Thursday, 2023-08-24

*** EugenMayer440 is now known as EugenMayer4402:10
opendevreviewliuxie proposed openstack/neutron master: [OVN] Support address group for ovn driver  https://review.opendev.org/c/openstack/neutron/+/85150906:27
torehaleyb: don't know, what do you think? I was thinking to maybe re-file as an issue in the OVN issue tracker on GitHub (I don't think it's an OVS bug, so I'm not sure why ovs-discuss would be appropriate). That said, if the OVN people that did the bad commit are also using Launchpad (as ihrachys_ suggested in his comment) then maybe it can stay there? Being a bit of a07:22
torenewcomer it can be difficult sometimes to identify where Neutron ends and OVN begins… :)07:22
lajoskatonafnordahl: Hi, I started to play with external-gateway-multihoming feature (https://review.opendev.org/q/topic:2023-aa-l3-gw-multihoming )07:30
lajoskatonafnordahl: and to tell the truth I lost on the API, how I can set enable_default_route_ecmp and enable_default_route_bfd?07:30
opendevreviewSlawek Kaplonski proposed openstack/neutron master: [S-RBAC] Add service role in neutron policy  https://review.opendev.org/c/openstack/neutron/+/88672407:30
lajoskatonafnordahl: by the API def I should see these flags for external_gateway_info and I should be able to set it for the external gws, and for the router as a whole also07:33
opendevreviewMerged openstack/ovsdbapp stable/train: Remove ovsdbapp-tempest-dsvm-networking-ovn-ovs-release job definition  https://review.opendev.org/c/openstack/ovsdbapp/+/89245907:33
lajoskatonafnordahl: I have enable_default_route_bfd & enable_default_route_ecmp True in my neutron.conf, do I need anything else?07:38
fricklerralonsoh: moving the MTU discussion over here, someone just showed me https://bugzilla.redhat.com/show_bug.cgi?id=1833813#c3 which seems related, too, but I'm not sure what it says about which scenario should be supported or not07:38
ralonsohfrickler, yes, this BZ is related. I'm finishing a couple of tasks now but I've raised this question internally07:39
ralonsohbut yes, this is related07:39
ralonsohfrickler, btw, the LP bug is https://bugs.launchpad.net/neutron/+bug/202865107:39
fricklerralonsoh: the latter is a different issue, not mtu related?07:42
ralonsohfrickler, it is, the problem is that you can't read private comments07:43
ralonsohfrickler, actually that was an issue in the kernel07:44
ralonsohfrom the BZ07:44
ralonsohPrivate07:44
ralonsohDescription Roman Safronov 2020-05-10 19:57:56 UTC07:44
ralonsohDescription of problem:07:44
ralonsohOn OSP16.1 installed with default MTU settings sending UDP/ICMP packets from internal network to external with sizes higher than MTU results with 100% packet loss regardless of setting ovn_emit_need_to_frag=True in ml2.07:44
ralonsoh[heat-admin@controller-0 ~]$ sudo podman exec -it neutron_api crudini --get /etc/neutron/plugins/ml2/ml2_conf.ini ovn ovn_emit_need_to_frag07:45
ralonsohTrue07:45
ralonsoh[heat-admin@controller-0 ~]$ sudo ovs-appctl -t ovs-vswitchd   dpif/show-dp-features br-int | grep "Check pkt length action"07:45
ralonsohCheck pkt length action: Yes07:45
ralonsohExternal network- flat, MTU 150007:45
ralonsohInternal network geneve, MTU 144207:45
ralonsohMade the following attempts:07:45
ralonsohNETCAT (from VM on internal network to external network)07:45
ralonsoh$ cat 1400_bytes_file | nc -u 10.0.0.178 6500007:45
ralonsohFile reached the external network successfully - OK07:45
ralonsoh$ cat 1600_bytes_file | nc -u 10.0.0.178 6500007:45
ralonsohFile did not reach the external network - NOT OK07:45
ralonsohPING - Size smaller than MTU, works - OK07:45
ralonsoh$ ping 10.0.0.178 -s 140007:45
ralonsohPING 10.0.0.178 (10.0.0.178) 1400(1428) bytes of data.07:45
ralonsoh1408 bytes from 10.0.0.178: icmp_seq=1 ttl=63 time=4.60 ms07:45
ralonsoh^C07:45
ralonsoh--- 10.0.0.178 ping statistics ---07:45
ralonsoh1 packets transmitted, 1 received, 0% packet loss, time 0ms07:45
ralonsohrtt min/avg/max/mdev = 4.602/4.602/4.602/0.000 ms07:45
ralonsohPING - Size bigger than MTU, does not work, regardless of -M dont, -M want settings - NOT OK07:45
ralonsoh$ ping 10.0.0.178 -s 1600 -M dont07:45
ralonsohPING 10.0.0.178 (10.0.0.178) 1600(1628) bytes of data.07:45
ralonsohFrom 192.168.1.1 icmp_seq=1 Frag needed and DF set (mtu = 1482)07:45
ralonsohFrom 192.168.1.1 icmp_seq=2 Frag needed and DF set (mtu = 1482)07:45
ralonsoh^C07:45
ralonsoh--- 10.0.0.178 ping statistics ---07:45
ralonsoh2 packets transmitted, 0 received, +2 errors, 100% packet loss, time 1001ms07:45
ralonsoh$ ping 10.0.0.178 -s 1600 -M want07:45
ralonsohPING 10.0.0.178 (10.0.0.178) 1600(1628) bytes of data.07:46
ralonsohFrom 192.168.1.1 icmp_seq=1 Frag needed and DF set (mtu = 1482)07:46
ralonsohFrom 192.168.1.1 icmp_seq=2 Frag needed and DF set (mtu = 1482)07:46
ralonsoh^C07:46
ralonsoh--- 10.0.0.178 ping statistics ---07:46
ralonsoh2 packets transmitted, 0 received, +2 errors, 100% packet loss, time 1002ms07:46
ralonsohmaximal working size with ping 141407:46
ralonsohThe same scenarios were tested with OSP16.1 using ML2/OVS and same type of traffic was able to reach external network.07:46
ralonsohVersion-Release number of selected component (if applicable):07:46
ralonsoh16.1-RHEL-8/RHOS-16.1-RHEL-8-20200505.n.007:46
ralonsohHow reproducible:07:46
ralonsoh100%07:46
ralonsohSteps to Reproduce:07:46
ralonsoh1. Create external network, internal network, router, connect both networks to the router, keypair, security group with rules allowing icmp, ssh, udp.07:46
ralonsoh2. Launch instance on the internal network using created keypair and security group07:46
ralonsoh3. Using netcat try to send a UDP packet from the instance to the external network addreess which is smaller (e.g. 1400 bytes) and then bigger (e.g. 1600 bytes) than MTU size 07:46
ralonsoh4 Try to ping with same sizes07:46
ralonsohActual results:07:46
ralonsohUDP/ICMP packets with size bigger than MTU do not reach external network 07:46
ralonsohExpected results:07:46
ralonsohUDP/ICMP packets with size bigger than MTU reach external network successfully after fragmenting and reassembling 07:46
ralonsohAdditional info:07:46
ralonsohRoman Safronov 2020-05-10 19:59:47 UTC07:46
ralonsohBlocks: 154707407:46
ralonsohPrivate07:46
ralonsohComment 1 Roman Safronov 2020-05-10 20:08:34 UTC07:46
ralonsohpuppet-ovn-15.4.1-0.20200311045730.192ac4e.el8ost.noarch07:47
ralonsohpython3-networking-ovn-7.1.1-0.20200505113427.071bd83.el8ost.noarch07:47
ralonsohovn2.13-2.13.0-18.el8fdp.x86_6407:47
ralonsohopenvswitch2.13-2.13.0-18.el8fdp.x86_6407:47
ralonsohMike Burns 2020-05-10 20:20:21 UTC07:47
ralonsohInternal Whiteboard: DFG:Networking Squad:OVN07:47
ralonsohPrivate07:47
ralonsohComment 2 Roman Safronov 2020-05-10 20:31:04 UTC07:47
ralonsoh[heat-admin@controller-0 ~]$ ovn-nbctl show 07:47
ralonsohswitch fef954a0-dfca-4a68-8b87-1c993a1ec2ce (neutron-3d88807d-1415-45e9-a9d5-9849c545d44b) (aka external)07:47
ralonsoh    port fe4ea8f7-1163-44db-b1e4-60222155b43007:47
ralonsoh        addresses: ["fa:16:3e:f1:28:ed 10.0.0.178"]07:47
ralonsoh    port provnet-3d88807d-1415-45e9-a9d5-9849c545d44b07:47
ralonsoh        type: localnet07:47
ralonsoh        addresses: ["unknown"]07:47
ralonsoh    port 2e0ba96d-a448-41a9-892d-ae2d3a8d21e807:47
ralonsoh        type: localport07:47
ralonsoh        addresses: ["fa:16:3e:1d:44:e2 10.0.0.151"]07:47
ralonsoh    port 05fbf01e-bb99-4129-8ddd-e2262fac3a7b07:47
ralonsoh        type: router07:47
ralonsoh        router-port: lrp-05fbf01e-bb99-4129-8ddd-e2262fac3a7b07:47
ralonsohswitch f366bc5f-166f-4e8c-a29e-ead50b5dfdc1 (neutron-040e120f-2743-4ab7-ae24-7864d21def9a) (aka internal_A)07:47
ralonsoh    port 8537fd46-0eff-4d19-91b0-58031f18cfed07:47
ralonsoh        type: router07:47
ralonsoh        router-port: lrp-8537fd46-0eff-4d19-91b0-58031f18cfed07:47
ralonsoh    port 3b68cc85-9fef-4485-8448-3fee5f4d83f407:47
ralonsoh        addresses: ["fa:16:3e:f0:b7:a7 192.168.1.188"]07:47
ralonsoh    port 877d4203-dff9-4968-bb58-990c3183a46807:48
ralonsoh        addresses: ["fa:16:3e:33:20:b9 192.168.1.84"]07:48
ralonsoh    port 50086416-8719-4e7c-816a-d424b4f42d8907:48
ralonsoh        type: localport07:48
ralonsoh        addresses: ["fa:16:3e:74:62:ec 192.168.1.2"]07:48
ralonsohrouter 9586a768-8b0f-4c00-815e-ae05e94929f5 (neutron-ce6c4dbf-3698-4303-bd33-82f37f8975fd) (aka routerA)07:48
ralonsoh    port lrp-05fbf01e-bb99-4129-8ddd-e2262fac3a7b07:48
ralonsoh        mac: "fa:16:3e:92:da:29"07:48
ralonsoh        networks: ["10.0.0.177/24"]07:48
ralonsoh        gateway chassis: [9cb5b6d6-b468-47bc-a18c-0a9e4544ab72 0d2347bf-ae10-43c7-8a6c-7dad0e31205d 264ffaed-01d3-450b-8a7d-34b8211c5555]07:48
ralonsoh    port lrp-8537fd46-0eff-4d19-91b0-58031f18cfed07:48
ralonsoh        mac: "fa:16:3e:e2:8b:4c"07:48
ralonsoh        networks: ["192.168.1.1/24"]07:48
ralonsoh    nat 63687bcd-2304-4d13-9a07-ba9a41bf123f07:48
ralonsoh        external ip: "10.0.0.177"07:48
ralonsoh        logical ip: "192.168.1.0/24"07:48
ralonsoh        type: "snat"07:48
ralonsoh    nat efc57895-a5fa-4b2c-a110-9b706c10d91807:48
ralonsoh        external ip: "10.0.0.172"07:48
ralonsoh        logical ip: "192.168.1.188"07:48
ralonsoh        type: "dnat_and_snat"07:48
ralonsoh[heat-admin@controller-0 ~]$ ovn-nbctl list logical_router_port07:48
ralonsoh_uuid               : 533d9460-88c5-494d-814a-67612688600e07:48
ralonsohenabled             : []07:48
ralonsohexternal_ids        : {"neutron:network_name"=neutron-3d88807d-1415-45e9-a9d5-9849c545d44b, "neutron:revision_number"="8", "neutron:router_name"="ce6c4dbf-3698-4303-bd33-82f37f8975fd", "neutron:subnet_ids"="0b88748a-3c03-405d-a901-4e9ed3e4948d"}07:48
ralonsohgateway_chassis     : [0105d693-e120-41ee-adf0-1b2849736022, 080486c2-9e2b-45ee-959d-5c3bebe477b6, 6f6fcc99-258c-4d5d-921f-5400331d3ceb]07:48
ralonsohha_chassis_group    : []07:49
ralonsohipv6_prefix         : []07:49
ralonsohipv6_ra_configs     : {}07:49
ralonsohmac                 : "fa:16:3e:92:da:29"07:49
ralonsohname                : lrp-05fbf01e-bb99-4129-8ddd-e2262fac3a7b07:49
