Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
The FDP team is no longer accepting new bugs in Bugzilla. Please report your issues under FDP project in Jira. Thanks.

Bug 2166827

Summary: Missing Neighbor Advertisements on router failover
Product: Red Hat Enterprise Linux Fast Datapath Reporter: OVN Bot <ovn-bot>
Component: ovn22.09Assignee: Ales Musil <amusil>
Status: CLOSED UPSTREAM QA Contact: Jianlin Shi <jishi>
Severity: high Docs Contact:
Priority: high    
Version: FDP 22.GCC: amusil, ctrautma, jiji, mmichels
Target Milestone: ---   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: ovn22.09-22.09.0-59.el8fdp Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2025-02-10 04:01:50 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OVN Bot 2023-02-03 05:07:58 UTC
This is an automatically-generated clone of issue https://bugzilla.redhat.com/show_bug.cgi?id=2131676

Comment 4 Jianlin Shi 2023-02-16 07:38:58 UTC
reproduced on ovn22.09-22.09.0-32.el8:

[root@wsfd-advnetlab16 bz2131676]# rpm -qa | grep -E "openvswitch2.17|ovn22.09"
python3-openvswitch2.17-2.17.0-60.el8fdp.x86_64
ovn22.09-host-22.09.0-32.el8fdp.x86_64
openvswitch2.17-2.17.0-60.el8fdp.x86_64
ovn22.09-22.09.0-32.el8fdp.x86_64
ovn22.09-central-22.09.0-32.el8fdp.x86_64

+ tcpdump -r ext1.pcap -nnle -v
reading from file ext1.pcap, link-type EN10MB (Ethernet)
dropped privs to tcpdump
02:36:17.910062 9e:15:43:f7:cb:87 > 33:33:ff:00:00:02, ethertype IPv6 (0x86dd), length 86: (hlim 255, next-header ICMPv6 (58) payload length: 32) :: > ff02::1:ff00:2: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has fd12:3456:789a:1::2                                                        
          unknown option (14), length 8 (1): 
          0x0000:  2d5e bbf7 6650
02:36:18.230050 9e:15:43:f7:cb:87 > 33:33:ff:f7:cb:87, ethertype IPv6 (0x86dd), length 86: (hlim 255, next-header ICMPv6 (58) payload length: 32) :: > ff02::1:fff7:cb87: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has fe80::9c15:43ff:fef7:cb87
          unknown option (14), length 8 (1): 
          0x0000:  8319 b1fd f46c
02:36:18.422048 9e:15:43:f7:cb:87 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: (hlim 1, next-header Options (0) payload length: 56) :: > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 2 group record(s) [gaddr ff02::1:ff00:2 to_ex, 0 source(s)] [gaddr ff02::1:fff7:cb87 to_ex, 0 source(s)]
02:36:19.254062 9e:15:43:f7:cb:87 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: (hlim 1, next-header Options (0) payload length: 56) fe80::9c15:43ff:fef7:cb87 > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 2 group record(s) [gaddr ff02::1:ff00:2 to_ex, 0 source(s)] [gaddr ff02::1:fff7:cb87 to_ex, 0 source(s)]
02:36:19.254086 9e:15:43:f7:cb:87 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::9c15:43ff:fef7:cb87 > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16
          source link-address option (1), length 8 (1): 9e:15:43:f7:cb:87
02:36:19.710041 9e:15:43:f7:cb:87 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: (hlim 1, next-header Options (0) payload length: 56) fe80::9c15:43ff:fef7:cb87 > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 2 group record(s) [gaddr ff02::1:ff00:2 to_ex, 0 source(s)] [gaddr ff02::1:fff7:cb87 to_ex, 0 source(s)]
02:36:23.094035 9e:15:43:f7:cb:87 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::9c15:43ff:fef7:cb87 > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16
          source link-address option (1), length 8 (1): 9e:15:43:f7:cb:87
02:36:30.454039 9e:15:43:f7:cb:87 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::9c15:43ff:fef7:cb87 > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16
          source link-address option (1), length 8 (1): 9e:15:43:f7:cb:87                             
+ ip netns exec ext1 tcpdump -i ext1 -w ext1_2.pcap -nnle                                             
+ sleep 2
dropped privs to tcpdump
tcpdump: listening on ext1, link-type EN10MB (Ethernet), capture size 262144 bytes                    
+ ovn-nbctl --wait=hv set logical_router lr0 options:chassis=hv0                                      
+ sleep 2
+ ovn-nbctl set logical_router lr0 options:chassis=hv1                                                
+ sleep 5
+ pkill tcpdump
1 packet captured
1 packet received by filter                                                                           
0 packets dropped by kernel                                                                           
+ sleep 2
+ tcpdump -r ext1_2.pcap -nnle -v
reading from file ext1_2.pcap, link-type EN10MB (Ethernet)                                            
dropped privs to tcpdump
02:36:44.790122 9e:15:43:f7:cb:87 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::9c15:43ff:fef7:cb87 > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16                                                                       
          source link-address option (1), length 8 (1): 9e:15:43:f7:cb:87  


Verified on ovn22.09-22.09.0-59.el8:


