Description of problem: openvswitch encap nsh does not forward Version-Release number of selected component (if applicable): [root@dell-per730-18 ~]# rpm -qa | grep openv openvswitch-2.9.0-129.el7fdp.x86_64 openvswitch-selinux-extra-policy-1.0-8.el7fdp.noarch kernel-kernel-networking-openvswitch-common-2.0-67.noarch kernel-kernel-networking-openvswitch-of_rules-1.0-91.noarch [root@dell-per730-18 ~]# uname -a Linux dell-per730-18.rhts.eng.pek2.redhat.com 3.10.0-1127.el7.x86_64 #1 SMP Tue Feb 18 16:39:12 EST 2020 x86_64 x86_64 x86_64 GNU/Linux [root@dell-per730-18 ~]# cat /etc/os-release NAME="Red Hat Enterprise Linux Server" VERSION="7.8 (Maipo)" ID="rhel" ID_LIKE="fedora" VARIANT="Server" VARIANT_ID="server" VERSION_ID="7.8" PRETTY_NAME="Red Hat Enterprise Linux Server 7.8 (Maipo)" ANSI_COLOR="0;31" CPE_NAME="cpe:/o:redhat:enterprise_linux:7.8:GA:server" HOME_URL="https://www.redhat.com/" BUG_REPORT_URL="https://bugzilla.redhat.com/" REDHAT_BUGZILLA_PRODUCT="Red Hat Enterprise Linux 7" REDHAT_BUGZILLA_PRODUCT_VERSION=7.8 REDHAT_SUPPORT_PRODUCT="Red Hat Enterprise Linux" REDHAT_SUPPORT_PRODUCT_VERSION="7.8" How reproducible: 100% Steps to Reproduce: both sides: ovs-vsctl add-br $ovs_br ip link set $ovs_br up #ovs-vsctl set bridge $ovs_br protocols=OpenFlow10,OpenFlow11,OpenFlow12,OpenFlow13,OpenFlow14,OpenFlow15 ovs-vsctl add-port $ovs_br $nic_tx ovs-vsctl add-port $ovs_br $nic_rx ovs-vsctl show ovs-ofctl dump-ports $ovs_br ovs-ofctl dump-ports-desc $ovs_br ovs-ofctl del-flows $ovs_br ovs-ofctl dump-flows $ovs_br server side ovs-ofctl del-flows ovsbr0 set -x ovs-ofctl add-flow ovsbr0 -O OpenFlow13 "table=0 actions=encap(nsh(md_type=1)),output:$of_port_tx" result=$? set +x ovs-ofctl dump-flows ovsbr0 sync_set client test_start sync_wait client test_end ovs-ofctl del-flows ovsbr0 client side tshark -a duration:10 -nV -i $nic_rx -c1 -T fields -e ip.src > $pcap & sleep 2 local pkt="Ether(src='00:00:00:00:00:03', dst='00:00:00:00:00:04')/IP(src='$pattern')" python -c "from nsh import *;sendp($pkt, iface='$nic_tx')" wait echo "tshark: $(cat $pcap)" [ "$(cat $pcap)" != "$pattern" ] && result=1 Actual results: client side can not receive nsh packets Expected results: client side can receive nsh packets 1. 2. 3. Actual results: Expected results: Additional info:
I think we don't support NSH on RHEL7. Why are you trying to test it?
(In reply to Timothy Redaelli from comment #1) > I think we don't support NSH on RHEL7. Why are you trying to test it? Sorry for what , Could you tell me which version I should use to test it ?
Hi Tim, We had a request to test this from Rashid a while back. I will check with him to see which version we should use.
Per Rashid, we are de prioritizing this testing.