ralonsohnetworks            : ["10.0.0.177/24"]07:49
ralonsohoptions             : {gateway_mtu="1500"}07:49
ralonsohpeer                : []07:49
ralonsoh_uuid               : a2cd2303-fa8a-405c-b3ce-70cd074f559507:49
ralonsohenabled             : []07:49
ralonsohexternal_ids        : {"neutron:network_name"=neutron-040e120f-2743-4ab7-ae24-7864d21def9a, "neutron:revision_number"="3", "neutron:router_name"="ce6c4dbf-3698-4303-bd33-82f37f8975fd", "neutron:subnet_ids"="20ea6c57-d7d7-48bf-b373-6fef6180c8dc"}07:49
ralonsohgateway_chassis     : []07:49
ralonsohha_chassis_group    : []07:49
ralonsohipv6_prefix         : []07:49
ralonsohipv6_ra_configs     : {}07:49
ralonsohmac                 : "fa:16:3e:e2:8b:4c"07:49
ralonsohname                : lrp-8537fd46-0eff-4d19-91b0-58031f18cfed07:49
ralonsohnetworks            : ["192.168.1.1/24"]07:49
ralonsohoptions             : {}07:49
ralonsohpeer                : []07:49
ralonsoh[heat-admin@controller-0 ~]$ ovn-nbctl list logical_switch07:49
ralonsoh_uuid               : fef954a0-dfca-4a68-8b87-1c993a1ec2ce07:49
ralonsohacls                : []07:49
ralonsohdns_records         : [57f7eda5-fc8c-47fb-921a-909b59b6e624]07:49
ralonsohexternal_ids        : {"neutron:mtu"="1500", "neutron:network_name"=external, "neutron:qos_policy_id"=null, "neutron:revision_number"="2"}07:49
ralonsohforwarding_groups   : []07:49
ralonsohload_balancer       : []07:50
ralonsohname                : neutron-3d88807d-1415-45e9-a9d5-9849c545d44b07:50
ralonsohother_config        : {mcast_flood_unregistered="false", mcast_snoop="false"}07:50
ralonsohports               : [15e9e7b4-b919-4fe8-a618-9211ea060f2e, 45f0234a-1319-4dad-bbd3-390f63a35e40, 8201a23b-ef36-4c67-927d-6dfafadd1fd7, cfb35313-f87c-4673-81aa-ff7ff31b7610]07:50
ralonsohqos_rules           : []07:50
ralonsoh_uuid               : f366bc5f-166f-4e8c-a29e-ead50b5dfdc107:50
ralonsohacls                : []07:50
ralonsohdns_records         : [765572f9-eeb1-4b2d-91d6-c121bd78f696]07:50
ralonsohexternal_ids        : {"neutron:mtu"="1442", "neutron:network_name"=internal_A, "neutron:qos_policy_id"=null, "neutron:revision_number"="2"}07:50
ralonsohforwarding_groups   : []07:50
ralonsohload_balancer       : []07:50
ralonsohname                : neutron-040e120f-2743-4ab7-ae24-7864d21def9a07:50
ralonsohother_config        : {mcast_flood_unregistered="false", mcast_snoop="false"}07:50
ralonsohports               : [14f7769c-6bab-4a58-b0fc-c11537382aad, 5b57f30f-2822-492d-b178-2bc758311725, 86cbfff9-0c6b-4c15-a3cd-501ffbe5c683, d17bcb48-6db3-4ee6-9586-559b7c459cbf]07:50
ralonsohqos_rules           : []07:50
ralonsohCCIT 2020-05-11 04:31:15 UTC07:50
ralonsohPM Score: 0 → 80007:50
ralonsohPrivate07:50
ralonsohComment 3 Numan Siddique 2020-05-11 16:39:30 UTC07:50
ralonsohIf the VMs are configured with 1442 MTU (geneve), then how can the packets greater than 1442 go out of the VM ?07:50
ralonsohI don't know if it works with ML2OVS or not, but surely it will not work with OVN.07:50
ralonsohWe added the fragmentation support to address use case where the internal geneve networks are of jumbu mtus (i.e 8442),07:50
ralonsohand the external network's MTU is lesser than that.07:50
ralonsoh@Daniel - When we worked on this in core OVN, this usecase is what we discussed right ? 07:50
ralonsoh@can you please test out the scenario I mentioned above ? i.e internal networ MTU > external network MTU.07:50
ralonsohIf there is a requirement to support otherway round, I don't think it will work at the moment.07:51
ralonsohRequest to please raise RFE bugs for the OVN component.07:51
ralonsohThanks07:51
ralonsohCC: nusiddiq@redhat.com07:51
ralonsohNuman Siddique 2020-05-11 16:40:34 UTC07:51
ralonsohCC: dalvarez@redhat.com07:51
ralonsohFlags: needinfo?(dalvarez@redhat.com)07:51
ralonsohPrivate07:51
ralonsohComment 4 Roman Safronov 2020-05-11 17:22:27 UTC07:51
ralonsohRED HAT CONFIDENTIAL07:51
ralonsohI tested it also on an environment with internal network MTU 8442 and external 1500 and the result was like described in the bug, 100% packet loss. Both environments are still available for investigation.07:51
ralonsohPackets greater than MTU should be fragmented and then reassembled on the other side. I tested this scenario with OSP16.1 ML2/OVS and some hardware home router. Both were able to transfer packets from internal network through nat to external network without packet loss and regardless of differences in MTU sizes. I can attach captures if needed, tested UDP and ICMP.07:51
ralonsohSo I expected the same behavior now with OVN after OVN UDP fragmentation support was added. I think customers would expect the same.07:51
ralonsohJakub Libosvar 2020-05-12 13:19:25 UTC07:51
ralonsohPriority: unspecified → high07:51
ralonsohCC: jlibosva@redhat.com07:51
ralonsohAssignee: amuller@redhat.com → lmartins@redhat.com07:51
ralonsohPrivate07:51
ralonsohComment 5 Roman Safronov 2020-05-12 13:39:26 UTC07:51
ralonsohRED HAT CONFIDENTIAL07:51
ralonsohNot blocking BZ 1547074 anymore because as appeared it relates only to south(with bigger mtu) to north(with smaller mtu) scenario.07:51
ralonsohNo longer blocks: 154707407:51
ralonsohCCIT 2020-05-13 04:32:10 UTC07:51
ralonsohPM Score: 800 → 140007:51
ralonsohJames Smith 2020-06-01 16:49:17 UTC07:51
ralonsohBlocks: 184260607:52
ralonsohPrivate07:52
ralonsohComment 6 Lucas Alvares Gomes 2020-06-08 15:41:04 UTC07:52
ralonsohRED HAT CONFIDENTIAL07:52
ralonsoh(In reply to Roman Safronov from comment #4)07:52
ralonsoh> I tested it also on an environment with internal network MTU 8442 and07:52
ralonsoh> external 1500 and the result was like described in the bug, 100% packet07:52
ralonsoh> loss. Both environments are still available for investigation.07:52
ralonsoh> 07:52
ralonsoh> Packets greater than MTU should be fragmented and then reassembled on the07:52
ralonsoh> other side. I tested this scenario with OSP16.1 ML2/OVS and some hardware07:52
ralonsoh> home router. Both were able to transfer packets from internal network07:52
ralonsoh> through nat to external network without packet loss and regardless of07:52
ralonsoh> differences in MTU sizes. I can attach captures if needed, tested UDP and07:52
ralonsoh> ICMP.07:52
ralonsoh> So I expected the same behavior now with OVN after OVN UDP fragmentation07:52
ralonsoh> support was added. I think customers would expect the same.07:52
ralonsohOk thanks for testing it out Roman.07:52
ralonsohI am moving this bug to the OVN component because I don't think there is anything we can do from the OpenStack OVN driver perspective here. From the output/logs provided I can see that the OVN driver is setting the "gateway_mtu" option correctly in the Logical Router Port entry.07:52
ralonsoh@Numan or anyone else from core OVN, please feel free to move it back to us if you think that my take on this is incorrect and we need to do something else in the OpenStack OVN driver.07:52
ralonsohCheers,07:52
ralonsohLucas07:52
ralonsohCC: ctrautma@redhat.com, jishi@redhat.com, ralongi@redhat.com07:52
ralonsohComponent: python-networking-ovn → ovn2.1307:52
ralonsohVersion: 16.1 (Train) → RHEL 8.007:52
ralonsohAssignee: lmartins@redhat.com → ovnteam@redhat.com07:52
ralonsohProduct: Red Hat OpenStack → Red Hat Enterprise Linux Fast Datapath07:53
ralonsohQA Contact: ekuris@redhat.com → jishi@redhat.com07:53
ralonsohengops-jira@redhat.com 2020-06-08 15:45:04 UTC07:53
ralonsohLink ID: PnT-DevOps Jira FD-70607:53
ralonsohPrivate07:53
ralonsohComment 7 Numan Siddique 2020-06-08 16:01:11 UTC07:53
ralonsohRED HAT CONFIDENTIAL07:53
ralonsoh(In reply to Roman Safronov from comment #4)07:53
ralonsoh> I tested it also on an environment with internal network MTU 8442 and07:53
ralonsoh> external 1500 and the result was like described in the bug, 100% packet07:53
ralonsoh> loss. Both environments are still available for investigation.07:53
ralonsoh> 07:53
ralonsoh> Packets greater than MTU should be fragmented and then reassembled on the07:53
ralonsoh> other side. I tested this scenario with OSP16.1 ML2/OVS and some hardware07:53
ralonsoh> home router. Both were able to transfer packets from internal network07:53
ralonsoh> through nat to external network without packet loss and regardless of07:53
ralonsoh> differences in MTU sizes. I can attach captures if needed, tested UDP and07:53
ralonsoh> ICMP.07:53
ralonsoh> So I expected the same behavior now with OVN after OVN UDP fragmentation07:53
ralonsoh> support was added. I think customers would expect the same.07:53
ralonsohHi Lucas,07:53
ralonsohFrom OVN perspective, we send out the ICMP need frag to the sender of the packet.07:53
ralonsohTo debug further, I think the working pcap files for the case of ML2OVS would07:53
ralonsohbe helpful. 07:53
ralonsohHi Roman  - Is this possible?07:53
ralonsohThanks07:53
ralonsohNuman07:53
ralonsohPrivate07:53
ralonsohComment 8 Roman Safronov 2020-06-08 16:10:15 UTC07:54
ralonsohRED HAT CONFIDENTIAL07:54
ralonsohCreated attachment 1696154 [details]07:54
ralonsohML2/OVS ML2/OVN fragmentation parity testing log07:54
ralonsohRoman Safronov 2020-06-08 16:10:47 UTC07:54
ralonsohAttachment #1696154 - Attachment is private: 0 → 107:54
ralonsohRoman Safronov 2020-06-08 16:10:48 UTC07:54
ralonsohComment 8 is private: 0 → 107:54
ralonsohPrivate07:54
ralonsohComment 9 Roman Safronov 2020-06-08 16:24:51 UTC07:54
ralonsohRED HAT CONFIDENTIAL07:54
ralonsohNuman, 'need to frag' ICMP is sent in case a IPv4 packet bigger than external network MTU reaches OVN router from the internal network. BTW, neither 'need to frag' nor IPv6 'packet too big' received in case of IPv6. Regarding IPv6, I think we need to open a new RFE, path MTU discovery does not work there by itself. You can see details in my bug https://bugzilla.redhat.com/show_bug.cgi?id=1839847 , that I opened on 07:54
ralonsohignoring MTU by IPv6.07:54
ralonsohBut anyway, I think we can close this bug as NOTABUG, because, as was concluded in our discussion in the corresponding mail thread it is not expected from OVN router to perform any fragmentation.07:54