+ tcpdump -r ext1.pcap -nnle -v
reading from file ext1.pcap, link-type EN10MB (Ethernet)
dropped privs to tcpdump
02:37:42.998040 72:41:f2:ab:3a:0a > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: (hlim 1, next-header Options (0) payload length: 56) :: > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 2 group record(s) [gaddr ff02::1:ff00:2 to_ex, 0 source(s)] [gaddr ff02::1:ffab:3a0a to_ex, 0 source(s)]
02:37:43.606064 72:41:f2:ab:3a:0a > 33:33:ff:00:00:02, ethertype IPv6 (0x86dd), length 86: (hlim 255, next-header ICMPv6 (58) payload length: 32) :: > ff02::1:ff00:2: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has fd12:3456:789a:1::2
          unknown option (14), length 8 (1): 
          0x0000:  88e5 b59b 8d57
02:37:43.926072 72:41:f2:ab:3a:0a > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: (hlim 1, next-header Options (0) payload length: 56) fe80::7041:f2ff:feab:3a0a > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 2 group record(s) [gaddr ff02::1:ff00:2 to_ex, 0 source(s)] [gaddr ff02::1:ffab:3a0a to_ex, 0 source(s)]
02:37:43.926096 72:41:f2:ab:3a:0a > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::7041:f2ff:feab:3a0a > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16
          source link-address option (1), length 8 (1): 72:41:f2:ab:3a:0a
02:37:44.822015 72:41:f2:ab:3a:0a > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: (hlim 1, next-header Options (0) payload length: 56) fe80::7041:f2ff:feab:3a0a > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 2 group record(s) [gaddr ff02::1:ff00:2 to_ex, 0 source(s)] [gaddr ff02::1:ffab:3a0a to_ex, 0 source(s)]
02:37:45.911772 f0:00:00:00:00:01 > ff:ff:ff:ff:ff:ff, ethertype Reverse ARP (0x8035), length 42: Ethernet (len 6), IPv4 (len 4), Reverse Request who-is f0:00:00:00:00:01 tell f0:00:00:00:00:01, length 28
02:37:47.914005 f0:00:00:00:00:01 > ff:ff:ff:ff:ff:ff, ethertype Reverse ARP (0x8035), length 42: Ethernet (len 6), IPv4 (len 4), Reverse Request who-is f0:00:00:00:00:01 tell f0:00:00:00:00:01, length 28
02:37:48.278055 72:41:f2:ab:3a:0a > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::7041:f2ff:feab:3a0a > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16
          source link-address option (1), length 8 (1): 72:41:f2:ab:3a:0a
02:37:51.918398 f0:00:00:00:00:01 > ff:ff:ff:ff:ff:ff, ethertype Reverse ARP (0x8035), length 42: Ethernet (len 6), IPv4 (len 4), Reverse Request who-is f0:00:00:00:00:01 tell f0:00:00:00:00:01, length 28
02:37:56.982010 72:41:f2:ab:3a:0a > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::7041:f2ff:feab:3a0a > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16
          source link-address option (1), length 8 (1): 72:41:f2:ab:3a:0a
+ sleep 2
+ ip netns exec ext1 tcpdump -i ext1 -w ext1_2.pcap -nnle
dropped privs to tcpdump
tcpdump: listening on ext1, link-type EN10MB (Ethernet), capture size 262144 bytes
+ ovn-nbctl --wait=hv set logical_router lr0 options:chassis=hv0
+ sleep 2
+ ovn-nbctl set logical_router lr0 options:chassis=hv1
+ sleep 5
+ pkill tcpdump
2 packets captured
2 packets received by filter
0 packets dropped by kernel
+ sleep 2
+ tcpdump -r ext1_2.pcap -nnle -v
reading from file ext1_2.pcap, link-type EN10MB (Ethernet)
dropped privs to tcpdump
02:38:07.062291 f0:00:00:00:00:01 > ff:ff:ff:ff:ff:ff, ethertype Reverse ARP (0x8035), length 42: Ethernet (len 6), IPv4 (len 4), Reverse Request who-is f0:00:00:00:00:01 tell f0:00:00:00:00:01, length 28
02:38:09.064323 f0:00:00:00:00:01 > ff:ff:ff:ff:ff:ff, ethertype Reverse ARP (0x8035), length 42: Ethernet (len 6), IPv4 (len 4), Reverse Request who-is f0:00:00:00:00:01 tell f0:00:00:00:00:01, length 28
[root@wsfd-advnetlab16 bz2131676]# rpm -qa | grep -E "openvswitch2.17|ovn22.09"
python3-openvswitch2.17-2.17.0-60.el8fdp.x86_64
ovn22.09-host-22.09.0-59.el8fdp.x86_64
ovn22.09-22.09.0-59.el8fdp.x86_64
openvswitch2.17-2.17.0-60.el8fdp.x86_64
ovn22.09-central-22.09.0-59.el8fdp.x86_64

Comment 6 Red Hat Bugzilla 2025-02-10 04:01:50 UTC
This product has been discontinued or is no longer tracked in Red Hat Bugzilla.