Ilya Maximets <[email protected]> writes:
> The permanent neighbor entry for fc00::1 is added into a wrong
> namespace, so in order to reply to a ping from at_ns1, the
> address of fc00::1 has to be discovered.
This is strange - how did it end up in wrong namespace? Is it a race
with the veth setup? I guess we could possibly fix that?
Also, there are some other conntrack tests that seem to have a similar
if/address setup pattern, allowing ND in only one direction - have we
seen them fail as well?
> Interfaces are attached
> to OVS and we're removing flows that can forward ND requests
> after initial setup. In case ND request wasn't sent and replied
> before that, at_ns1 will not be able to discover fc00:1 and won't
> reply to pings.
>
> It's hard to catch this condition while running tests locally,
> but for some reason our CI is failing consistently.
>
> Fix the issue by removing all the unnecessary permanent entries
> and just allowing all the normal traffic to flow through the
> low priority OVS flow, so all addresses can be discovered.
>
> Also adding one more wait to avoid occasional drops of the very
> first packet.
>
> Fixes: 2ff43c78c685 ("packets: Re-calculate IPv6 checksum only for first frag
> upon modify.")
> Signed-off-by: Ilya Maximets <[email protected]>
> ---
> tests/system-traffic.at | 14 +++++++++-----
> 1 file changed, 9 insertions(+), 5 deletions(-)
>
> diff --git a/tests/system-traffic.at b/tests/system-traffic.at
> index 53ae80f4e..33108c5ab 100644
> --- a/tests/system-traffic.at
> +++ b/tests/system-traffic.at
> @@ -237,17 +237,21 @@ ADD_NAMESPACES(at_ns0, at_ns1)
> ADD_VETH(p0, at_ns0, br0, "fc00::1/96", e4:11:22:33:44:55)
> ADD_VETH(p1, at_ns1, br0, "fc00::2/96", e4:11:22:33:44:54)
> NS_CHECK_EXEC([at_ns0], [ip -6 neigh add fc00::3 lladdr e4:11:22:33:44:54
> dev p0])
> -NS_CHECK_EXEC([at_ns0], [ip -6 neigh add fc00::2 lladdr e4:11:22:33:44:54
> dev p0])
> -NS_CHECK_EXEC([at_ns0], [ip -6 neigh add fc00::1 lladdr e4:11:22:33:44:55
> dev p0])
>
> dnl Linux seems to take a little time to get its IPv6 stack in order. Without
> dnl waiting, we get occasional failures due to the following error:
> dnl "connect: Cannot assign requested address"
> OVS_WAIT_UNTIL([ip netns exec at_ns0 ping6 -c 1 fc00::2])
> +OVS_WAIT_UNTIL([ip netns exec at_ns1 ping6 -c 1 fc00::1])
>
> -AT_CHECK([ovs-ofctl del-flows -OOpenFlow15 br0])
> -AT_CHECK([ovs-ofctl add-flow -OOpenFlow15 br0
> in_port=ovs-p0,ipv6,ipv6_dst=fc00::3,ipv6_src=fc00::1,actions=set_field:fc00::2-\>ipv6_dst,ovs-p1])
> -AT_CHECK([ovs-ofctl add-flow -OOpenFlow15 br0
> in_port=ovs-p1,ipv6,ipv6_dst=fc00::1,ipv6_src=fc00::2,actions=set_field:fc00::3-\>ipv6_src,ovs-p0])
> +AT_DATA([flows.txt], [dnl
> +priority=100,in_port=ovs-p0,ipv6,ipv6_src=fc00::1,ipv6_dst=fc00::3,actions=set_field:fc00::2->ipv6_dst,ovs-p1
> +priority=100,in_port=ovs-p1,ipv6,ipv6_src=fc00::2,ipv6_dst=fc00::1,actions=set_field:fc00::3->ipv6_src,ovs-p0
> +priority=0,actions=NORMAL
> +])
> +
> +AT_CHECK([ovs-ofctl del-flows br0])
> +AT_CHECK([ovs-ofctl add-flows br0 flows.txt])
>
> NS_CHECK_EXEC([at_ns0], [ping6 -q -c 3 -i 0.3 -w 2 fc00::3 | FORMAT_PING],
> [0], [dnl
> 3 packets transmitted, 3 received, 0% packet loss, time 0ms
_______________________________________________
dev mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-dev