ralonsohPS, I attached a log of my parity testing, with tcpdump output seen when sending tcp/udp packets using ML2/OVS and ML2/OVN, that I did couple of weeks ago.07:54
ralonsohPrivate07:54
ralonsohComment 10 mcambria@redhat.com 2020-06-08 16:26:42 UTC07:54
ralonsohRED HAT CONFIDENTIAL07:54
ralonsoh(In reply to Roman Safronov from comment #0)07:54
ralonsoh[deleted]07:54
ralonsoh> Actual results:07:54
ralonsoh> UDP/ICMP packets with size bigger than MTU do not reach external network 07:54
ralonsohWhat is the next hop device for traffic leaving the VM?07:54
ralonsohAre there tcpdump captures of the traffic leaving the VM and entering the this next hop?   Capture on the next hop (hypervisor?) side, with GRO disabled will be needed.07:54
ralonsohIf not, can this be added to the "needednfo"07:54
ralonsohCC: mcambria@redhat.com07:55
ralonsohPrivate07:55
ralonsohComment 11 Roman Safronov 2020-06-08 17:00:41 UTC07:55
ralonsohRED HAT CONFIDENTIAL07:55
ralonsohMichael, 07:55
ralonsohthe next hop device for the traffic leaving the VM is OVN router. Capture on the next-hop network (external network) is empty. As far as I understood from our discussion via mail with Numan and Daniel it is not expected that OVN router will fragment traffic, packets will be dropped and it is OK. The RFE was actually to send a 'need to frag' informing the host that router is not able to fragment. And OVN router sends 07:55
ralonsoh'need to frag' as expected.07:55
ralonsohFolks,07:55
ralonsohin case somebody wants to investigate or get captures, I still have an environment with such setup, you are welcome to login to titan12.lab.eng.tlv2.redhat.com with root/1-8 to see the issue on a live system.07:55
ralonsohAccess to rhel-int (user/pass: cloud-user/1-8) is via vm1 that has a FIP (user/pass: cirros/gocubsgo)07:55
ralonsohPrivate07:55
ralonsohComment 12 mcambria@redhat.com 2020-06-08 19:28:53 UTC07:55
ralonsohRED HAT CONFIDENTIAL07:55
ralonsohReproduced with Roman's help.07:55
ralonsohcat 35k_bytes | nc -u 10.0.0.66 6500007:55
ralonsoh[cloud-user@rhel-int ~]$ sudo tcpdump -n -i eth0 -n -vvvv 'udp and host 10.0.0.66' or icmp 07:55
ralonsohtcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes07:55
ralonsoh15:04:27.915021 IP (tos 0x0, ttl 64, id 531, offset 0, flags [DF], proto UDP (17), length 8220)07:55
ralonsoh    192.168.1.101.40252 > 10.0.0.66.65000: [bad udp cksum 0xec68 -> 0xb036!] UDP, length 819207:55
ralonsoh15:04:27.915323 IP (tos 0x0, ttl 64, id 532, offset 0, flags [DF], proto UDP (17), length 8220)07:55
ralonsoh    192.168.1.101.40252 > 10.0.0.66.65000: [bad udp cksum 0xec68 -> 0xcdc4!] UDP, length 819207:55
ralonsoh15:04:27.915417 IP (tos 0x0, ttl 64, id 533, offset 0, flags [DF], proto UDP (17), length 8220)07:55
ralonsoh    192.168.1.101.40252 > 10.0.0.66.65000: [bad udp cksum 0xec68 -> 0xb05d!] UDP, length 819207:55
ralonsoh15:04:27.915534 IP (tos 0x0, ttl 64, id 534, offset 0, flags [DF], proto UDP (17), length 8220)07:55
ralonsoh    192.168.1.101.40252 > 10.0.0.66.65000: [bad udp cksum 0xec68 -> 0xcdc4!] UDP, length 819207:55
ralonsoh15:04:27.915621 IP (tos 0x0, ttl 64, id 535, offset 0, flags [DF], proto UDP (17), length 3028)07:55
ralonsoh    192.168.1.101.40252 > 10.0.0.66.65000: [bad udp cksum 0xd820 -> 0xb6f9!] UDP, length 300007:56
ralonsoh15:04:27.918476 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)07:56
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54207:56
ralonsoh        IP (tos 0x0, ttl 64, id 531, offset 0, flags [DF], proto UDP (17), length 8220)07:56
ralonsoh    192.168.1.101.40252 > 10.0.0.66.65000: UDP, length 819207:56
ralonsoh15:04:27.918643 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)07:56
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54207:56
ralonsoh        IP (tos 0x0, ttl 64, id 532, offset 0, flags [DF], proto UDP (17), length 8220)07:56
ralonsoh    192.168.1.101.40252 > 10.0.0.66.65000: UDP, length 819207:56
ralonsoh15:04:27.918889 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)07:56
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54207:56
ralonsoh        IP (tos 0x0, ttl 64, id 533, offset 0, flags [DF], proto UDP (17), length 8220)07:56
ralonsoh    192.168.1.101.40252 > 10.0.0.66.65000: UDP, length 819207:56
ralonsoh15:04:27.918921 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)07:56
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54207:56
ralonsoh        IP (tos 0x0, ttl 64, id 534, offset 0, flags [DF], proto UDP (17), length 8220)07:56
ralonsoh    192.168.1.101.40252 > 10.0.0.66.65000: UDP, length 819207:56
ralonsoh15:04:27.919183 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)07:56
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54207:56
ralonsoh        IP (tos 0x0, ttl 64, id 535, offset 0, flags [DF], proto UDP (17), length 3028)07:56
ralonsoh    192.168.1.101.40252 > 10.0.0.66.65000: UDP, length 300007:56
ralonsoh^C07:56
ralonsoh10 packets captured07:56
ralonsoh10 packets received by filter07:56
ralonsoh0 packets dropped by kernel07:56
ralonsoh[cloud-user@rhel-int ~]$ 07:57
ralonsohIt looks like the stack isn't honoring the ICMP need to frag message, or expects something else do offload this function. 07:57
ralonsohI turned off tso (sorry, out of habit) and gso and it didn't help.07:57
ralonsohethtool -k eth0  output in next post.07:57
ralonsohOne thing I wanted to turn off was this, but I'm not allowed to.07:57
ralonsohtx-gso-robust: on [fixed]07:57
ralonsohPrivate07:57
ralonsohComment 13 mcambria@redhat.com 2020-06-08 19:29:05 UTC07:57
ralonsohRED HAT CONFIDENTIAL07:57
ralonsoh[cloud-user@rhel-int ~]$ sudo ethtool -k eth0 07:57
ralonsohFeatures for eth0:07:57
ralonsohrx-checksumming: on [fixed]07:57
ralonsohtx-checksumming: on07:57
ralonsoh        tx-checksum-ipv4: off [fixed]07:57
ralonsoh        tx-checksum-ip-generic: on07:57
ralonsoh        tx-checksum-ipv6: off [fixed]07:57
ralonsoh        tx-checksum-fcoe-crc: off [fixed]07:57
ralonsoh        tx-checksum-sctp: off [fixed]07:57
ralonsohscatter-gather: on07:57
ralonsoh        tx-scatter-gather: on07:57
ralonsoh        tx-scatter-gather-fraglist: off [fixed]07:57
ralonsohtcp-segmentation-offload: off07:57
ralonsoh        tx-tcp-segmentation: off07:57
ralonsoh        tx-tcp-ecn-segmentation: off07:57
ralonsoh        tx-tcp-mangleid-segmentation: off07:57
ralonsoh        tx-tcp6-segmentation: off07:57
ralonsohgeneric-segmentation-offload: off07:57
ralonsohgeneric-receive-offload: on07:57
ralonsohlarge-receive-offload: off [fixed]07:58
ralonsohrx-vlan-offload: off [fixed]07:58
ralonsohtx-vlan-offload: off [fixed]07:58
ralonsohntuple-filters: off [fixed]07:58
ralonsohreceive-hashing: off [fixed]07:58
ralonsohhighdma: on [fixed]07:58
ralonsohrx-vlan-filter: on [fixed]07:58
ralonsohvlan-challenged: off [fixed]07:58
ralonsohtx-lockless: off [fixed]07:58
ralonsohnetns-local: off [fixed]07:58
ralonsohtx-gso-robust: on [fixed]07:58
ralonsohtx-fcoe-segmentation: off [fixed]07:58
ralonsohtx-gre-segmentation: off [fixed]07:58
ralonsohtx-gre-csum-segmentation: off [fixed]07:58
ralonsohtx-ipxip4-segmentation: off [fixed]07:58
ralonsohtx-ipxip6-segmentation: off [fixed]07:58
ralonsohtx-udp_tnl-segmentation: off [fixed]07:58
ralonsohtx-udp_tnl-csum-segmentation: off [fixed]07:58
ralonsohtx-gso-partial: off [fixed]07:58
ralonsohtx-sctp-segmentation: off [fixed]07:58
ralonsohtx-esp-segmentation: off [fixed]07:58
ralonsohtx-udp-segmentation: off [fixed]07:58
ralonsohtls-hw-rx-offload: off [fixed]07:58
ralonsohfcoe-mtu: off [fixed]07:58
ralonsohtx-nocache-copy: off07:58
ralonsohloopback: off [fixed]07:58
ralonsohrx-fcs: off [fixed]07:58
ralonsohrx-all: off [fixed]07:58
ralonsohtx-vlan-stag-hw-insert: off [fixed]07:59
ralonsohrx-vlan-stag-hw-parse: off [fixed]07:59
ralonsohrx-vlan-stag-filter: off [fixed]07:59
ralonsohl2-fwd-offload: off [fixed]07:59
ralonsohhw-tc-offload: off [fixed]07:59
ralonsohesp-hw-offload: off [fixed]07:59
ralonsohesp-tx-csum-hw-offload: off [fixed]07:59
ralonsohrx-udp_tunnel-port-offload: off [fixed]07:59
ralonsohtls-hw-tx-offload: off [fixed]07:59
ralonsohrx-gro-hw: off [fixed]07:59
ralonsohtls-hw-record: off [fixed]07:59
ralonsoh[cloud-user@rhel-int ~]$07:59
ralonsohPrivate07:59
ralonsohComment 14 mcambria@redhat.com 2020-06-08 20:02:08 UTC07:59
ralonsohRED HAT CONFIDENTIAL07:59
ralonsohI reset gso, tso etc. back to the way they were originally.07:59
ralonsohHere is capture using TCP instead of UDP.  07:59
ralonsohcat 35k_bytes | nc -t 10.0.0.66 6500007:59
ralonsoh[cloud-user@rhel-int ~]$07:59
ralonsoh[cloud-user@rhel-int ~]$ sudo tcpdump -n -i eth0 -n -vvvv 'tcp and host 10.0.0.66 and port 65000' or icmp07:59
ralonsohtcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes07:59
ralonsoh15:38:36.967607 IP (tos 0x0, ttl 64, id 56902, offset 0, flags [DF], proto TCP (6), length 60)07:59
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [S], cksum 0xcc7d (incorrect -> 0xc84f), seq 1811514524, win 28840, options [mss 1442,sackOK,TS val 221807159 ecr 0,nop,wscale 7], length 007:59
ralonsoh15:38:36.969448 IP (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto TCP (6), length 60)07:59
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [S.], cksum 0x6601 (correct), seq 2423028385, ack 1811514525, win 26844, options [mss 8960,sackOK,TS val 226898967 ecr 221807159,nop,wscale 7], length 007:59
ralonsoh15:38:36.969464 IP (tos 0x0, ttl 64, id 56903, offset 0, flags [DF], proto TCP (6), length 52)07:59
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xcc75 (incorrect -> 0x1a12), seq 1, ack 1, win 226, options [nop,nop,TS val 221807161 ecr 226898967], length 008:00
ralonsoh15:38:36.969783 IP (tos 0x0, ttl 64, id 56904, offset 0, flags [DF], proto TCP (6), length 7202)08:00
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xe863 (incorrect -> 0x4d07), seq 1:7151, ack 1, win 226, options [nop,nop,TS val 221807161 ecr 226898967], length 715008:00
ralonsoh15:38:36.969846 IP (tos 0x0, ttl 64, id 56909, offset 0, flags [DF], proto TCP (6), length 1094)08:00
