Thank you, is there any where we can see what commits are part of which release?
On Fri, Apr 29, 2016 at 4:02 PM, Jesse Gross <je...@kernel.org> wrote: > On Fri, Apr 29, 2016 at 12:11 PM, Michael Ben-Ami > <mben...@digitalocean.com> wrote: > > > > OVS version: > > > > ovs-ofctl (Open vSwitch) 2.3.2 > > Compiled Aug 24 2015 18:39:15 > > OpenFlow versions 0x1:0x4 > > > > Linux version: > > > > Linux version 3.13.0-52-generic (buildd@comet) (gcc version 4.8.2 > (Ubuntu 4.8.2-19ubuntu1) ) #86-Ubuntu SMP Mon May 4 04:32:59 UTC 2015 > > > > When IP-fragemented UDP datagrams hit a rule that looks like: > > > > cookie=0x0, duration=176936.052s, table=1, n_packets=68911, > n_bytes=8452972, idle_age=8, hard_age=65534, > priority=1020,ip,dl_dst=04:01:d7:6f:80:01,nw_dst=xx.xx.104.241 > actions=strip_vlan,mod_nw_dst:10.19.0.5,output:10 > > > > All IP traffic that hits this flow is successfully received by the VM > with IP address 10.19.0.5, besides UDP traffic that is IP fragmented. > > > > We used netcat and wireshark to test. An example case is a VM receiving > 5000 bytes of UDP traffic over netcat. If the sender does UDP segmentation > to sizes of 2048, 2048, and 904 bytes, and the first two segments are > further IP fragmented on the wire (before hitting OVS), the listening > netcat on the VM will receive 904 bytes, and the counter of Udp > InCsumErrors in netstat -su output will increase by 2. > > I looks like you should upgrade to 2.3.3 (or later). I see the > following commit that will presumably fix the problem: > 8247b1ac ("datapath: Fix L4 checksum handling when dealing with IP > fragments") >
_______________________________________________ discuss mailing list discuss@openvswitch.org http://openvswitch.org/mailman/listinfo/discuss