From patchwork Tue Jan 9 18:54:30 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Zoltan Balogh X-Patchwork-Id: 857672 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (mailfrom) smtp.mailfrom=openvswitch.org (client-ip=140.211.169.12; helo=mail.linuxfoundation.org; envelope-from=ovs-dev-bounces@openvswitch.org; receiver=) Received: from mail.linuxfoundation.org (mail.linuxfoundation.org [140.211.169.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 3zGLt06ZlLz9s4q for ; Wed, 10 Jan 2018 05:54:48 +1100 (AEDT) Received: from mail.linux-foundation.org (localhost [127.0.0.1]) by mail.linuxfoundation.org (Postfix) with ESMTP id D2E8AE31; Tue, 9 Jan 2018 18:54:45 +0000 (UTC) X-Original-To: dev@openvswitch.org Delivered-To: ovs-dev@mail.linuxfoundation.org Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org [172.17.192.35]) by mail.linuxfoundation.org (Postfix) with ESMTPS id 29CF5E22 for ; Tue, 9 Jan 2018 18:54:45 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.7.6 Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37]) by smtp1.linuxfoundation.org (Postfix) with ESMTPS id D3925557 for ; Tue, 9 Jan 2018 18:54:43 +0000 (UTC) X-AuditID: c1b4fb25-473ff7000000341b-52-5a550ff170bf Received: from ESESSHC014.ericsson.se (Unknown_Domain [153.88.183.60]) by sesbmg23.ericsson.net (Symantec Mail Security) with SMTP id 79.FC.13339.1FF055A5; Tue, 9 Jan 2018 19:54:42 +0100 (CET) Received: from labserv2.eth.ericsson.se (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.62) with Microsoft SMTP Server id 14.3.352.0; Tue, 9 Jan 2018 19:54:41 +0100 Received: from dell11.sdn.hu.eld.ericsson.se (unknown [10.58.48.15]) by labserv2.eth.ericsson.se (Postfix) with ESMTP id 2BE2F29C72C; Tue, 9 Jan 2018 19:47:46 +0100 (CET) From: Zoltan Balogh To: , Date: Tue, 9 Jan 2018 19:54:30 +0100 Message-ID: <20180109185433.23945-1-zoltan.balogh@ericsson.com> X-Mailer: git-send-email 2.15.1 MIME-Version: 1.0 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFmpnluLIzCtJLcpLzFFi42KZGbHdRvcTf2iUwdlzXBZHT+9hdmD0eHbz P2MAYxSXTUpqTmZZapG+XQJXxr4jF5gKfnBWzGv/wtLA2MXRxcjJISFgIrH3SB9rFyMXh5DA YUaJ2Z8fs0E4mxklvkz/C+WsZ5Q4tugMC0gLm4CBxI/LX5i6GDk4RATMJVb9sQUJMwvoSTw5 eoQJxBYWsJH4uHYnG4jNIqAisX7jbnYQm1fAXuLkv8uMEJvlJSZsaWKBiAtKnJz5hAVijoTE wRcvmEFsIQF1iUMtr9kmMPLNQlI2C0nZAkamVYyixanFSbnpRsZ6qUWZycXF+Xl6eaklmxiB wXNwy2/VHYyX3zgeYhTgYFTi4U0CBpUQa2JZcWXuIUYJDmYlEV7f+cFRQrwpiZVVqUX58UWl OanFhxilOViUxHlPevJGCQmkJ5akZqemFqQWwWSZODilGhjTiz83zHec4N2sFeYQf1K0Zu3r XJ7jsp5OWrUlW1i78yrlLJ7dDui5MfvAshfNpcXvD16zOK209fLZwBl7wv56Br267/lYs9Zu u03FgjjfB1yHj75elJB080HF5Q8szNxibJ0f9514MVNm6REl5ai2sw+EvxU6r3/0ZP2rwy3N D97KrvV+cIdTiaU4I9FQi7moOBEAM2noEhoCAAA= X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_MED autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on smtp1.linux-foundation.org Subject: [ovs-dev] [PATCH v3 0/3] Fix tunnel neighbor cache population X-BeenThere: ovs-dev@openvswitch.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: ovs-dev-bounces@openvswitch.org Errors-To: ovs-dev-bounces@openvswitch.org Currenlty, OVS snoops any ARP or ND packets in any bridge and populates the tunnel neighbor cache with the retreived data. For instance, when ARP reply originated by a tenant is received on an overlay bridge, the ARP message is snooped and tunnel neighbor cache is filled with tenant data, however only tunnel neighbor data should be stored there. In worst case tunnel peer data could be overwritten in the cache. Which triggers revalidation as well. This series resolves the issue, by trying to snoop ARP and ND messages addressing native tunnel end point in current bridge. Zoltan Balogh (3): ofproto-dpif-sflow: propagate actions within clone tests: modify ARP snoop tests for tunneling with clone xlate: call tnl_neigh_snoop() from terminate_native_tunnel() include/sparse/netinet/in.h | 10 +++ ofproto/ofproto-dpif-sflow.c | 16 +++-- ofproto/ofproto-dpif-sflow.h | 4 +- ofproto/ofproto-dpif-upcall.c | 2 +- ofproto/ofproto-dpif-xlate.c | 154 ++++++++++++++++++++++++++++++++++++++++-- tests/ofproto-dpif.at | 2 +- tests/tunnel-push-pop-ipv6.at | 78 +++++++++++++++++++-- tests/tunnel-push-pop.at | 91 +++++++++++++++++++++---- 8 files changed, 321 insertions(+), 36 deletions(-)