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [P.], cksum 0xd087 (incorrect -> 0x02f4), seq 7151:8193, ack 1, win 226, options [nop,nop,TS val 221807161 ecr 226898967], length 104208:00
ralonsoh15:38:36.969878 IP (tos 0x0, ttl 64, id 56910, offset 0, flags [DF], proto TCP (6), length 5772)08:00
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xe2cd (incorrect -> 0xfb84), seq 8193:13913, ack 1, win 226, options [nop,nop,TS val 221807161 ecr 226898967], length 572008:00
ralonsoh15:38:36.970717 IP (tos 0x0, ttl 63, id 65194, offset 0, flags [DF], proto TCP (6), length 64)08:00
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xc6dc (correct), seq 1, ack 1, win 226, options [nop,nop,TS val 226898969 ecr 221807161,nop,nop,sack 1 {7151:8193}], length 008:00
ralonsoh15:38:36.970730 IP (tos 0x0, ttl 64, id 56914, offset 0, flags [DF], proto TCP (6), length 1482)08:00
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0x1587), seq 13913:15343, ack 1, win 226, options [nop,nop,TS val 221807162 ecr 226898969], length 143008:00
ralonsoh15:38:36.971054 IP (tos 0x0, ttl 63, id 65195, offset 0, flags [DF], proto TCP (6), length 72)08:00
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc89 (incorrect -> 0x52cc), seq 1, ack 1, win 366, options [nop,nop,TS val 226898969 ecr 221807161,nop,nop,sack 2 {13913:15343}{7151:8193}], length 008:00
ralonsoh15:38:36.971146 IP (tos 0x0, ttl 64, id 56915, offset 0, flags [DF], proto TCP (6), length 1482)08:00
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0x68f7), seq 1:1431, ack 1, win 226, options [nop,nop,TS val 221807163 ecr 226898969], length 143008:00
ralonsoh15:38:36.971452 IP (tos 0x0, ttl 63, id 65196, offset 0, flags [DF], proto TCP (6), length 72)08:00
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc89 (incorrect -> 0x4ca7), seq 1, ack 1431, win 506, options [nop,nop,TS val 226898970 ecr 221807163,nop,nop,sack 2 {13913:15343}{7151:8193}], length 008:00
ralonsoh15:38:36.971465 IP (tos 0x0, ttl 64, id 56916, offset 0, flags [DF], proto TCP (6), length 2912)08:00
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd7a1 (incorrect -> 0x77c9), seq 1431:4291, ack 1, win 226, options [nop,nop,TS val 221807163 ecr 226898970], length 286008:00
ralonsoh15:38:36.972598 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:00
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:00
ralonsoh        IP (tos 0x0, ttl 64, id 56904, offset 0, flags [DF], proto TCP (6), length 1482)08:00
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 1:1431, ack 1, win 226, options [nop,nop,TS val 221807161 ecr 226898967], length 143008:00
ralonsoh15:38:36.972681 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:01
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:01
ralonsoh        IP (tos 0x0, ttl 64, id 56905, offset 0, flags [DF], proto TCP (6), length 1482)08:01
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 1431:2861, ack 1, win 226, options [nop,nop,TS val 221807161 ecr 226898967], length 143008:01
ralonsoh15:38:36.973557 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:01
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:01
ralonsoh        IP (tos 0x0, ttl 64, id 56906, offset 0, flags [DF], proto TCP (6), length 1482)08:01
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 2861:4291, ack 1, win 226, options [nop,nop,TS val 221807161 ecr 226898967], length 143008:01
ralonsoh15:38:36.973689 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:01
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:01
ralonsoh        IP (tos 0x0, ttl 64, id 56907, offset 0, flags [DF], proto TCP (6), length 1482)08:01
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 4291:5721, ack 1, win 226, options [nop,nop,TS val 221807161 ecr 226898967], length 143008:01
ralonsoh15:38:36.973922 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:01
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:01
ralonsoh        IP (tos 0x0, ttl 64, id 56908, offset 0, flags [DF], proto TCP (6), length 1482)08:01
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 5721:7151, ack 1, win 226, options [nop,nop,TS val 221807161 ecr 226898967], length 143008:01
ralonsoh15:38:36.974139 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:01
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:01
ralonsoh        IP (tos 0x0, ttl 64, id 56910, offset 0, flags [DF], proto TCP (6), length 1482)08:01
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 8193:9623, ack 1, win 226, options [nop,nop,TS val 221807161 ecr 226898967], length 143008:01
ralonsoh15:38:36.974377 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:01
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:01
ralonsoh        IP (tos 0x0, ttl 64, id 56911, offset 0, flags [DF], proto TCP (6), length 1482)08:02
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 9623:11053, ack 1, win 226, options [nop,nop,TS val 221807161 ecr 226898967], length 143008:02
ralonsoh15:38:36.974624 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:02
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:02
ralonsoh        IP (tos 0x0, ttl 64, id 56912, offset 0, flags [DF], proto TCP (6), length 1482)08:02
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 11053:12483, ack 1, win 226, options [nop,nop,TS val 221807161 ecr 226898967], length 143008:02
ralonsoh15:38:36.974798 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:02
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:02
ralonsoh        IP (tos 0x0, ttl 64, id 56913, offset 0, flags [DF], proto TCP (6), length 1482)08:02
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 12483:13913, ack 1, win 226, options [nop,nop,TS val 221807161 ecr 226898967], length 143008:02
ralonsoh15:38:36.975483 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:02
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:02
ralonsoh        IP (tos 0x0, ttl 64, id 56916, offset 0, flags [DF], proto TCP (6), length 1482)08:02
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 1431:2861, ack 1, win 226, options [nop,nop,TS val 221807163 ecr 226898970], length 143008:02
ralonsoh15:38:36.975594 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:02
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:02
ralonsoh        IP (tos 0x0, ttl 64, id 56917, offset 0, flags [DF], proto TCP (6), length 1482)08:02
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 2861:4291, ack 1, win 226, options [nop,nop,TS val 221807163 ecr 226898970], length 143008:02
ralonsoh15:38:37.177215 IP (tos 0x0, ttl 64, id 56918, offset 0, flags [DF], proto TCP (6), length 1482)08:02
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0x4552), seq 1431:2861, ack 1, win 226, options [nop,nop,TS val 221807369 ecr 226898970], length 143008:02
ralonsoh15:38:37.177802 IP (tos 0x0, ttl 63, id 65197, offset 0, flags [DF], proto TCP (6), length 72)08:02
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc89 (incorrect -> 0x44e9), seq 1, ack 2861, win 646, options [nop,nop,TS val 226899176 ecr 221807369,nop,nop,sack 2 {13913:15343}{7151:8193}], length 008:02
ralonsoh15:38:37.177821 IP (tos 0x0, ttl 64, id 56919, offset 0, flags [DF], proto TCP (6), length 1482)08:03
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0x3eee), seq 2861:4291, ack 1, win 226, options [nop,nop,TS val 221807369 ecr 226899176], length 143008:03
ralonsoh15:38:37.177883 IP (tos 0x0, ttl 64, id 56920, offset 0, flags [DF], proto TCP (6), length 1482)08:03
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0x56bf), seq 4291:5721, ack 1, win 226, options [nop,nop,TS val 221807369 ecr 226899176], length 143008:03
ralonsoh15:38:37.178160 IP (tos 0x0, ttl 63, id 65198, offset 0, flags [DF], proto TCP (6), length 72)08:03
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc89 (incorrect -> 0x3ec6), seq 1, ack 4291, win 786, options [nop,nop,TS val 226899177 ecr 221807369,nop,nop,sack 2 {13913:15343}{7151:8193}], length 008:03
ralonsoh15:38:37.178170 IP (tos 0x0, ttl 64, id 56921, offset 0, flags [DF], proto TCP (6), length 1482)08:03
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0x33c0), seq 5721:7151, ack 1, win 226, options [nop,nop,TS val 221807370 ecr 226899177], length 143008:03
ralonsoh15:38:37.178242 IP (tos 0x0, ttl 64, id 56922, offset 0, flags [DF], proto TCP (6), length 1482)08:03
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0x477f), seq 8193:9623, ack 1, win 226, options [nop,nop,TS val 221807370 ecr 226899177], length 143008:03
ralonsoh15:38:37.178302 IP (tos 0x0, ttl 63, id 65199, offset 0, flags [DF], proto TCP (6), length 72)08:03
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc89 (incorrect -> 0x38f0), seq 1, ack 5721, win 850, options [nop,nop,TS val 226899177 ecr 221807369,nop,nop,sack 2 {13913:15343}{7151:8193}], length 008:03
ralonsoh15:38:37.178312 IP (tos 0x0, ttl 64, id 56923, offset 0, flags [DF], proto TCP (6), length 2912)08:03
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd7a1 (incorrect -> 0x7392), seq 9623:12483, ack 1, win 226, options [nop,nop,TS val 221807370 ecr 226899177], length 286008:03
ralonsoh15:38:37.178476 IP (tos 0x0, ttl 63, id 65200, offset 0, flags [DF], proto TCP (6), length 64)08:03
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc81 (incorrect -> 0x6c73), seq 1, ack 8193, win 850, options [nop,nop,TS val 226899177 ecr 221807370,nop,nop,sack 1 {13913:15343}], length 008:03
ralonsoh15:38:37.178485 IP (tos 0x0, ttl 64, id 56925, offset 0, flags [DF], proto TCP (6), length 1482)08:03
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0x1956), seq 12483:13913, ack 1, win 226, options [nop,nop,TS val 221807370 ecr 226899177], length 143008:03
ralonsoh15:38:37.178548 IP (tos 0x0, ttl 64, id 56926, offset 0, flags [DF], proto TCP (6), length 1482)08:03
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0x2b6a), seq 15343:16773, ack 1, win 226, options [nop,nop,TS val 221807370 ecr 226899177], length 143008:03
ralonsoh15:38:37.178606 IP (tos 0x0, ttl 63, id 65201, offset 0, flags [DF], proto TCP (6), length 64)08:03
