This is an automatically-generated clone of issue https://bugzilla.redhat.com/show_bug.cgi?id=2168119
Verified on ovn22.12-22.12.0-68.el9: [root@wsfd-advnetlab17 bz2168119]# rpm -qa | grep -E "openvswitch3.0|ovn22.12" ovn22.12-22.12.0-68.el9fdp.x86_64 openvswitch3.0-3.0.0-45.el9fdp.x86_64 ovn22.12-central-22.12.0-68.el9fdp.x86_64 ovn22.12-host-22.12.0-68.el9fdp.x86_64 [root@wsfd-advnetlab16 ~]# tcpdump -i ip6gretap1 -nnle -v dropped privs to tcpdump tcpdump: listening on ip6gretap1, link-type EN10MB (Ethernet), capture size 262144 bytes 22:37:51.101158 00:00:00:00:00:01 > 00:00:00:01:01:01, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 63, id 53287, offset 0, flags [none], proto ICMP (1), length 84) 192.168.2.1 > 192.168.1.1: ICMP echo reply, id 15181, seq 1, length 64 22:37:54.600660 00:00:00:00:00:01 > 00:00:00:01:01:01, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 63, id 53726, offset 0, flags [none], proto ICMP (1), length 84) 192.168.2.1 > 192.168.1.1: ICMP echo reply, id 13684, seq 1, length 64 22:37:55.626139 00:00:00:00:00:01 > 00:00:00:01:01:01, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 63, id 54307, offset 0, flags [none], proto ICMP (1), length 84) 192.168.2.1 > 192.168.1.1: ICMP echo reply, id 13684, seq 2, length 64 22:37:56.458693 00:00:00:01:01:11 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::200:ff:fe01:111 > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16 source link-address option (1), length 8 (1): 00:00:00:01:01:11 22:37:56.650177 00:00:00:00:00:01 > 00:00:00:01:01:01, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 63, id 54441, offset 0, flags [none], proto ICMP (1), length 84) 192.168.2.1 > 192.168.1.1: ICMP echo reply, id 13684, seq 3, length 64
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (ovn22.12 bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2023:3986