← Back to team overview

group.of.nepali.translators team mailing list archive

[Bug 1860986] Re: openvswitch: same tcp session encapsulated with different udp src port for ovs vxlan tunnel

 

[Expired for linux (Ubuntu Focal) because there has been no activity for
60 days.]

** Changed in: linux (Ubuntu Focal)
       Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1860986

Title:
  openvswitch: same tcp session encapsulated with different udp src port
  for ovs vxlan tunnel

Status in linux package in Ubuntu:
  Expired
Status in linux source package in Xenial:
  Expired
Status in linux source package in Bionic:
  Expired
Status in linux source package in Eoan:
  Expired
Status in linux source package in Focal:
  Expired

Bug description:
  [SRU Justification]

  [Impact]

  Packets encapsulated into a vxlan tunnel with openvswitch don't have
  the same udp source port for the first packet and the following ones
  of the same  TCP flow in a DOCKER scenario usecase.

  In fact, when using the kernel datapath, the upcall don't include skb
  hash info relatived. As VXLAN module uses the skb hash to select UDP
  src port, the source port is different for the first packet.

  More information can be found here:
  https://mail.openvswitch.org/pipermail/ovs-dev/2019-October/364062.html

  This has been fixed in v5.5 by the following upstream commit:
  bd1903b7c4596 ("net: openvswitch: add hash info to upcall")

  https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/openvswitch?id=bd1903b7c4596ba6f7677d0dfefd05ba5876707d

  The bug exists since the beginning of vxlan support in openvswitch.

  == Fix ==

  Backport the requested patches to Focal (5.4), Eoan (5.3), Bionic (4.15) and
  Xenial (4.4).

  == Risk of Regression ==

  This patch only add hash information when we do upcall, thus the risk
  should be low.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860986/+subscriptions