On Sun, Jan 24, 2016 at 9:24 PM, Han Zhou <zhou...@gmail.com> wrote:
> I went into the "bad key length" in below datapath flow in a test
> environment:
>
> recirc_id(0x109),in_port(5),ct_state(-new+est-rel-inv+trk),eth(src=fa:16:3e:00:49:66,dst=fa:16:3e:ca:4a:20),eth_type(0x0800),ipv4(src=
> 22.22.22.4/255.255.255.252,dst=22.22.23.4,tos=0/0x3,ttl=64,frag=no),
> packets:4, bytes:392, used:0.740s, actions:set(eth(bad key length 24,
> expected 12)(fa 16 3e b8 13 c6 fa 16 3e 2c d3 a2 20 00 0b 00 1c 00 07 00 16
> 16 16 04)),set(ipv4(src=22.22.22.4/255.255.255.252,dst=22.22.23.4,ttl=63)
> ),ct(commit),set(tunnel(tun_id=0x8,dst=10.65.241.187,ttl=64,geneve({class=0xffff,type=0,len=4,0x30004}),flags(df|key))),2

What is printing this? ovs-dpctl?

Since the length is exactly double the expected length, it seems like
we somehow have a masked set action that is unexpected.

Can you give all of the relevant version numbers? (Userspace, kernel
out-of-tree/upstream module, host kernel)
_______________________________________________
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev

Reply via email to