[libvirt] [PATCH] [RESEND] [TCK] nwfilter: Adapt to changes how filters are instantiated

Stefan Berger stefanb at linux.vnet.ibm.com
Thu Oct 21 17:18:28 UTC 2010


  On 10/21/2010 12:52 PM, Daniel P. Berrange wrote:
> On Thu, Oct 21, 2010 at 12:17:40PM -0400, Stefan Berger wrote:
>> I am resending the patch with 'evolution' and hope no patch-mangling
>> occurs. At least it looks ok before sending (also sending patch as an
>> attachment)
> Yes it has formatted correctly. Soooooo much easier to read now :-)
>
>> Recent changes to how filters are being instantiated require follow-up
>> changes to the test suite. The following changes are related to
>>
>> - usage of 'ctdir'
>> - changes to the host's incoming filter chain
>>
>> Signed-off-by: Stefan Berger<stefanb at us.ibm.com>
>
> ACK if you can confirm the following are correct:
>
>>   #iptables -L HI-vnet0 -n
>>   Chain HI-vnet0 (1 references)
>>   target     prot opt source               destination
>> -ACCEPT     udplite--  0.0.0.0/0            10.1.2.3            MAC 01:02:03:04:05:06 DSCP match 0x02
>> -ACCEPT     udplite--  0.0.0.0/0            10.1.0.0/22         DSCP match 0x21
>> -ACCEPT     udplite--  0.0.0.0/0            10.1.0.0/22         DSCP match 0x21
>> +RETURN     udplite--  0.0.0.0/0            10.1.2.3            MAC 01:02:03:04:05:06 DSCP match 0x02state NEW,ESTABLISHED ctdir REPLY
>> +RETURN     udplite--  0.0.0.0/0            10.1.0.0/22         DSCP match 0x21state ESTABLISHED ctdir ORIGINAL
>> +RETURN     udplite--  0.0.0.0/0            10.1.0.0/22         DSCP match 0x21state ESTABLISHED ctdir ORIGINAL
>
>>   Chain HI-vnet0 (1 references)
>>   target     prot opt source               destination
>> -ACCEPT     udp  --  0.0.0.0/0            10.1.2.3            MAC 01:02:03:04:05:06 DSCP match 0x22udp spts:291:400 dpts:564:1092
>> +RETURN     udp  --  0.0.0.0/0            10.1.2.3            MAC 01:02:03:04:05:06 DSCP match 0x22udp spts:291:400 dpts:564:1092 state NEW,ESTABLISHED ctdir REPLY
>>   #iptables -L libvirt-host-in -n | grep HI-vnet0 | tr -s " "
>>   HI-vnet0 all -- 0.0.0.0/0 0.0.0.0/0 [goto] PHYSDEV match --physdev-in vnet0
>>   #iptables -L libvirt-in -n | grep FI-vnet0 | tr -s " "
>
>>   #ip6tables -L HI-vnet0 -n
>>   Chain HI-vnet0 (1 references)
>>   target     prot opt source               destination
>> -ACCEPT     tcp      ::/0                 a:b:c::/128         tcp spts:256:4369 dpts:32:33
>> +RETURN     tcp      ::/0                 a:b:c::/128         tcp spts:256:4369 dpts:32:33 state ESTABLISHED ctdir ORIGINAL
>>   #ip6tables -L libvirt-host-in -n | grep vnet0 | tr -s " "
>>   HI-vnet0 all ::/0 ::/0 [goto] PHYSDEV match --physdev-in vnet0
>>   #ip6tables -L libvirt-in -n | grep vnet0 | tr -s " "
> Odd to see these ACCEPTs turning into RETURN ? Was that intentional ?
>
Yes, this was intentional. Rather than having the host accept the 
packets with the previous "ACCEPT", now the evaluation of the traffic 
returns to the INPUT chain where it is determined whether the host 
actually allows that packet. This is lIke the VM is allowed to send ICMP 
traffic, but the host doesn't want it -> first a 'RETURN' on the 
outgoing ICMP traffic, then a drop in the host's filter confiuration.

    Stefan

> Regards,
> Daniel




More information about the libvir-list mailing list