Multicast snooping on bridge breaks ICMP6 neighbor solicitation for KVM guests

Bug #1310586 reported by Trygve Andre Tønnesland on 2014-04-21
This bug affects 4 people
Affects Status Importance Assigned to Milestone
linux (Ubuntu)

Bug Description

Ubuntu 3.13.0-24.46-generic 3.13.9 seems to be affected by the same bug as described here:

The suggested workaround (echo 0 > /sys/class/net/br0/bridge/multicast_snooping) solves IPv6-problems for KVM guests.
 total 0
 crw-rw---- 1 root audio 116, 1 Apr 20 15:03 seq
 crw-rw---- 1 root audio 116, 33 Apr 20 15:03 timer
AplayDevices: Error: [Errno 2] No such file or directory
ApportVersion: 2.14.1-0ubuntu3
Architecture: amd64
ArecordDevices: Error: [Errno 2] No such file or directory
AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1:
CRDA: Error: [Errno 2] No such file or directory
DistroRelease: Ubuntu 14.04
IwConfig: Error: [Errno 2] No such file or directory
 Bus 001 Device 002: ID 12d1:1001 Huawei Technologies Co., Ltd. E169/E620/E800 HSDPA Modem
 Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
 Bus 004 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
 Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
 Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
MachineType: Supermicro X7DBN
Package: linux (not installed)

ProcFB: 0 radeondrmfb
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-24-generic root=/dev/mapper/ssd-root ro bootdegraded=true apparmor=0 panic=10 console=tty0 console=ttyS1,115200 nomdmonddf nomdmonisw nomdmonddf nomdmonisw
ProcVersionSignature: Ubuntu 3.13.0-24.46-generic 3.13.9
 linux-restricted-modules-3.13.0-24-generic N/A
 linux-backports-modules-3.13.0-24-generic N/A
 linux-firmware 1.127
RfKill: Error: [Errno 2] No such file or directory
Tags: trusty
Uname: Linux 3.13.0-24-generic x86_64
UpgradeStatus: Upgraded to trusty on 2014-04-18 (2 days ago)

_MarkForUpload: True 07/04/2011
dmi.bios.vendor: Phoenix Technologies LTD
dmi.bios.version: 2.1c X7DBN
dmi.board.vendor: Supermicro
dmi.board.version: PCB Version
dmi.chassis.type: 1
dmi.chassis.vendor: Supermicro
dmi.chassis.version: 0123456789
dmi.modalias: dmi:bvnPhoenixTechnologiesLTD:bvr2.1c:bd07/04/2011:svnSupermicro:pnX7DBN:pvr0123456789:rvnSupermicro:rnX7DBN:rvrPCBVersion:cvnSupermicro:ct1:cvr0123456789: X7DBN
dmi.product.version: 0123456789
dmi.sys.vendor: Supermicro

This bug is missing log files that will aid in diagnosing the problem. From a terminal window please run:

apport-collect 1310586

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the Ubuntu Kernel Team.

Changed in linux (Ubuntu):
status: New → Incomplete

apport information

tags: added: apport-collected trusty
description: updated

apport information

apport information

apport information

apport information

apport information

apport information

apport information

apport information

apport information

Logs uploaded. WifiSyslog.txt and CurrentDmesg.txt removed as they only contained iptables log output, and should not be relevant to this issue.

Changed in linux (Ubuntu):
status: Incomplete → Confirmed
Joseph Salisbury (jsalisbury) wrote :

Would it be possible for you to test the latest upstream kernel? Refer to . Please test the latest v3.15 kernel[0].

If this bug is fixed in the mainline kernel, please add the following tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag: 'kernel-bug-exists-upstream'.

If you are unable to test the mainline kernel, for example it will not boot, please add the tag: 'kernel-unable-to-test-upstream'.
Once testing of the upstream kernel is complete, please mark this bug as "Confirmed".

Thanks in advance.


Changed in linux (Ubuntu):
importance: Undecided → Medium
status: Confirmed → Incomplete

Unfortunately I wont be able to test the mainline kernel any time soon. However, I see that the relevant patches described in the netdev thread are merged into the 3.13 tree:

bridge: multicast: add sanity check for query source addresses
bridge: multicast: add sanity check for general query destination
bridge: multicast: enable snooping on general queries only

Including these patches in the Ubuntu 14.04 kernel should resolve this issue.

tags: added: kernel-unable-to-test-upstream
Launchpad Janitor (janitor) wrote :

[Expired for linux (Ubuntu) because there has been no activity for 60 days.]

Changed in linux (Ubuntu):
status: Incomplete → Expired
Richard Laager (rlaager) on 2015-01-14
Changed in linux (Ubuntu):
status: Expired → Confirmed
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers