On Wed, Jun 24, 2015 at 8:40 PM, Pravin Shelar <pshe...@nicira.com> wrote:
> On Wed, Jun 24, 2015 at 2:55 PM, Jesse Gross <je...@nicira.com> wrote:
>> When doing native tunneling, we look at packets destined to the
>> local port to see if they match tunnel protocols that we should
>> intercept. The criteria are IP protocol, destination UDP port, etc.
>>
>> However, we also look at the source IP address of the packets. This
>> should be a function of the port-based tunnel layer and not the
>> tunnel receive code itself. For comparison, the kernel tunnel code
>> has no idea about the IP addresses of its link partners. If port
>> based tunnel is desired, it can be handled using the normal port
>> tunnel layer, regardless of whether the packets originally came
>> from userspace or the kernel.
>>
>> For port based tunneling, this bug has no effect - the check is
>> simply redundant. However, it breaks flow-based native tunnels
>> because the remote IP address is not known at port creation time.
>>
>> CC: Pravin Shelar <pshe...@nicira.com>
>> Reported-by: David Griswold <david.grisw...@overturenetworks.com>
>> Signed-off-by: Jesse Gross <je...@nicira.com>
>
> Can you add this test case?
[...]
> Patch looks good to me.

Thanks, I added a test case and pushed to branch-2.4 and master.
_______________________________________________
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev

Reply via email to