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc81 (incorrect -> 0x66dd), seq 1, ack 9623, win 850, options [nop,nop,TS val 226899177 ecr 221807370,nop,nop,sack 1 {13913:15343}], length 008:03
ralonsoh15:38:37.178617 IP (tos 0x0, ttl 64, id 56927, offset 0, flags [DF], proto TCP (6), length 2912)08:03
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd7a1 (incorrect -> 0x57a4), seq 16773:19633, ack 1, win 226, options [nop,nop,TS val 221807370 ecr 226899177], length 286008:04
ralonsoh15:38:37.178710 IP (tos 0x0, ttl 63, id 65202, offset 0, flags [DF], proto TCP (6), length 64)08:04
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc81 (incorrect -> 0x6c73), seq 1, ack 9623, win 850, options [nop,nop,TS val 226899177 ecr 221807370,nop,nop,sack 1 {12483:15343}], length 008:04
ralonsoh15:38:37.178719 IP (tos 0x0, ttl 64, id 56929, offset 0, flags [DF], proto TCP (6), length 1482)08:04
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0xfd67), seq 19633:21063, ack 1, win 226, options [nop,nop,TS val 221807370 ecr 226899177], length 143008:04
ralonsoh15:38:37.178776 IP (tos 0x0, ttl 63, id 65203, offset 0, flags [DF], proto TCP (6), length 64)08:04
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc81 (incorrect -> 0x66dd), seq 1, ack 9623, win 850, options [nop,nop,TS val 226899177 ecr 221807370,nop,nop,sack 1 {12483:16773}], length 008:04
ralonsoh15:38:37.178802 IP (tos 0x0, ttl 64, id 56930, offset 0, flags [DF], proto TCP (6), length 1482)08:04
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0x6fe9), seq 9623:11053, ack 1, win 226, options [nop,nop,TS val 221807370 ecr 226899177], length 143008:04
ralonsoh15:38:37.178858 IP (tos 0x0, ttl 63, id 65204, offset 0, flags [DF], proto TCP (6), length 72)08:04
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc89 (incorrect -> 0xc6a8), seq 1, ack 9623, win 850, options [nop,nop,TS val 226899177 ecr 221807370,nop,nop,sack 2 {19633:21063}{12483:16773}], length 008:04
ralonsoh15:38:37.178866 IP (tos 0x0, ttl 64, id 56931, offset 0, flags [DF], proto TCP (6), length 1482)08:04
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0xf0eb), seq 11053:12483, ack 1, win 226, options [nop,nop,TS val 221807370 ecr 226899177], length 143008:04
ralonsoh15:38:37.178928 IP (tos 0x0, ttl 63, id 65205, offset 0, flags [DF], proto TCP (6), length 72)08:04
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc89 (incorrect -> 0xc112), seq 1, ack 11053, win 850, options [nop,nop,TS val 226899177 ecr 221807370,nop,nop,sack 2 {19633:21063}{12483:16773}], length 008:04
opendevreviewRodolfo Alonso proposed openstack/neutron master: Check the device ID to validate if a port is virtual  https://review.opendev.org/c/openstack/neutron/+/89256408:04
ralonsoh15:38:37.178936 IP (tos 0x0, ttl 64, id 56932, offset 0, flags [DF], proto TCP (6), length 2912)08:04
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd7a1 (incorrect -> 0x57a4), seq 16773:19633, ack 1, win 226, options [nop,nop,TS val 221807370 ecr 226899177], length 286008:04
ralonsoh15:38:37.179159 IP (tos 0x0, ttl 63, id 65206, offset 0, flags [DF], proto TCP (6), length 64)08:04
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc81 (incorrect -> 0x1e3e), seq 1, ack 16773, win 850, options [nop,nop,TS val 226899178 ecr 221807370,nop,nop,sack 1 {19633:21063}], length 008:04
ralonsoh15:38:37.179201 IP (tos 0x0, ttl 64, id 56934, offset 0, flags [DF], proto TCP (6), length 2912)08:04
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd7a1 (incorrect -> 0x46e0), seq 21063:23923, ack 1, win 226, options [nop,nop,TS val 221807371 ecr 226899178], length 286008:04
ralonsoh15:38:37.181115 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:04
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:05
ralonsoh        IP (tos 0x0, ttl 64, id 56923, offset 0, flags [DF], proto TCP (6), length 1482)08:05
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 9623:11053, ack 1, win 226, options [nop,nop,TS val 221807370 ecr 226899177], length 143008:05
ralonsoh15:38:37.181206 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:05
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:05
ralonsoh        IP (tos 0x0, ttl 64, id 56924, offset 0, flags [DF], proto TCP (6), length 1482)08:05
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 11053:12483, ack 1, win 226, options [nop,nop,TS val 221807370 ecr 226899177], length 143008:05
ralonsoh15:38:37.181397 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:05
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:05
ralonsoh        IP (tos 0x0, ttl 64, id 56927, offset 0, flags [DF], proto TCP (6), length 1482)08:05
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 16773:18203, ack 1, win 226, options [nop,nop,TS val 221807370 ecr 226899177], length 143008:05
ralonsoh15:38:37.181595 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:05
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:05
ralonsoh        IP (tos 0x0, ttl 64, id 56928, offset 0, flags [DF], proto TCP (6), length 1482)08:05
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 18203:19633, ack 1, win 226, options [nop,nop,TS val 221807370 ecr 226899177], length 143008:05
ralonsoh15:38:37.182380 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:05
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:05
ralonsoh        IP (tos 0x0, ttl 64, id 56932, offset 0, flags [DF], proto TCP (6), length 1482)08:05
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 16773:18203, ack 1, win 226, options [nop,nop,TS val 221807370 ecr 226899177], length 143008:05
ralonsoh15:38:37.182521 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:05
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:05
ralonsoh        IP (tos 0x0, ttl 64, id 56933, offset 0, flags [DF], proto TCP (6), length 1482)08:05
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 18203:19633, ack 1, win 226, options [nop,nop,TS val 221807370 ecr 226899177], length 143008:06
ralonsoh15:38:37.182782 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:06
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:06
ralonsoh        IP (tos 0x0, ttl 64, id 56934, offset 0, flags [DF], proto TCP (6), length 1482)08:06
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 21063:22493, ack 1, win 226, options [nop,nop,TS val 221807371 ecr 226899178], length 143008:06
ralonsoh15:38:37.182923 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:06
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:06
ralonsoh        IP (tos 0x0, ttl 64, id 56935, offset 0, flags [DF], proto TCP (6), length 1482)08:06
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 22493:23923, ack 1, win 226, options [nop,nop,TS val 221807371 ecr 226899178], length 143008:06
ralonsoh15:38:37.183157 IP (tos 0x48, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:06
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:06
ralonsoh        IP (tos 0x48, ttl 64, id 63276, offset 0, flags [DF], proto TCP (6), length 1482)08:06
ralonsoh    192.168.1.101.22 > 10.0.0.66.48360: Flags [.], seq 2867026017:2867027447, ack 2875809594, win 412, options [nop,nop,TS val 221807371 ecr 226899176], length 143008:06
ralonsoh15:38:37.183174 IP (tos 0x48, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:06
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:06
ralonsoh        IP (tos 0x48, ttl 64, id 63277, offset 0, flags [DF], proto TCP (6), length 1482)08:06
ralonsoh    192.168.1.101.22 > 10.0.0.66.48360: Flags [.], seq 1430:2860, ack 1, win 412, options [nop,nop,TS val 221807371 ecr 226899176], length 143008:06
ralonsoh15:38:37.183317 IP (tos 0x48, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:06
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:06
ralonsoh        IP (tos 0x48, ttl 64, id 63278, offset 0, flags [DF], proto TCP (6), length 1324)08:06
ralonsoh    192.168.1.101.22 > 10.0.0.66.48360: Flags [P.], seq 2860:4132, ack 1, win 412, options [nop,nop,TS val 221807371 ecr 226899176], length 127208:06
ralonsoh15:38:37.183561 IP (tos 0x48, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:06
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:06
ralonsoh        IP (tos 0x48, ttl 64, id 63279, offset 0, flags [DF], proto TCP (6), length 1482)08:07
ralonsoh    192.168.1.101.22 > 10.0.0.66.48360: Flags [.], seq 4132:5562, ack 1, win 412, options [nop,nop,TS val 221807371 ecr 226899176], length 143008:07
ralonsoh15:38:37.183650 IP (tos 0x48, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:07
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:07
ralonsoh        IP (tos 0x48, ttl 64, id 63280, offset 0, flags [DF], proto TCP (6), length 1314)08:07
ralonsoh    192.168.1.101.22 > 10.0.0.66.48360: Flags [P.], seq 5562:6824, ack 1, win 412, options [nop,nop,TS val 221807371 ecr 226899176], length 126208:07
ralonsoh15:38:37.385267 IP (tos 0x0, ttl 64, id 56936, offset 0, flags [DF], proto TCP (6), length 1482)08:07
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0x252b), seq 16773:18203, ack 1, win 226, options [nop,nop,TS val 221807577 ecr 226899178], length 143008:07
ralonsoh15:38:37.385803 IP (tos 0x0, ttl 63, id 65207, offset 0, flags [DF], proto TCP (6), length 64)08:07
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc81 (incorrect -> 0x170b), seq 1, ack 18203, win 850, options [nop,nop,TS val 226899384 ecr 221807577,nop,nop,sack 1 {19633:21063}], length 008:07
ralonsoh15:38:37.385822 IP (tos 0x0, ttl 64, id 56937, offset 0, flags [DF], proto TCP (6), length 1482)08:07
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0x0160), seq 18203:19633, ack 1, win 226, options [nop,nop,TS val 221807577 ecr 226899384], length 143008:07
ralonsoh15:38:37.385884 IP (tos 0x0, ttl 64, id 56938, offset 0, flags [DF], proto TCP (6), length 1482)08:07
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0x75dd), seq 21063:22493, ack 1, win 226, options [nop,nop,TS val 221807577 ecr 226899384], length 143008:07
ralonsoh15:38:37.385953 IP (tos 0x0, ttl 63, id 65208, offset 0, flags [DF], proto TCP (6), length 52)08:07
