reproduced on ovn2.12-2.12.0-14: [root@dell-per740-12 ~]# rpm -qa | grep -E "openvswitch|ovn" ovn2.12-host-2.12.0-14.el8fdp.x86_64 openvswitch2.12-2.12.0-4.el8fdp.x86_64 ovn2.12-central-2.12.0-14.el8fdp.x86_64 openvswitch-selinux-extra-policy-1.0-19.el8fdp.noarch ovn2.12-2.12.0-14.el8fdp.x86_64 [root@dell-per740-12 ~]# ip netns exec server0 ping6 3000::1 -c 1 PING 3000::1(3000::1) 56 data bytes --- 3000::1 ping statistics --- 1 packets transmitted, 0 received, 100% packet loss, time 0ms [root@dell-per740-12 ~]# grep ofproto_dpif_upcall /var/log/openvswitch/ovs-vswitchd.log 2019-11-28T06:35:12.363Z|00001|ofproto_dpif_upcall(handler51)|INFO|received packet on unassociated datapath port 4294967295 2019-11-28T06:35:12.376Z|00001|ofproto_dpif_upcall(revalidator85)|WARN|Failed to acquire udpif_key corresponding to unexpected flow (Invalid argument): ufid:6988794e-04ad-447d-a32e-96aa780075b5 <==== error message in log [root@dell-per740-12 bz1776994]# ip netns exec server1 tcpdump -i any -nnle tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel <=== no NS received
no ovn2.12-2.12.0-15 for rhel8 version, numan, please help to check
Triggered the build for RHEL 8- https://brewweb.engineering.redhat.com/brew/taskinfo?taskID=25010753
Verified on ovn2.12.0-15: [root@dell-per740-12 bz1773598]# ip netns exec server0 ping6 3000::1 -c 2 PING 3000::1(3000::1) 56 data bytes 64 bytes from 3000::1: icmp_seq=2 ttl=63 time=3.38 ms --- 3000::1 ping statistics --- 2 packets transmitted, 1 received, 50% packet loss, time 22ms rtt min/avg/max/mdev = 3.376/3.376/3.376/0.000 ms <==== ping passed [root@dell-per740-12 bz1773598]# grep ofproto_dpif_upcall /var/log/openvswitch/ovs-vswitchd.log 2019-11-29T01:15:31.717Z|00001|ofproto_dpif_upcall(handler50)|INFO|received packet on unassociated datapath port 4294967295 2019-11-29T01:15:31.718Z|00001|ofproto_dpif_upcall(revalidator85)|WARN|Failed to acquire udpif_key corresponding to unexpected flow (Invalid argument): ufid:d1bfea1f-f07f-4ade-ad32-57fe344199f1 <==== error message [root@dell-per740-12 bz1773598]# rpm -qa | grep -E "openvswitch|ovn" ovn2.12-central-2.12.0-15.el8fdp.x86_64 openvswitch2.12-2.12.0-8.el8fdp.x86_64 ovn2.12-2.12.0-15.el8fdp.x86_64 ovn2.12-host-2.12.0-15.el8fdp.x86_64 openvswitch-selinux-extra-policy-1.0-19.el8fdp.noarch [root@dell-per740-12 bz1776994]# ip netns exec server1 tcpdump -i any -nnle tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes 20:15:31.704626 M 00:de:ad:ff:01:03 ethertype IPv6 (0x86dd), length 88: 2001::1 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 3000::1, length 32 <==== NS received 20:15:31.704670 Out f2:ce:2e:1b:37:80 ethertype IPv6 (0x86dd), length 88: 3000::1 > 2001::1: ICMP6, neighbor advertisement, tgt is 3000::1, length 32 20:15:32.659571 Out f2:ce:2e:1b:37:80 ethertype IPv6 (0x86dd), length 72: fe80::f0ce:2eff:fe1b:3780 > ff02::2: ICMP6, router solicitation, length 16 20:15:32.659915 M 0a:aa:07:c9:21:4a ethertype IPv6 (0x86dd), length 72: fe80::8aa:7ff:fec9:214a > ff02::2: ICMP6, router solicitation, length 16 20:15:32.724362 In 00:de:ad:ff:01:03 ethertype IPv6 (0x86dd), length 120: 3000::55 > 3000::1: ICMP6, echo request, seq 2, length 64 20:15:32.724420 Out f2:ce:2e:1b:37:80 ethertype IPv6 (0x86dd), length 88: 3000::1 > ff02::1:ff00:55: ICMP6, neighbor solicitation, who has 3000::55, length 32 20:15:32.726194 In 00:de:ad:ff:01:03 ethertype IPv6 (0x86dd), length 88: 3000::55 > 3000::1: ICMP6, neighbor advertisement, tgt is 3000::55, length 32 20:15:32.726228 Out f2:ce:2e:1b:37:80 ethertype IPv6 (0x86dd), length 120: 3000::1 > 3000::55: ICMP6, echo reply, seq 2, length 64 set VERIFIED based on https://bugzilla.redhat.com/show_bug.cgi?id=1773605#c11
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2019:4209