On Sun, Jan 24, 2016 at 9:24 PM, Han Zhou <zhou...@gmail.com> wrote: > I went into the "bad key length" in below datapath flow in a test > environment: > > recirc_id(0x109),in_port(5),ct_state(-new+est-rel-inv+trk),eth(src=fa:16:3e:00:49:66,dst=fa:16:3e:ca:4a:20),eth_type(0x0800),ipv4(src= > 22.22.22.4/255.255.255.252,dst=22.22.23.4,tos=0/0x3,ttl=64,frag=no), > packets:4, bytes:392, used:0.740s, actions:set(eth(bad key length 24, > expected 12)(fa 16 3e b8 13 c6 fa 16 3e 2c d3 a2 20 00 0b 00 1c 00 07 00 16 > 16 16 04)),set(ipv4(src=22.22.22.4/255.255.255.252,dst=22.22.23.4,ttl=63) > ),ct(commit),set(tunnel(tun_id=0x8,dst=10.65.241.187,ttl=64,geneve({class=0xffff,type=0,len=4,0x30004}),flags(df|key))),2
What is printing this? ovs-dpctl? Since the length is exactly double the expected length, it seems like we somehow have a masked set action that is unexpected. Can you give all of the relevant version numbers? (Userspace, kernel out-of-tree/upstream module, host kernel) _______________________________________________ dev mailing list dev@openvswitch.org http://openvswitch.org/mailman/listinfo/dev