Skip to content
This repository was archived by the owner on Jun 20, 2024. It is now read-only.

Commit 7f49be6

Browse files
committed
don't drop captured packets from remote MAC
We see such packets when a MAC that we previously saw at a remote peer has been moved to ours. Dropping these packets cuts off network connectivity for the new owner of the MAC. Instead we update the MAC cache and flush the flows, to remove the now incorrect entries for that MAC. And carry on as normal.
1 parent c0c19fc commit 7f49be6

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

router/network_router.go

+8-8
Original file line numberDiff line numberDiff line change
@@ -84,16 +84,16 @@ func (router *NetworkRouter) handleCapturedPacket(key PacketKey) FlowOp {
8484
srcMac := net.HardwareAddr(key.SrcMAC[:])
8585
dstMac := net.HardwareAddr(key.DstMAC[:])
8686

87-
switch newSrcMac, conflictPeer := router.Macs.Add(srcMac, router.Ourself.Peer); {
87+
switch newSrcMac, conflictPeer := router.Macs.AddForced(srcMac, router.Ourself.Peer); {
8888
case newSrcMac:
89-
log.Println("Discovered local MAC", srcMac)
89+
log.Print("Discovered local MAC ", srcMac)
9090
case conflictPeer != nil:
91-
// The MAC cache has an entry for the source MAC
92-
// associated with another peer. This probably means
93-
// we are seeing a frame we injected ourself. That
94-
// shouldn't happen, but discard it just in case.
95-
log.Error("Captured frame from MAC (", srcMac, ") to (", dstMac, ") associated with another peer ", conflictPeer)
96-
return DiscardingFlowOp{}
91+
// The MAC cache has an entry for the source MAC associated
92+
// with another peer. This can happen when a MAC has moved.
93+
log.Print("Discovered local MAC ", srcMac, " (was at ", conflictPeer, ")")
94+
// We need to clear out any flows destined to the MAC
95+
// that forward to the old peer.
96+
router.Overlay.(NetworkOverlay).InvalidateRoutes()
9797
}
9898

9999
// Discard STP broadcasts

0 commit comments

Comments
 (0)