[ovs-dev] [PATCH v2 4/4] Tunnel: Snoop ingress packets and update neigh cache if needed.

Paolo Valerio pvalerio at redhat.com
Fri Nov 26 23:13:53 UTC 2021


Flavio Leitner <fbl at sysclose.org> writes:

> On Wed, Nov 10, 2021 at 11:46:55AM +0100, Paolo Valerio wrote:
>> In case of native tunnel with bfd enabled, if the MAC address of the
>> remote end's interface changes (e.g. because it got rebooted, and the
>> MAC address is allocated dynamically), the BFD session will never be
>> re-established.
>> 
>> This happens because the local tunnel neigh entry doesn't get updated,
>> and the local end keeps sending BFD packets with the old destination
>> MAC address. This was not an issue until
>> b23ddcc57d41 ("tnl-neigh-cache: tighten arp and nd snooping.")
>> because ARP requests were snooped as well avoiding the problem.
>> 
>> Fix this by snooping the incoming packets in the slow path, and
>> updating the neigh cache accordingly.
>> 
>> Signed-off-by: Paolo Valerio <pvalerio at redhat.com>
>> Fixes: b23ddcc57d41 ("tnl-neigh-cache: tighten arp and nd snooping.")
>> Acked-by: Gaetan Rivet <grive at u256.net>
>> ---
>
> If you happen to respin the series, maybe you could add
> the tag Reported-at: <bz url>.
>
> Acked-by: Flavio Leitner <fbl at sysclose.org>

Respun with Reported-at. Thanks.



More information about the dev mailing list