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc75 (incorrect -> 0xc21a), seq 1, ack 21063, win 850, options [nop,nop,TS val 226899384 ecr 221807577], length 008:07
ralonsoh15:38:37.385960 IP (tos 0x0, ttl 64, id 56939, offset 0, flags [DF], proto TCP (6), length 1482)08:07
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0x8e5b), seq 22493:23923, ack 1, win 226, options [nop,nop,TS val 221807577 ecr 226899384], length 143008:07
ralonsoh15:38:37.386052 IP (tos 0x0, ttl 64, id 56940, offset 0, flags [DF], proto TCP (6), length 1482)08:07
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0xeb07), seq 23923:25353, ack 1, win 226, options [nop,nop,TS val 221807577 ecr 226899384], length 143008:07
ralonsoh15:38:37.386121 IP (tos 0x0, ttl 63, id 65209, offset 0, flags [DF], proto TCP (6), length 52)08:07
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc75 (incorrect -> 0xbc84), seq 1, ack 22493, win 850, options [nop,nop,TS val 226899384 ecr 221807577], length 008:07
ralonsoh15:38:37.386130 IP (tos 0x0, ttl 64, id 56941, offset 0, flags [DF], proto TCP (6), length 1482)08:08
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0xe570), seq 25353:26783, ack 1, win 226, options [nop,nop,TS val 221807578 ecr 226899384], length 143008:08
ralonsoh15:38:37.386201 IP (tos 0x0, ttl 64, id 56942, offset 0, flags [DF], proto TCP (6), length 1482)08:08
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0xfd41), seq 26783:28213, ack 1, win 226, options [nop,nop,TS val 221807578 ecr 226899384], length 143008:08
ralonsoh15:38:37.386255 IP (tos 0x0, ttl 63, id 65210, offset 0, flags [DF], proto TCP (6), length 52)08:08
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc75 (incorrect -> 0xb6ee), seq 1, ack 23923, win 850, options [nop,nop,TS val 226899384 ecr 221807577], length 008:08
ralonsoh15:38:37.386264 IP (tos 0x0, ttl 64, id 56943, offset 0, flags [DF], proto TCP (6), length 1482)08:08
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0xf7ab), seq 28213:29643, ack 1, win 226, options [nop,nop,TS val 221807578 ecr 226899384], length 143008:08
ralonsoh15:38:37.386374 IP (tos 0x0, ttl 63, id 65211, offset 0, flags [DF], proto TCP (6), length 52)08:08
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc75 (incorrect -> 0xb158), seq 1, ack 25353, win 850, options [nop,nop,TS val 226899384 ecr 221807577], length 008:08
ralonsoh15:38:37.386384 IP (tos 0x0, ttl 64, id 56944, offset 0, flags [DF], proto TCP (6), length 1482)08:08
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0xd4ae), seq 29643:31073, ack 1, win 226, options [nop,nop,TS val 221807578 ecr 226899384], length 143008:08
ralonsoh15:38:37.386457 IP (tos 0x0, ttl 63, id 65212, offset 0, flags [DF], proto TCP (6), length 52)08:08
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc75 (incorrect -> 0xabc1), seq 1, ack 26783, win 850, options [nop,nop,TS val 226899384 ecr 221807578], length 008:08
ralonsoh15:38:37.386463 IP (tos 0x0, ttl 63, id 65213, offset 0, flags [DF], proto TCP (6), length 52)08:08
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc75 (incorrect -> 0xa62a), seq 1, ack 28213, win 850, options [nop,nop,TS val 226899385 ecr 221807578], length 008:08
ralonsoh15:38:37.386469 IP (tos 0x0, ttl 64, id 56945, offset 0, flags [DF], proto TCP (6), length 2912)08:08
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd7a1 (incorrect -> 0xc8ad), seq 31073:33933, ack 1, win 226, options [nop,nop,TS val 221807578 ecr 226899385], length 286008:08
ralonsoh15:38:37.386533 IP (tos 0x0, ttl 63, id 65214, offset 0, flags [DF], proto TCP (6), length 52)08:08
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc75 (incorrect -> 0xa094), seq 1, ack 29643, win 850, options [nop,nop,TS val 226899385 ecr 221807578], length 008:08
ralonsoh15:38:37.386542 IP (tos 0x0, ttl 64, id 56947, offset 0, flags [DF], proto TCP (6), length 1482)08:08
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0x1966), seq 33933:35363, ack 1, win 226, options [nop,nop,TS val 221807578 ecr 226899385], length 143008:08
ralonsoh15:38:37.386600 IP (tos 0x0, ttl 64, id 56948, offset 0, flags [DF], proto TCP (6), length 458)08:09
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [FP.], cksum 0xce0b (incorrect -> 0xfece), seq 35363:35769, ack 1, win 226, options [nop,nop,TS val 221807578 ecr 226899385], length 40608:09
ralonsoh15:38:37.386605 IP (tos 0x0, ttl 63, id 65215, offset 0, flags [DF], proto TCP (6), length 52)08:09
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc75 (incorrect -> 0x9afe), seq 1, ack 31073, win 850, options [nop,nop,TS val 226899385 ecr 221807578], length 008:09
ralonsoh15:38:37.386761 IP (tos 0x0, ttl 63, id 65216, offset 0, flags [DF], proto TCP (6), length 64)08:09
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc81 (incorrect -> 0x750a), seq 1, ack 31073, win 850, options [nop,nop,TS val 226899385 ecr 221807578,nop,nop,sack 1 {33933:35363}], length 008:09
ralonsoh15:38:37.386772 IP (tos 0x0, ttl 64, id 56949, offset 0, flags [DF], proto TCP (6), length 1482)08:09
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0xcf17), seq 31073:32503, ack 1, win 226, options [nop,nop,TS val 221807578 ecr 226899385], length 143008:09
ralonsoh15:38:37.386930 IP (tos 0x0, ttl 63, id 65217, offset 0, flags [DF], proto TCP (6), length 64)08:09
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc81 (incorrect -> 0x6f74), seq 1, ack 32503, win 850, options [nop,nop,TS val 226899385 ecr 221807578,nop,nop,sack 1 {33933:35363}], length 008:09
ralonsoh15:38:37.386938 IP (tos 0x0, ttl 64, id 56950, offset 0, flags [DF], proto TCP (6), length 1482)08:09
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xd20b (incorrect -> 0x916e), seq 32503:33933, ack 1, win 226, options [nop,nop,TS val 221807578 ecr 226899385], length 143008:09
ralonsoh15:38:37.387220 IP (tos 0x0, ttl 63, id 65218, offset 0, flags [DF], proto TCP (6), length 52)08:09
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc75 (incorrect -> 0x8a3c), seq 1, ack 35363, win 850, options [nop,nop,TS val 226899385 ecr 221807578], length 008:09
ralonsoh15:38:37.387229 IP (tos 0x0, ttl 64, id 56951, offset 0, flags [DF], proto TCP (6), length 458)08:09
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [FP.], cksum 0xce0b (incorrect -> 0xfecd), seq 35363:35769, ack 1, win 226, options [nop,nop,TS val 221807579 ecr 226899385], length 40608:09
ralonsoh15:38:37.387418 IP (tos 0x0, ttl 63, id 65220, offset 0, flags [DF], proto TCP (6), length 64)08:09
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [.], cksum 0xcc81 (incorrect -> 0x5b81), seq 2, ack 35770, win 850, options [nop,nop,TS val 226899386 ecr 221807579,nop,nop,sack 1 {35363:35770}], length 008:09
ralonsoh15:38:37.387645 IP (tos 0x0, ttl 63, id 65219, offset 0, flags [DF], proto TCP (6), length 52)08:09
ralonsoh    10.0.0.66.65000 > 192.168.1.101.50396: Flags [F.], cksum 0x88a3 (correct), seq 1, ack 35770, win 850, options [nop,nop,TS val 226899386 ecr 221807578], length 008:09
ralonsoh15:38:37.387654 IP (tos 0x0, ttl 64, id 56952, offset 0, flags [DF], proto TCP (6), length 52)08:09
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], cksum 0xcc75 (incorrect -> 0x8b12), seq 35770, ack 2, win 226, options [nop,nop,TS val 221807579 ecr 226899386], length 008:09
ralonsoh15:38:37.387748 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:09
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:10
ralonsoh        IP (tos 0x0, ttl 64, id 56945, offset 0, flags [DF], proto TCP (6), length 1482)08:10
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 31073:32503, ack 1, win 226, options [nop,nop,TS val 221807578 ecr 226899385], length 143008:10
ralonsoh15:38:37.387913 IP (tos 0x0, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:10
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:10
ralonsoh        IP (tos 0x0, ttl 64, id 56946, offset 0, flags [DF], proto TCP (6), length 1482)08:10
ralonsoh    192.168.1.101.50396 > 10.0.0.66.65000: Flags [.], seq 32503:33933, ack 1, win 226, options [nop,nop,TS val 221807578 ecr 226899385], length 143008:10
ralonsoh15:38:37.388866 IP (tos 0x48, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:10
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:10
ralonsoh        IP (tos 0x48, ttl 64, id 63298, offset 0, flags [DF], proto TCP (6), length 1482)08:10
ralonsoh    192.168.1.101.22 > 10.0.0.66.48360: Flags [.], seq 13176:14606, ack 1, win 412, options [nop,nop,TS val 221807579 ecr 226899384], length 143008:10
ralonsoh15:38:37.389016 IP (tos 0x48, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:10
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:10
ralonsoh        IP (tos 0x48, ttl 64, id 63299, offset 0, flags [DF], proto TCP (6), length 1482)08:10
ralonsoh    192.168.1.101.22 > 10.0.0.66.48360: Flags [.], seq 14606:16036, ack 1, win 412, options [nop,nop,TS val 221807579 ecr 226899384], length 143008:10
ralonsoh15:38:37.389169 IP (tos 0x48, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:10
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:10
ralonsoh        IP (tos 0x48, ttl 64, id 63301, offset 0, flags [DF], proto TCP (6), length 1482)08:10
ralonsoh    192.168.1.101.22 > 10.0.0.66.48360: Flags [.], seq 17308:18738, ack 1, win 412, options [nop,nop,TS val 221807579 ecr 226899384], length 143008:10
ralonsoh15:38:37.389311 IP (tos 0x48, ttl 254, id 0, offset 0, flags [DF], proto ICMP (1), length 562)08:10
ralonsoh    192.168.1.1 > 192.168.1.101: ICMP 10.0.0.66 unreachable - need to frag (mtu 1482), length 54208:10
ralonsoh        IP (tos 0x48, ttl 64, id 63302, offset 0, flags [DF], proto TCP (6), length 1482)08:10
ralonsoh    192.168.1.101.22 > 10.0.0.66.48360: Flags [.], seq 18738:20168, ack 1, win 412, options [nop,nop,TS val 221807579 ecr 226899384], length 143008:11
ralonsoh^C08:11
ralonsoh96 packets captured08:11
ralonsoh96 packets received by filter08:11
ralonsoh0 packets dropped by kernel08:11
ralonsoh[cloud-user@rhel-int ~]$08:11
ralonsohPrivate08:11
ralonsohComment 15 mcambria@redhat.com 2020-06-09 14:12:22 UTC08:11
ralonsohRED HAT CONFIDENTIAL08:11
