On Wed, Sep 02, 2015 at 06:44:15AM -0700, Jesse Gross wrote:
> On Tue, Sep 1, 2015 at 7:14 PM, Pravin Shelar <pshe...@nicira.com> wrote:
> > On Tue, Sep 1, 2015 at 4:56 PM, Ben Pfaff <b...@nicira.com> wrote:
> >> I think I've come across a bug in OVS native tunneling, or at any rate
> >> an important difference between Linux kernel and OVS native tunneling.
> >> In Linux kernel tunneling, a tunnel packet received by the kernel first
> >> passes through the kernel IP stack.  Among other things, the IP stack
> >> drops packets that are not destined to the current host.  It appears to
> >> me that the native tunneling code doesn't have any similar check,
> >> because I'm seeing it accept and packets flooded by the upstream switch
> >> that are not destined to an IP address of the host.  This means in
> >> effect that the user of native tunneling must set "options:local_ip",
> >> whereas a user of Linux kernel tunneling doesn't (and probably
> >> shouldn't).
> >>
> > Right. Its bug.
> >
> >> I suspect that this behavior is unintentional; it isn't mentioned in
> >> README-native-tunneling.md or (as far as I can tell) anywhere else.
> >>
> >> I noticed this while testing OVN.  If you configure a few hypervisors
> >> and send packets from only one of them, then the switch that connects
> >> them will flood all the packets to all of the rest (since it hasn't yet
> >> learned where they are).  The result is that for N hypervisors, remote
> >> VIFs get N-1 copies of the packets instead of just one.  I'm appending a
> >> patch that works around it, though I'd prefer to fix the tunneling code
> >> rather than apply this patch.
> >>
> > We can fix it adding the local ip-address to tnl-port-map.
> > I will send a patch.
> 
> Presumably we also should use DMAC as well?

Good point!
_______________________________________________
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev

Reply via email to