This is an automatically-generated clone of issue https://bugzilla.redhat.com/show_bug.cgi?id=2224260
use the reproducer in https://bugzilla.redhat.com/show_bug.cgi?id=2224260 I can't reproduce the same results on the unfixed version: # rpm -qa|grep ovn22 ovn22.12-22.12.0-126.el9fdp.x86_64 ovn22.12-central-22.12.0-126.el9fdp.x86_64 ovn22.12-host-22.12.0-126.el9fdp.x86_64 :: [ 07:10:25 ] :: [ PASS ] :: Command 'ip netns exec bar1 python3 -m http.server 8080 &' (Expected 0, got 0) Serving HTTP on :: port 8080 (http://[::]:8080/) ... :: [ 07:10:30 ] :: [ BEGIN ] :: Running 'ip netns exec foo1 curl 192.168.1.100:1234' curl: (56) Recv failure: Connection reset by peer ----------------------it doesn't pass :: [ 07:10:31 ] :: [ FAIL ] :: Command 'ip netns exec foo1 curl 192.168.1.100:1234' (Expected 0, got 56) but I can get the correct result on the fixed version: # rpm -qa|grep ovn22 ovn22.12-22.12.1-11.el9fdp.x86_64 ovn22.12-central-22.12.1-11.el9fdp.x86_64 ovn22.12-host-22.12.1-11.el9fdp.x86_64 :: [ 06:58:02 ] :: [ BEGIN ] :: Running 'ip netns exec bar1 python3 -m http.server 8080 &' :: [ 06:58:02 ] :: [ PASS ] :: Command 'ip netns exec bar1 python3 -m http.server 8080 &' (Expected 0, got 0) Serving HTTP on :: port 8080 (http://[::]:8080/) ... :: [ 06:58:07 ] :: [ BEGIN ] :: Running 'ip netns exec foo1 curl 192.168.1.100:1234' ::ffff:192.168.1.2 - - [21/Sep/2023 06:58:08] "GET / HTTP/1.1" 200 - ---------------------the return ip is correct. <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <title>Directory listing for /</title> </head> <body> <h1>Directory listing for /</h1> <hr> <ul> <li><a href="bar1.log">bar1.log</a></li> <li><a href="Makefile">Makefile</a></li> <li><a href="ovs_ixgbe.log">ovs_ixgbe.log</a></li> <li><a href="PURPOSE">PURPOSE</a></li> <li><a href="runtest.sh">runtest.sh</a></li> <li><a href="testinfo.desc">testinfo.desc</a></li> </ul> <hr> </body> </html> so set verified.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (ovn22.12 bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2023:5821