ralonsohIt looks like OVN is sending the packets that trigger ICMP fragmentation needed.  Is this intentional?08:11
ralonsohAccording to https://tools.ietf.org/html/rfc1191 packets with DF=1 08:11
ralonsoh "If any of the datagrams08:11
ralonsoh   are too large to be forwarded without fragmentation by some router08:11
ralonsoh   along the path, that router will discard them and return ICMP08:11
ralonsoh   Destination Unreachable messages with a code meaning "fragmentation08:11
ralonsoh   needed and DF set"08:11
ralonsohShouldn't OVN be dropping these?08:11
ralonsohIn the tcp capture in #c14 all the data does eventually get to the destination [1].  But performance is not what it could be.  Each too large packet generates an ICMP message.  Some TCP segments are sent multiple times.  Some are even re-sent with length > MSS long after the sender has seen the ICMP message with the new MSS.08:11
ralonsoh[1] I haven't diff'ed the sent file with the received file.  I don't know if any bits were flipped.  Right now I'm focusing on MTU/MSS.08:11
ralonsohlorenzo bianconi 2020-06-10 08:58:30 UTC08:11
ralonsohCC: lorenzo.bianconi@redhat.com08:11
ralonsohAssignee: ovnteam@redhat.com → lorenzo.bianconi@redhat.com08:11
ralonsohJames Smith 2020-06-10 21:39:32 UTC08:11
ralonsohNo longer blocks: 184260608:11
ralonsohPrivate08:11
ralonsohComment 16 lorenzo bianconi 2020-06-18 16:45:10 UTC08:11
ralonsohRED HAT CONFIDENTIAL08:12
ralonsohLooking at the data attached to the bz and at the ovs/ovn/kernel code I guess we have 2 different scenario:08:12
ralonsohDF (Don't Fragment) bit is set08:12
ralonsoh------------------------------08:12
ralonsohOVN works as expected since it sends an ICMP error message (packet too big) for each incoming frame08:12
ralonsohthat exceed the gw MTU08:12
ralonsohDF (Don't Fragment) bit is not set08:12
ralonsoh----------------------------------08:12
ralonsohthis scenario seems broken to me since OVN continues to send an ICMP error message (packet too big)08:12
ralonsoheven on fragmented traffic (fragment size is lower than gw MTU). I am to reproduce the issue locally08:12
ralonsohand I spotted a possible root cause in the ovs kernel datapath.08:12
ralonsoh@Roman: is it ok to share a rhel kernel scratch build to test the fix in your environment?08:12
ralonsohRegards,08:12
ralonsohLorenzo08:12
ralonsohFlags: needinfo?(rsafrono@redhat.com)08:12
ralonsohPrivate08:12
ralonsohComment 17 Roman Safronov 2020-06-22 08:55:50 UTC08:12
ralonsohRED HAT CONFIDENTIAL08:12
ralonsohLorenzo,08:12
ralonsohI am afraid I have no capacity to verify with kernel scratch builds (I even have no idea how to do this correctly, just replace kernel on openstack nodes?). We are focusing on next OSP release issues, currently it is in code freeze stage.08:12
ralonsohI would suggest to first verify the fix without openstack, may be someone from core ovn qa can help?08:12
ralonsohFlags: needinfo?(rsafrono@redhat.com)08:12
ralonsohPrivate08:12
ralonsohComment 18 lorenzo bianconi 2020-06-25 08:43:52 UTC08:12
ralonsohRED HAT CONFIDENTIAL08:13
ralonsoh(In reply to Roman Safronov from comment #17)08:13
ralonsoh> Lorenzo,08:13
ralonsoh> I am afraid I have no capacity to verify with kernel scratch builds (I even08:13
ralonsoh> have no idea how to do this correctly, just replace kernel on openstack08:13
ralonsoh> nodes?). We are focusing on next OSP release issues, currently it is in code08:13
ralonsoh> freeze stage.08:13
ralonsoh> I would suggest to first verify the fix without openstack, may be someone08:13
ralonsoh> from core ovn qa can help?08:13
ralonsohHi Roman,08:13
ralonsohthe fix I posted for the identified issue has been merged in net tree:08:13
ralonsohhttps://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=17843655708e1941c0653af3cd61be6948e36f4308:13
ralonsohI guess we should give it a whirl in your environment. Please let me know what is the best way to do. I guess I can backport it on rhel and provide you a build to test.08:13
ralonsohRegards,08:13
ralonsohLorenzo08:13
ralonsohFlags: needinfo?(rsafrono@redhat.com)08:13
ralonsohPrivate08:13
ralonsohComment 19 Roman Safronov 2020-06-25 10:11:30 UTC08:13
ralonsohRED HAT CONFIDENTIAL08:13
ralonsoh> Hi Roman,08:13
ralonsoh> 08:13
ralonsoh> the fix I posted for the identified issue has been merged in net tree:08:13
ralonsoh> 08:13
ralonsoh> https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/08:13
ralonsoh> ?id=17843655708e1941c0653af3cd61be6948e36f4308:13
ralonsoh> 08:13
ralonsoh> I guess we should give it a whirl in your environment. Please let me know08:13
ralonsoh> what is the best way to do. I guess I can backport it on rhel and provide08:14
ralonsoh> you a build to test.08:14
ralonsoh> 08:14
ralonsoh> Regards,08:14
ralonsoh> Lorenzo08:14
ralonsohHi Lorenzo,08:14
ralonsohThere is no better way to test it on my environment other than consume an existing FDP build.08:14
ralonsohIs your fix already included in the latest FDP 20.E build?08:14
ralonsohBTW, in case it does we are additionally blocked by the infra issue https://projects.engineering.redhat.com/browse/OSPNET-1908:14
ralonsohFlags: needinfo?(rsafrono@redhat.com) → needinfo?(lorenzo.bianconi@redhat.com)08:14
ralonsohPrivate08:14
ralonsohComment 20 Daniel Alvarez Sanchez 2020-06-26 15:52:39 UTC08:14
ralonsohRED HAT CONFIDENTIAL08:14
ralonsohHey Roman, I think we need a new kernel. @Lorenzo can you patch Roman's setup with the new kernel (rhel 8.2) and re-run the tests?08:14
ralonsohFlags: needinfo?(dalvarez@redhat.com)08:14
ralonsohPrivate08:14
ralonsohComment 21 lorenzo bianconi 2020-06-26 16:23:46 UTC08:14
ralonsohRED HAT CONFIDENTIAL08:14
ralonsoh(In reply to Daniel Alvarez Sanchez from comment #20)08:14
ralonsoh> Hey Roman, I think we need a new kernel. @Lorenzo can you patch Roman's08:14
ralonsoh> setup with the new kernel (rhel 8.2) and re-run the tests?08:14
ralonsoh@Daniel: sure, I will provide a 8.2 scratch build (rpms) to install on the system08:14
ralonsohFlags: needinfo?(lorenzo.bianconi@redhat.com)08:14
ralonsohBrendan Conoboy 2020-06-29 03:34:45 UTC08:14
ralonsohPool ID: sst_networking_fdp08:14
ralonsohPrivate08:14
ralonsohComment 22 lorenzo bianconi 2020-06-29 10:28:01 UTC08:14
ralonsohRED HAT CONFIDENTIAL08:15
ralonsohrelated kernel bz: Red Hathttps://bugzilla.redhat.com/show_bug.cgi?id=185188808:15
ralonsohPrivate08:15
ralonsohComment 23 Roman Safronov 2020-06-29 17:59:03 UTC08:15
ralonsohRED HAT CONFIDENTIAL08:15
ralonsohAs I don't have already my old environment where ovn router was sending ICMP 'need to frag' I installed the attached kernel on all nodes with 16.1 RC puddle (RHOS-16.1-RHEL-8-20200625.n.0).08:15
ralonsohNothing changed. The behavior is same as described in https://bugzilla.redhat.com/show_bug.cgi?id=1850962. Seems like we need to test this on a env where https://bugzilla.redhat.com/show_bug.cgi?id=1850962 is fixed.08:15
ralonsohPrivate08:15
ralonsohComment 24 Roman Safronov 2020-06-29 18:11:22 UTC08:15
ralonsohRED HAT CONFIDENTIAL08:15
ralonsohAddition to the comment, ovn version was  ovn2.13-host-2.13.0-30.el8fdp.x86_64.08:15
ralonsohPrivate08:15
ralonsohComment 25 Roman Safronov 2020-06-30 16:40:54 UTC08:15
ralonsohRED HAT CONFIDENTIAL08:15
ralonsohHi Lorenzo,08:15
ralonsohI have an environment with ovn2.13-2.13.0-37.el8fdp.x86_64 and I would like to retest with the new kernel from https://brewweb.engineering.redhat.com/brew/taskinfo?taskID=2975608108:15
ralonsohHowever I am not able to install kernel rpms:08:15
ralonsoh[heat-admin@controller-0 ~]$ sudo rpm --nodeps -ivh http://download.eng.bos.redhat.com/brewroot/work/tasks/6081/29756081/kernel-core-4.18.0-221.el8.bz1851888.test.cki.net.x86_64.rpm08:15
ralonsohRetrieving http://download.eng.bos.redhat.com/brewroot/work/tasks/6081/29756081/kernel-core-4.18.0-221.el8.bz1851888.test.cki.net.x86_64.rpm08:15
ralonsohcurl: (22) The requested URL returned error: 403 Forbidden08:15
ralonsoherror: skipping http://download.eng.bos.redhat.com/brewroot/work/tasks/6081/29756081/kernel-core-4.18.0-221.el8.bz1851888.test.cki.net.x86_64.rpm - transfer failed08:15
ralonsohDo you have an idea how to proceed?08:15
ralonsohFlags: needinfo?(lorenzo.bianconi@redhat.com)08:15
ralonsohPrivate08:15
ralonsohComment 26 Roman Safronov 2020-07-01 18:28:39 UTC08:15
ralonsohRED HAT CONFIDENTIAL08:16
ralonsohTested on RHOS-16.1-RHEL-8-20200625.n.0  with OVN from next FDP 20.E (not released yet)  ovn2.13-2.13.0-37.el8fdp.x86_64  using a scratch kernel from https://brewweb.engineering.redhat.com/brew/taskinfo?taskID=2975608108:16
ralonsohTested with big ICMP and UDP packets (bigger than MTU of the external network)08:16
ralonsohAll works as expected according the following guidelines:08:16
ralonsohDF=0 --> the device will learn the real MTU and after first pkt, the traffic flows08:16
ralonsohDF=1 --> the router discard the traffic but the sender does not perform fragmentation so traffic does not flow08:16
ralonsohVerified also that TCP traffic passes. 08:16
ralonsohSome details:08:16
ralonsoh[cloud-user@rhel-8-vm ~]$ ip route get 10.0.0.3108:16
ralonsoh10.0.0.31 via 192.168.1.1 dev eth0 src 192.168.1.34 uid 1000 08:16
ralonsoh    cache 08:16
ralonsoh[cloud-user@rhel-8-vm ~]$ ping -s 8900 10.0.0.31 -c 508:16
ralonsohPING 10.0.0.31 (10.0.0.31) 8900(8928) bytes of data.08:16
ralonsohFrom 192.168.1.1 icmp_seq=1 Frag needed and DF set (mtu = 1482)08:16
ralonsoh8908 bytes from 10.0.0.31: icmp_seq=2 ttl=63 time=2.22 ms08:16
ralonsoh8908 bytes from 10.0.0.31: icmp_seq=3 ttl=63 time=1.49 ms08:16
ralonsoh8908 bytes from 10.0.0.31: icmp_seq=4 ttl=63 time=1.31 ms08:16
ralonsoh8908 bytes from 10.0.0.31: icmp_seq=5 ttl=63 time=1.21 ms08:16
ralonsoh--- 10.0.0.31 ping statistics ---08:16
ralonsoh5 packets transmitted, 4 received, +1 errors, 20% packet loss, time 12ms08:16
ralonsohrtt min/avg/max/mdev = 1.208/1.557/2.222/0.398 ms08:16
ralonsoh[cloud-user@rhel-8-vm ~]$ 08:16
ralonsoh[cloud-user@rhel-8-vm ~]$ ip route get 10.0.0.3108:16
ralonsoh10.0.0.31 via 192.168.1.1 dev eth0 src 192.168.1.34 uid 1000 08:16
