Bug 2166830
| Summary: | Missing Neighbor Advertisements on router failover | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux Fast Datapath | Reporter: | OVN Bot <ovn-bot> |
| Component: | ovn22.03 | Assignee: | Ales Musil <amusil> |
| Status: | CLOSED ERRATA | QA Contact: | Jianlin Shi <jishi> |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | FDP 22.G | CC: | amusil, ctrautma, jiji, mmichels |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | ovn22.03-22.03.0-157.el8fdp | Doc Type: | If docs needed, set a value |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2023-03-16 10:24:50 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
OVN Bot
2023-02-03 05:08:07 UTC
reproduced on ovn22.03-22.03.0-95.el8: [root@wsfd-advnetlab16 bz2131676]# rpm -qa | grep -E "openvswitch2.17|ovn22.03" python3-openvswitch2.17-2.17.0-60.el8fdp.x86_64 ovn22.03-22.03.0-95.el8fdp.x86_64 ovn22.03-central-22.03.0-95.el8fdp.x86_64 openvswitch2.17-2.17.0-60.el8fdp.x86_64 ovn22.03-host-22.03.0-95.el8fdp.x86_64 + tcpdump -r ext1.pcap -nnle -v reading from file ext1.pcap, link-type EN10MB (Ethernet) dropped privs to tcpdump 02:30:56.550036 ca:fd:99:ce:fd:f0 > 33:33:ff:00:00:02, ethertype IPv6 (0x86dd), length 86: (hlim 255, next-header ICMPv6 (58) payload length: 32) :: > ff02::1:ff00:2: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has fd12:3456:789a:1::2 unknown option (14), length 8 (1): 0x0000: b39f c3bd 4b68 02:30:57.334049 ca:fd:99:ce:fd:f0 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: (hlim 1, next-header Options (0) payload length: 56) :: > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 2 group record(s) [gaddr ff02::1:ff00:2 to_ex, 0 source(s)] [gaddr ff02::1:ffce:fdf0 to_ex, 0 source(s)] 02:30:57.334069 ca:fd:99:ce:fd:f0 > 33:33:ff:ce:fd:f0, ethertype IPv6 (0x86dd), length 86: (hlim 255, next-header ICMPv6 (58) payload length: 32) :: > ff02::1:ffce:fdf0: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has fe80::c8fd:99ff:fece:fdf0 unknown option (14), length 8 (1): 0x0000: f06f 076b bbb6 02:30:58.358097 ca:fd:99:ce:fd:f0 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: (hlim 1, next-header Options (0) payload length: 56) fe80::c8fd:99ff:fece:fdf0 > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 2 group record(s) [gaddr ff02::1:ff00:2 to_ex, 0 source(s)] [gaddr ff02::1:ffce:fdf0 to_ex, 0 source(s)] 02:30:58.358132 ca:fd:99:ce:fd:f0 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::c8fd:99ff:fece:fdf0 > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16 source link-address option (1), length 8 (1): ca:fd:99:ce:fd:f0 02:30:58.630016 ca:fd:99:ce:fd:f0 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: (hlim 1, next-header Options (0) payload length: 56) fe80::c8fd:99ff:fece:fdf0 > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 2 group record(s) [gaddr ff02::1:ff00:2 to_ex, 0 source(s)] [gaddr ff02::1:ffce:fdf0 to_ex, 0 source(s)] 02:31:02.262082 ca:fd:99:ce:fd:f0 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::c8fd:99ff:fece:fdf0 > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16 source link-address option (1), length 8 (1): ca:fd:99:ce:fd:f0 02:31:10.454248 ca:fd:99:ce:fd:f0 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::c8fd:99ff:fece:fdf0 > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16 source link-address option (1), length 8 (1): ca:fd:99:ce:fd:f0 + sleep 2 + ip netns exec ext1 tcpdump -i ext1 -w ext1_2.pcap -nnle dropped privs to tcpdump tcpdump: listening on ext1, link-type EN10MB (Ethernet), capture size 262144 bytes + ovn-nbctl --wait=hv set logical_router lr0 options:chassis=hv0 + sleep 2 + ovn-nbctl set logical_router lr0 options:chassis=hv1 + sleep 5 + pkill tcpdump 0 packets captured 0 packets received by filter 0 packets dropped by kernel + sleep 2 + tcpdump -r ext1_2.pcap -nnle -v reading from file ext1_2.pcap, link-type EN10MB (Ethernet) dropped privs to tcpdump Verified on ovn22.03-22.03.0-157.el8: [root@wsfd-advnetlab16 bz2131676]# rpm -qa | grep -E "openvswitch2.17|ovn22.03" python3-openvswitch2.17-2.17.0-60.el8fdp.x86_64 ovn22.03-22.03.0-157.el8fdp.x86_64 ovn22.03-host-22.03.0-157.el8fdp.x86_64 openvswitch2.17-2.17.0-60.el8fdp.x86_64 ovn22.03-central-22.03.0-157.el8fdp.x86_64 + tcpdump -r ext1.pcap -nnle -v reading from file ext1.pcap, link-type EN10MB (Ethernet) dropped privs to tcpdump 02:33:55.918019 8e:2d:cb:fb:b4:a1 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: (hlim 1, next-header Options (0) payload length: 56) :: > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 2 group record(s) [gaddr ff02::1:ff00:2 to_ex, 0 source(s)] [gaddr ff02::1:fffb:b4a1 to_ex, 0 source(s)] 02:33:56.214040 8e:2d:cb:fb:b4:a1 > 33:33:ff:fb:b4:a1, ethertype IPv6 (0x86dd), length 86: (hlim 255, next-header ICMPv6 (58) payload length: 32) :: > ff02::1:fffb:b4a1: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has fe80::8c2d:cbff:fefb:b4a1 unknown option (14), length 8 (1): 0x0000: aabe 1d61 2c9e 02:33:56.470066 8e:2d:cb:fb:b4:a1 > 33:33:ff:00:00:02, ethertype IPv6 (0x86dd), length 86: (hlim 255, next-header ICMPv6 (58) payload length: 32) :: > ff02::1:ff00:2: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has fd12:3456:789a:1::2 unknown option (14), length 8 (1): 0x0000: 739d 8bb2 f00f 02:33:57.238070 8e:2d:cb:fb:b4:a1 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: (hlim 1, next-header Options (0) payload length: 56) fe80::8c2d:cbff:fefb:b4a1 > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 2 group record(s) [gaddr ff02::1:ff00:2 to_ex, 0 source(s)] [gaddr ff02::1:fffb:b4a1 to_ex, 0 source(s)] 02:33:57.238094 8e:2d:cb:fb:b4:a1 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::8c2d:cbff:fefb:b4a1 > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16 source link-address option (1), length 8 (1): 8e:2d:cb:fb:b4:a1 02:33:57.942031 8e:2d:cb:fb:b4:a1 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: (hlim 1, next-header Options (0) payload length: 56) fe80::8c2d:cbff:fefb:b4a1 > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 2 group record(s) [gaddr ff02::1:ff00:2 to_ex, 0 source(s)] [gaddr ff02::1:fffb:b4a1 to_ex, 0 source(s)] 02:33:58.723076 f0:00:00:00:00:01 > ff:ff:ff:ff:ff:ff, ethertype Reverse ARP (0x8035), length 42: Ethernet (len 6), IPv4 (len 4), Reverse Request who-is f0:00:00:00:00:01 tell f0:00:00:00:00:01, length 28 02:34:00.725271 f0:00:00:00:00:01 > ff:ff:ff:ff:ff:ff, ethertype Reverse ARP (0x8035), length 42: Ethernet (len 6), IPv4 (len 4), Reverse Request who-is f0:00:00:00:00:01 tell f0:00:00:00:00:01, length 28 02:34:01.462096 8e:2d:cb:fb:b4:a1 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::8c2d:cbff:fefb:b4a1 > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16 source link-address option (1), length 8 (1): 8e:2d:cb:fb:b4:a1 02:34:04.729512 f0:00:00:00:00:01 > ff:ff:ff:ff:ff:ff, ethertype Reverse ARP (0x8035), length 42: Ethernet (len 6), IPv4 (len 4), Reverse Request who-is f0:00:00:00:00:01 tell f0:00:00:00:00:01, length 28 02:34:10.166140 8e:2d:cb:fb:b4:a1 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::8c2d:cbff:fefb:b4a1 > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16 source link-address option (1), length 8 (1): 8e:2d:cb:fb:b4:a1 + sleep 2 + ip netns exec ext1 tcpdump -i ext1 -w ext1_2.pcap -nnle dropped privs to tcpdump tcpdump: listening on ext1, link-type EN10MB (Ethernet), capture size 262144 bytes + ovn-nbctl --wait=hv set logical_router lr0 options:chassis=hv0 + sleep 2 + ovn-nbctl set logical_router lr0 options:chassis=hv1 + sleep 5 + pkill tcpdump 2 packets captured 2 packets received by filter 0 packets dropped by kernel + sleep 2 + tcpdump -r ext1_2.pcap -nnle -v reading from file ext1_2.pcap, link-type EN10MB (Ethernet) dropped privs to tcpdump 02:34:19.878432 f0:00:00:00:00:01 > ff:ff:ff:ff:ff:ff, ethertype Reverse ARP (0x8035), length 42: Ethernet (len 6), IPv4 (len 4), Reverse Request who-is f0:00:00:00:00:01 tell f0:00:00:00:00:01, length 28 02:34:21.880350 f0:00:00:00:00:01 > ff:ff:ff:ff:ff:ff, ethertype Reverse ARP (0x8035), length 42: Ethernet (len 6), IPv4 (len 4), Reverse Request who-is f0:00:00:00:00:01 tell f0:00:00:00:00:01, length 28 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (ovn22.03 bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2023:1292 |