Bug 1757715
| Summary: | [RFE][OVN] [RHEL 7] Static IP multicast flood configuration | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux Fast Datapath | Reporter: | Dumitru Ceara <dceara> | |
| Component: | ovn2.11 | Assignee: | Dumitru Ceara <dceara> | |
| Status: | CLOSED ERRATA | QA Contact: | Jianlin Shi <jishi> | |
| Severity: | medium | Docs Contact: | ||
| Priority: | unspecified | |||
| Version: | FDP 19.G | CC: | ctrautma, fleitner, jishi, liali, mmichels, nusiddiq, qding | |
| Target Milestone: | --- | Keywords: | FutureFeature | |
| Target Release: | --- | |||
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | ovn2.11-2.11.1-7.el7fdp ovn2.11-2.11.1-7.el8fdp ovn2.12-2.12.0-1.el7fdp ovn2.12-2.12.0-1.el8fdp | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | ||
| Clone Of: | ||||
| : | 1761376 (view as bug list) | Environment: | ||
| Last Closed: | 2019-11-06 05:00:08 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 1761376 | |||
|
Description
Dumitru Ceara
2019-10-02 09:11:22 UTC
Verified on ovn2.11.1-8 following steps in https://bugzilla.redhat.com/show_bug.cgi?id=1761376#c3: ==Test for mcast_flood and mcast_flood_reports on logical switch: enable mcast_snoop on ls2: [root@ibm-x3650m5-03 bz1757714]# ovn-nbctl set Logical_Switch ls2 other_config:mcast_querier=false other_config:mcast_snoop=true ping multicast on server0 and dump packet on server1: [root@ibm-x3650m4-01 bz1757714]# ip netns exec server0 ping 224.1.1.1 -c 1 -t 64 PING 224.1.1.1 (224.1.1.1) 56(84) bytes of data. --- 224.1.1.1 ping statistics --- 1 packets transmitted, 0 received, 100% packet loss, time 0ms [root@ibm-x3650m4-01 ~]# ip netns exec server1 tcpdump -i any -nnle tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel <==== multicast not received set mcast_flood as true on port connected to server1: [root@ibm-x3650m5-03 bz1757714]# ovn-nbctl set Logical_Switch_Port ls2p2 options:mcast_flood=true [root@ibm-x3650m4-01 ~]# ip netns exec server1 tcpdump -i any -nnle tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes 23:36:42.492458 M 1a:bc:b4:2c:c8:65 ethertype IPv4 (0x0800), length 100: 1.1.2.2 > 224.1.1.1: ICMP echo request, id 13120, seq 1, length 64 ^[^C 1 packet captured 1 packet received by filter 0 packets dropped by kernel <=== multicast received join multicast group on server0 and dump packet on server1: [root@ibm-x3650m4-01 bz1757714]# ip netns exec server0 join_group -f 4 -g 224.1.1.1 -i veth0_s0 & [1] 13126 [root@ibm-x3650m4-01 bz1757714]# ip netns exec server0 ip maddr 1: lo inet 224.0.0.1 inet6 ff02::1 inet6 ff01::1 17: veth0_s0 link 33:33:00:00:00:01 link 01:00:5e:00:00:01 link 33:33:ff:2c:c8:65 link 01:00:5e:01:01:01 inet 224.1.1.1 inet 224.0.0.1 inet6 ff02::1:ff2c:c865 inet6 ff02::1 inet6 ff01::1 [root@ibm-x3650m4-01 ~]# ip netns exec server1 tcpdump -i any -nnle tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel <=== no multicast report received enable mcast_flood_reports: [root@ibm-x3650m5-03 bz1757714]# ovn-nbctl set Logical_Switch_Port ls2p2 options:mcast_flood_reports=true [root@ibm-x3650m4-01 ~]# ip netns exec server1 tcpdump -i any -nnle tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes 23:42:12.582491 M 1a:bc:b4:2c:c8:65 ethertype IPv4 (0x0800), length 56: 1.1.2.2 > 224.0.0.22: igmp v3 report, 1 group record(s) 23:42:13.377413 M 1a:bc:b4:2c:c8:65 ethertype IPv4 (0x0800), length 56: 1.1.2.2 > 224.0.0.22: igmp v3 report, 1 group record(s) ^C 2 packets captured 2 packets received by filter 0 packets dropped by kernel <==== multicast report received ==Test for mcast_flood on logical router: disable mcast_snoop on ls1 and ls2: [root@ibm-x3650m5-03 bz1757714]# ovn-nbctl set Logical_Switch ls2 other_config:mcast_querier="false" other_config:mcast_snoop="false" [root@ibm-x3650m5-03 bz1757714]# ovn-nbctl set Logical_Switch ls1 other_config:mcast_querier="false" other_config:mcast_snoop="false" enable igmp_relay on lr1: [root@ibm-x3650m5-03 bz1757714]# ovn-nbctl set logical_router lr1 options:mcast_relay="true" send multicast on server0 and dump packet on client0: [root@ibm-x3650m4-01 bz1757714]# ip netns exec server0 ping 224.1.1.1 -c 1 -t 64 PING 224.1.1.1 (224.1.1.1) 56(84) bytes of data. --- 224.1.1.1 ping statistics --- 1 packets transmitted, 0 received, 100% packet loss, time 0ms [root@ibm-x3650m5-03 ~]# ip netns exec client0 tcpdump -i any -nnle tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel <=== no multicast received enable mcast_flood on ls1 port connected to router: [root@ibm-x3650m5-03 bz1757714]# ovn-nbctl set Logical_Router_Port lr1-s1 options:mcast_flood=true [root@ibm-x3650m5-03 ~]# ip netns exec client0 tcpdump -i any -nnle tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes 23:46:11.344679 M 00:de:ad:ff:01:01 ethertype IPv4 (0x0800), length 100: 1.1.2.2 > 224.1.1.1: ICMP echo request, id 13141, seq 1, length 64 ^C 1 packet captured 1 packet received by filter 0 packets dropped by kernel <==== multicast received set VERIFIED Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2019:3718 |