP) and
skb_shinfo->gso_type (should be SKB_GSO_IPXIP6 | SKB_GSO_TCPV4)
appropriately. As a result, the packet will be dropped in
ip4ip6_gso_segment due to the flag mismatch.

Use BPF_F_ADJ_ROOM_ENCAP_L3_IPV6 flag which is introduced to solve this
problem.

Signed-off-by: Yutaro Hayakawa <yutaro.hayakawa@isovalent.com>
Signed-off-by: Tam Mach <tam.mach@cilium.io>
@sayboras sayboras added kind/backports This PR provides functionality previously merged into master. backport/1.14 This PR represents a backport for Cilium 1.14.x of a PR that was merged to main. labels Feb 16, 2024
@sayboras
Copy link
Member Author

/test-backport-1.14

@sayboras sayboras marked this pull request as ready for review February 16, 2024 01:22
@sayboras sayboras requested review from a team as code owners February 16, 2024 01:22
Copy link
Member

@YutaroHayakawa YutaroHayakawa left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Mine looks good. Thanks!

Copy link
Member

@pchaigno pchaigno left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks!

@sayboras
Copy link
Member Author

Required reviews are in, marking this ready to merge for tophat to check.

@sayboras sayboras added the ready-to-merge This PR has passed all tests and received consensus from code owners to merge. label Feb 16, 2024
@maintainer-s-little-helper maintainer-s-little-helper bot removed the ready-to-merge This PR has passed all tests and received consensus from code owners to merge. label Feb 16, 2024
@aanm aanm merged commit 13f2cd0 into v1.14 Feb 16, 2024
231 checks passed
@aanm aanm deleted the pr/v1.14-backport-2024-02-16 branch February 16, 2024 13:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport/1.14 This PR represents a backport for Cilium 1.14.x of a PR that was merged to main. kind/backports This PR provides functionality previously merged into master.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants