Bug 2203021 - mirror doesn't work when remote is ipv6
Summary: mirror doesn't work when remote is ipv6
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux Fast Datapath
Classification: Red Hat
Component: ovn22.12
Version: FDP 22.A
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: ---
: ---
Assignee: lorenzo bianconi
QA Contact: Jianlin Shi
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-05-11 04:10 UTC by OVN Bot
Modified: 2023-07-06 19:17 UTC (History)
3 users (show)

Fixed In Version: ovn22.12-22.12.0-68.el9fdp
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2023-07-06 19:17:43 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker FD-2878 0 None None None 2023-05-16 18:43:27 UTC
Red Hat Product Errata RHBA-2023:3986 0 None None None 2023-07-06 19:17:50 UTC

Description OVN Bot 2023-05-11 04:10:17 UTC
This is an automatically-generated clone of issue https://bugzilla.redhat.com/show_bug.cgi?id=2168119

Comment 3 Jianlin Shi 2023-05-22 02:39:39 UTC
Verified on ovn22.12-22.12.0-68.el9:

[root@wsfd-advnetlab17 bz2168119]# rpm -qa | grep -E "openvswitch3.0|ovn22.12"                        
ovn22.12-22.12.0-68.el9fdp.x86_64                                                                     
openvswitch3.0-3.0.0-45.el9fdp.x86_64                                                                 
ovn22.12-central-22.12.0-68.el9fdp.x86_64                                                             
ovn22.12-host-22.12.0-68.el9fdp.x86_64 
[root@wsfd-advnetlab16 ~]# tcpdump  -i ip6gretap1 -nnle -v
dropped privs to tcpdump
tcpdump: listening on ip6gretap1, link-type EN10MB (Ethernet), capture size 262144 bytes
22:37:51.101158 00:00:00:00:00:01 > 00:00:00:01:01:01, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 63, id 53287, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.2.1 > 192.168.1.1: ICMP echo reply, id 15181, seq 1, length 64                            
22:37:54.600660 00:00:00:00:00:01 > 00:00:00:01:01:01, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 63, id 53726, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.2.1 > 192.168.1.1: ICMP echo reply, id 13684, seq 1, length 64
22:37:55.626139 00:00:00:00:00:01 > 00:00:00:01:01:01, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 63, id 54307, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.2.1 > 192.168.1.1: ICMP echo reply, id 13684, seq 2, length 64                            
22:37:56.458693 00:00:00:01:01:11 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: (hlim 255, next-header ICMPv6 (58) payload length: 16) fe80::200:ff:fe01:111 > ff02::2: [icmp6 sum ok] ICMP6, router solicitation, length 16
          source link-address option (1), length 8 (1): 00:00:00:01:01:11
22:37:56.650177 00:00:00:00:00:01 > 00:00:00:01:01:01, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 63, id 54441, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.2.1 > 192.168.1.1: ICMP echo reply, id 13684, seq 3, length 64

Comment 5 errata-xmlrpc 2023-07-06 19:17:43 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (ovn22.12 bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2023:3986


Note You need to log in before you can comment on or make changes to this bug.