Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
The FDP team is no longer accepting new bugs in Bugzilla. Please report your issues under FDP project in Jira. Thanks.

Bug 2166830

Summary: Missing Neighbor Advertisements on router failover
Product: Red Hat Enterprise Linux Fast Datapath Reporter: OVN Bot <ovn-bot>
Component: ovn22.03Assignee: Ales Musil <amusil>
Status: CLOSED ERRATA QA Contact: Jianlin Shi <jishi>
Severity: high Docs Contact:
Priority: high    
Version: FDP 22.GCC: amusil, ctrautma, jiji, mmichels
Target Milestone: ---   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: ovn22.03-22.03.0-157.el8fdp Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-03-16 10:24:50 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OVN Bot 2023-02-03 05:08:07 UTC
This is an automatically-generated clone of issue https://bugzilla.redhat.com/show_bug.cgi?id=2131676

Comment 4 Jianlin Shi 2023-02-16 07:35:09 UTC
reproduced on ovn22.03-22.03.0-95.el8:

[root@wsfd-advnetlab16 bz2131676]# rpm -qa | grep -E "openvswitch2.17|ovn22.03"
python3-openvswitch2.17-2.17.0-60.el8fdp.x86_64
ovn22.03-22.03.0-95.el8fdp.x86_64
ovn22.03-central-22.03.0-95.el8fdp.x86_64
openvswitch2.17-2.17.0-60.el8fdp.x86_64
ovn22.03-host-22.03.0-95.el8fdp.x86_64
+ tcpdump -r ext1.pcap -nnle -v
reading from file ext1.pcap, link-type EN10MB (Ethernet)
dropped privs to tcpdump
02:30:56.550036 ca:fd:99:ce:fd:f0 > 33:33:ff:00:00:02, ethertype IPv6 (0x86dd), length 86: (hlim 255, next-header ICMPv6 (58) payload length: 32) :: > ff02::1:ff00:2: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has fd12:3456:789a:1::2                                                        
          unknown option (14), length 8 (1):                                                          
          0x0000:  b39f c3bd 4b68
02:30:57.334049 ca:fd:99:ce:fd:f0 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: (hlim 1, next-header Options (0) payload length: 56) :: > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 2 group record(s) [gaddr ff02::1:ff00:2 to_ex, 0 source(s)] [gaddr ff02::1:ffce:fdf0 to_ex, 0 source(s)]
02:30:57.334069 ca:fd:99:ce:fd:f0 > 33:33:ff:ce:fd:f0, ethertype IPv6 (0x86dd), length 86: (hlim 255, next-header ICMPv6 (58) payload length: 32) :: > ff02::1:ffce:fdf0: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has fe80::c8fd:99ff:fece:fdf0
          unknown option (14), length 8 (1): 
          0x0000:  f06f 076b bbb6                                                                     
02:30:58.358097 ca:fd:99:ce:fd:f0 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: (hlim 1, next-header Options (0) payload length: 56) fe80::c8fd:99ff:fece:fdf0 > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 2 group record(s) [gaddr ff02::1:ff00:2 to_ex, 0 source(s)] [gaddr ff02::1:ffce:fdf0 to_ex, 0 source(s)]
02:30:58.358132 ca:fd:99:ce:fd:f0 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::c8fd:99ff:fece:fdf0 > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16
          source link-address option (1), length 8 (1): ca:fd:99:ce:fd:f0                             
02:30:58.630016 ca:fd:99:ce:fd:f0 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: (hlim 1, next-header Options (0) payload length: 56) fe80::c8fd:99ff:fece:fdf0 > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 2 group record(s) [gaddr ff02::1:ff00:2 to_ex, 0 source(s)] [gaddr ff02::1:ffce:fdf0 to_ex, 0 source(s)]
02:31:02.262082 ca:fd:99:ce:fd:f0 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::c8fd:99ff:fece:fdf0 > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16
          source link-address option (1), length 8 (1): ca:fd:99:ce:fd:f0
02:31:10.454248 ca:fd:99:ce:fd:f0 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::c8fd:99ff:fece:fdf0 > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16                                                                       
          source link-address option (1), length 8 (1): ca:fd:99:ce:fd:f0                             
+ sleep 2                                                                                             
+ ip netns exec ext1 tcpdump -i ext1 -w ext1_2.pcap -nnle                                             
dropped privs to tcpdump                                                                              
tcpdump: listening on ext1, link-type EN10MB (Ethernet), capture size 262144 bytes                    
+ ovn-nbctl --wait=hv set logical_router lr0 options:chassis=hv0                                      
+ sleep 2                                                                                             
+ ovn-nbctl set logical_router lr0 options:chassis=hv1                                                
+ sleep 5                                                                                             
+ pkill tcpdump                                                                                       
0 packets captured                                                                                    
0 packets received by filter                                                                          
0 packets dropped by kernel                                                                           
+ sleep 2                                                                                             
+ tcpdump -r ext1_2.pcap -nnle -v                                                                     
reading from file ext1_2.pcap, link-type EN10MB (Ethernet)                                            
dropped privs to tcpdump 

Verified on ovn22.03-22.03.0-157.el8:

[root@wsfd-advnetlab16 bz2131676]# rpm -qa | grep -E "openvswitch2.17|ovn22.03"
python3-openvswitch2.17-2.17.0-60.el8fdp.x86_64
ovn22.03-22.03.0-157.el8fdp.x86_64
ovn22.03-host-22.03.0-157.el8fdp.x86_64
openvswitch2.17-2.17.0-60.el8fdp.x86_64
ovn22.03-central-22.03.0-157.el8fdp.x86_64


+ tcpdump -r ext1.pcap -nnle -v
reading from file ext1.pcap, link-type EN10MB (Ethernet)
dropped privs to tcpdump
02:33:55.918019 8e:2d:cb:fb:b4:a1 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: (hlim 1, next-header Options (0) payload length: 56) :: > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 2 group record(s) [gaddr ff02::1:ff00:2 to_ex, 0 source(s)] [gaddr ff02::1:fffb:b4a1 to_ex, 0 source(s)]
02:33:56.214040 8e:2d:cb:fb:b4:a1 > 33:33:ff:fb:b4:a1, ethertype IPv6 (0x86dd), length 86: (hlim 255, next-header ICMPv6 (58) payload length: 32) :: > ff02::1:fffb:b4a1: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has fe80::8c2d:cbff:fefb:b4a1
          unknown option (14), length 8 (1): 
          0x0000:  aabe 1d61 2c9e
02:33:56.470066 8e:2d:cb:fb:b4:a1 > 33:33:ff:00:00:02, ethertype IPv6 (0x86dd), length 86: (hlim 255, next-header ICMPv6 (58) payload length: 32) :: > ff02::1:ff00:2: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has fd12:3456:789a:1::2
          unknown option (14), length 8 (1): 
          0x0000:  739d 8bb2 f00f
02:33:57.238070 8e:2d:cb:fb:b4:a1 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: (hlim 1, next-header Options (0) payload length: 56) fe80::8c2d:cbff:fefb:b4a1 > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 2 group record(s) [gaddr ff02::1:ff00:2 to_ex, 0 source(s)] [gaddr ff02::1:fffb:b4a1 to_ex, 0 source(s)]
02:33:57.238094 8e:2d:cb:fb:b4:a1 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::8c2d:cbff:fefb:b4a1 > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16
          source link-address option (1), length 8 (1): 8e:2d:cb:fb:b4:a1
02:33:57.942031 8e:2d:cb:fb:b4:a1 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: (hlim 1, next-header Options (0) payload length: 56) fe80::8c2d:cbff:fefb:b4a1 > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 2 group record(s) [gaddr ff02::1:ff00:2 to_ex, 0 source(s)] [gaddr ff02::1:fffb:b4a1 to_ex, 0 source(s)]
02:33:58.723076 f0:00:00:00:00:01 > ff:ff:ff:ff:ff:ff, ethertype Reverse ARP (0x8035), length 42: Ethernet (len 6), IPv4 (len 4), Reverse Request who-is f0:00:00:00:00:01 tell f0:00:00:00:00:01, length 28
02:34:00.725271 f0:00:00:00:00:01 > ff:ff:ff:ff:ff:ff, ethertype Reverse ARP (0x8035), length 42: Ethernet (len 6), IPv4 (len 4), Reverse Request who-is f0:00:00:00:00:01 tell f0:00:00:00:00:01, length 28
02:34:01.462096 8e:2d:cb:fb:b4:a1 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::8c2d:cbff:fefb:b4a1 > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16
          source link-address option (1), length 8 (1): 8e:2d:cb:fb:b4:a1
02:34:04.729512 f0:00:00:00:00:01 > ff:ff:ff:ff:ff:ff, ethertype Reverse ARP (0x8035), length 42: Ethernet (len 6), IPv4 (len 4), Reverse Request who-is f0:00:00:00:00:01 tell f0:00:00:00:00:01, length 28
02:34:10.166140 8e:2d:cb:fb:b4:a1 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::8c2d:cbff:fefb:b4a1 > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16
          source link-address option (1), length 8 (1): 8e:2d:cb:fb:b4:a1
+ sleep 2
+ ip netns exec ext1 tcpdump -i ext1 -w ext1_2.pcap -nnle
dropped privs to tcpdump
tcpdump: listening on ext1, link-type EN10MB (Ethernet), capture size 262144 bytes
+ ovn-nbctl --wait=hv set logical_router lr0 options:chassis=hv0
+ sleep 2
+ ovn-nbctl set logical_router lr0 options:chassis=hv1
+ sleep 5
+ pkill tcpdump
2 packets captured
2 packets received by filter
0 packets dropped by kernel
+ sleep 2
+ tcpdump -r ext1_2.pcap -nnle -v
reading from file ext1_2.pcap, link-type EN10MB (Ethernet)
dropped privs to tcpdump
02:34:19.878432 f0:00:00:00:00:01 > ff:ff:ff:ff:ff:ff, ethertype Reverse ARP (0x8035), length 42: Ethernet (len 6), IPv4 (len 4), Reverse Request who-is f0:00:00:00:00:01 tell f0:00:00:00:00:01, length 28
02:34:21.880350 f0:00:00:00:00:01 > ff:ff:ff:ff:ff:ff, ethertype Reverse ARP (0x8035), length 42: Ethernet (len 6), IPv4 (len 4), Reverse Request who-is f0:00:00:00:00:01 tell f0:00:00:00:00:01, length 28

Comment 6 errata-xmlrpc 2023-03-16 10:24:50 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (ovn22.03 bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2023:1292