ralonsoh    cache expires 591sec mtu 148208:16
ralonsohFlags: needinfo?(lorenzo.bianconi@redhat.com)08:16
ralonsohRoman Safronov 2020-07-06 10:34:52 UTC08:16
ralonsohBlocks: 185408408:17
ralonsohRHEL Program Management Team 2020-07-07 14:23:56 UTC08:17
ralonsohPM Score: 1400 → 60008:17
ralonsohlorenzo bianconi 2020-07-09 10:40:13 UTC08:17
ralonsohStatus: NEW → POST08:17
ralonsohRoman Safronov 2020-07-22 09:45:21 UTC08:17
ralonsohDepends On: Red Hat185414908:17
ralonsohRoman Safronov 2020-07-23 17:09:09 UTC08:17
ralonsohDepends On: Red Hat185188808:17
ralonsohPrivate08:17
ralonsohComment 27 Roman Safronov 2020-09-30 13:44:31 UTC08:17
ralonsohRED HAT CONFIDENTIAL08:17
ralonsohTested on RHOS-16.1-RHEL-8-20200925.n.1 (ovn2.13-20.06.2-11.el8fdp.x86_64)  with kernel updated on all overcloud nodes to kernel-4.18.0-193.20.1.el8_2 (AFAIU not released yet, according to Red Hathttps://bugzilla.redhat.com/show_bug.cgi?id=1860169 GA planned to 2020-10-20)08:17
ralonsohWith updated kernel (kernel-4.18.0-193.20.1.el8_2) udp fragmentation worked. With default kernel (4.18.0-193.19.1.el8_2.x86_64) fragmentation did not work.08:17
ralonsohFederico Iezzi 2020-10-02 08:53:28 UTC08:17
ralonsohCC: fiezzi@redhat.com08:17
ralonsohPrivate08:17
ralonsohComment 28 Dan Williams 2020-11-10 14:50:58 UTC08:17
ralonsohRED HAT CONFIDENTIAL08:17
ralonsohkernel fixed at least as of RHSA-2020:4286-10 (kernel-4.18.0-193.28.1.el8_2) and FDP 20.H ovn release.08:17
ralonsohStatus: POST → CLOSED08:17
ralonsohCC: dcbw@redhat.com08:17
ralonsohResolution: --- → ERRATA08:17
ralonsohLast Closed: 2020-11-10 14:50:5808:17
ralonsohJianlin Shi 2021-05-31 01:11:52 UTC08:17
ralonsohQA Whiteboard: ovn/regression/bz1846300_ipv6_ignore_gateway_mtu08:17
ralonsohFlags: qe_test_coverage+08:18
ralonsohsorry!08:18
ralonsohwhat I've done... sorry08:18
ralonsohfrickler, I had an incorrect copy/paste buffer. Please check https://bugzilla.redhat.com/show_bug.cgi?id=1833813#c2608:18
frickleroh, it has ended, wow08:25
fricklerralonsoh: well that does talk only about south->north traffik, right? I can try to test that, too, but that was the least probably scenario to me. All other directions were broken in my tests08:27
ralonsohthey also tested E/W traffic08:28
fricklerwhich is also broken for me, in the scenario that I reduce the network MTU via neutron on one of the tenant networks08:29
frickleralso the comment #26 that you link to doesn't mention the actual MTU on the instance that is being tested from08:30
ralonsohthe MTU instance interface must be the same of the network08:30
ralonsohthat value wasn't changed08:31
frickleryes, but which value does it have in that test?08:31
ralonsohPING 10.0.0.31 (10.0.0.31) 8900(8928) bytes of data.08:31
ralonsohso it was using jumbo frames in this network08:32
fricklerthat's the ping size, I want to see the mtu of eth0 or the network08:32
ralonsohadn then08:32
ralonsohFrom 192.168.1.1 icmp_seq=1 Frag needed and DF set (mtu = 1482)08:32
ralonsohI don't have this value08:32
frickleryes, so the information in that test is incomplete, that's what I'm saying08:33
frickleralso some earlier comment mentions ovn_emit_need_to_frag , is that something that neutron needs to set? or a deployer?08:34
opendevreviewElvira García Ruiz proposed openstack/neutron master: [OVN] Fix burst limit for stateless security groups  https://review.opendev.org/c/openstack/neutron/+/89264808:34
ralonsohfrickler, this is a ml2 config configuration parameter08:36
ralonsohhttps://opendev.org/openstack/neutron/src/branch/master/neutron/conf/plugins/ml2/drivers/ovn/ovn_conf.py#L19608:36
ralonsohthat is False by default08:36
ralonsohso yes, this is something configurable08:36
fricklerso that might resolve at least some of the issues. I'm going to test that in a bit. maybe it also should default to true by now, at least in devstack08:37
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Skip the port status UP update during a live migration  https://review.opendev.org/c/openstack/neutron/+/88876909:03
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN][Trunk] Set the subports correct host during live migration  https://review.opendev.org/c/openstack/neutron/+/88877609:11
racostaHi ralonsoh, If you know the answer... is there any reason for Neutron to create an entry in the HA_Chassis_Group table for each Logical Router (OVN case - 1:1 mapping)? shouldn't it just be for the external ports linked to the network nodes?11:25
ralonsohracosta, I can't reply right now, give me 1 hour11:28
racostaOk, no worries. It's just a technical question... I'm evaluating results on a large scale , and I've received feedback from the core folks at OVN about an inefficient recompute of the SB Port_Binding table entries (because of the HA_Chassis_Group table references).11:28
ralonsohracosta, ah, that's easy: currently we have only two schedulers11:28
ralonsohand both use HA_Chassis_Group to assign the LRP to this "HA_Chassis_Group"11:29
ralonsohthat's the reason11:29
racostahttps://mail.openvswitch.org/pipermail/ovs-discuss/2023-August/052614.html11:29
ralonsohracosta, I was in the middle of creating a OVN scheduler using the HA_Chassis, instead of the HA_Chassis_Group11:30
ralonsohracosta, https://review.opendev.org/c/openstack/neutron/+/87203311:31
racostaHum, ok. I read your paper (https://rodolfo-alonso.com/ha_router_gateway_ports_in_ovn) and the openstack doc (https://docs.openstack.org/neutron/latest/admin/ovn/external_ports.html), but it wasn't clear to me. 11:31
ralonsohbut I didn't have time to complete it11:31
racostaoh, nice! thanks for clarifying.11:32
racostaIt's not a problem for now, the OVN core guys are working to improve it in future versions of OVN (considering the current use of HA_Chassis_Group table in the northd recompute process)11:34
racostaHi iurygregory, nice to see another Brazilian guy here! congrats on your performance in the OpenInfra video/quiz in Vancouver ;)12:00
iurygregoryracosta, hey o/ tks! :D 12:02
lucasagomesralonsoh, ihrachys_ hi there, if you have some time today or in the next few days mind taking a quick look at https://review.opendev.org/c/openstack/neutron/+/888127 ? Thanks12:43
ralonsohsure12:45
ihrachys_will do12:47
lucasagomesthanks!12:57
opendevreviewYann Morice proposed openstack/neutron master: Add two new l3 ovn schedulers (azchance, azleastloaded) that ensure LRP gateways are distributed over chassis in the different eligible AZs.  https://review.opendev.org/c/openstack/neutron/+/89260413:59
opendevreviewYann Morice proposed openstack/neutron master: [ovn] AZs distribution in L3 port scheduler  https://review.opendev.org/c/openstack/neutron/+/89260414:02
fricklerralonsoh: in my testing there was no change in any of the scenarios. looking at this code neutron/plugins/ml2/drivers/ovn/mech_driver/ovsdb/ovn_client.py it seems like it really only deals with the case that mtu(tenant) > mtu(external), no idea what would happen if we change that ">" to "!=". anyway I'm done with that issue for now14:09
ralonsohfrickler, sorry, I'm in a call now14:10
mtomaskao/ Looking for an example where unittest checks that something was logged using oslo_log. I am aware of python standard assertLogs but wondering if there is something special with oslo_log module. Thanks!14:19
opendevreviewyatin proposed openstack/neutron stable/2023.1: Send ovn heatbeat more often.  https://review.opendev.org/c/openstack/neutron/+/89259214:57
opendevreviewBrian Haley proposed openstack/neutron master: Catch non-existent entry failures better in ip_lib  https://review.opendev.org/c/openstack/neutron/+/89123615:22
*** TheJulia is now known as confused15:34
*** confused is now known as TheJulia15:34
opendevreviewFernando Royo proposed openstack/ovn-octavia-provider master: Allow multiple VIPs per LB  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/88511115:37
opendevreviewFernando Royo proposed openstack/ovn-octavia-provider master: Allow multiple VIPs per LB  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/88511116:07
haleybmtomaska: something like test_periodic_resync_helper_with_event() ?  I just searched for 'log.assert' and that was one line16:11
mtomaskathanks haleyb, Ill check it out16:26
opendevreviewMiro Tomaska proposed openstack/neutron master: OVN Metadata handle process execeptions  https://review.opendev.org/c/openstack/neutron/+/89098617:47
haleybtore: just noticed your response way back, but after reading the bug seems like ihrachys_ was going to ping Numan, so perhaps it's all set for now?17:55
ihrachys_haleyb numan will be back in 2 weeks only. so it would help to have dump-flows17:56
ihrachys_ah I see them attached, great17:56
haleybhaleyb: ack, and thanks for taking a look!17:56
haleybdoh, meant ihrachys_ :)17:57
ihrachys_I will check these dumps next week if no one beats me to it.17:57
torehaleyb, ihrachys_: great! I'm off on a mini holiday, back Tuesday, so next week is perfect :)18:18
opendevreviewMiro Tomaska proposed openstack/neutron master: Fix ovn-metadata agent sync of unused namespaces  https://review.opendev.org/c/openstack/neutron/+/89123219:19
opendevreviewBrian Haley proposed openstack/neutron stable/2023.1: Remove duplicate rows in MySQL query output  https://review.opendev.org/c/openstack/neutron/+/89259821:33
opendevreviewBrian Haley proposed openstack/neutron stable/2023.1: Add scope ID to the "GROUP BY" clause in ``get_scoped_floating_ips``  https://review.opendev.org/c/openstack/neutron/+/89259921:33
opendevreviewBrian Haley proposed openstack/neutron stable/2023.1: Add scope ID to the "GROUP BY" clause in ``get_scoped_floating_ips``  https://review.opendev.org/c/openstack/neutron/+/89259921:47
opendevreviewBrian Haley proposed openstack/neutron stable/2023.1: Add scope ID to the "GROUP BY" clause in ``get_scoped_floating_ips``  https://review.opendev.org/c/openstack/neutron/+/89259921:55
opendevreviewMerged openstack/neutron stable/2023.1: Send ovn heatbeat more often.  https://review.opendev.org/c/openstack/neutron/+/89259222:06

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!