On Fri, Apr 29, 2016 at 12:11 PM, Michael Ben-Ami
<mben...@digitalocean.com> wrote:
>
> OVS version:
>
> ovs-ofctl (Open vSwitch) 2.3.2
> Compiled Aug 24 2015 18:39:15
> OpenFlow versions 0x1:0x4
>
> Linux version:
>
> Linux version 3.13.0-52-generic (buildd@comet) (gcc version 4.8.2 (Ubuntu 
> 4.8.2-19ubuntu1) ) #86-Ubuntu SMP Mon May 4 04:32:59 UTC 2015
>
> When IP-fragemented UDP datagrams hit a rule that looks like:
>
>  cookie=0x0, duration=176936.052s, table=1, n_packets=68911, n_bytes=8452972, 
> idle_age=8, hard_age=65534, 
> priority=1020,ip,dl_dst=04:01:d7:6f:80:01,nw_dst=xx.xx.104.241 
> actions=strip_vlan,mod_nw_dst:10.19.0.5,output:10
>
> All IP traffic that hits this flow is successfully received by the VM with IP 
> address 10.19.0.5, besides UDP traffic that is IP fragmented.
>
> We used netcat and wireshark to test. An example case is a VM receiving 5000 
> bytes of UDP traffic over netcat. If the sender does UDP segmentation to 
> sizes of 2048, 2048, and 904 bytes, and the first two segments are further IP 
> fragmented on the wire (before hitting OVS), the listening netcat on the VM 
> will receive 904 bytes, and the counter of Udp InCsumErrors in netstat -su 
> output will increase by 2.

I looks like you should upgrade to 2.3.3 (or later). I see the
following commit that will presumably fix the problem:
8247b1ac ("datapath: Fix L4 checksum handling when dealing with IP fragments")
_______________________________________________
discuss mailing list
discuss@openvswitch.org
http://openvswitch.org/mailman/listinfo/discuss

Reply via email to