[NETVIRT-651] Malformed NSH packets encapsulated by SFC Classifier get dropped Created: 04/May/17 Updated: 19/Oct/17 Resolved: 15/May/17 |
|
| Status: | Resolved |
| Project: | netvirt |
| Component/s: | General |
| Affects Version/s: | Carbon |
| Fix Version/s: | None |
| Type: | Bug | ||
| Reporter: | Brady Johnson | Assignee: | Unassigned |
| Resolution: | Done | Votes: | 0 |
| Labels: | None | ||
| Remaining Estimate: | Not Specified | ||
| Time Spent: | Not Specified | ||
| Original Estimate: | Not Specified | ||
| Environment: |
Operating System: All |
||
| External issue ID: | 8375 |
| Priority: | High |
| Description |
|
The packets that get NSH encapsulated by the SFC Classifier are not setting the NSH NextProtocol (NP) field, so they are dropped by the SFF OVS bridge. Since the NSH NP field is not set, it defaults to 0 (zero) which is not valid. The NSH NP field should be set to 3 for Ethernet. Here's a packet dump: 0x0000: 4500 0094 f544 4000 4011 ece8 ac13 0003 And here is the same packet "parsed" where you can see the NSH Base Header=0x00060100 NSH Base Header: 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
Parsed packet: 4500 0094 f544 4000 4011 ece8 ac13 0003 => IPv4: UDP, srcIp=172.19.0.3, dstIp=172.19.0.2 |
| Comments |
| Comment by Brady Johnson [ 04/May/17 ] |
|
Patch on master: https://git.opendaylight.org/gerrit/56531 Patch on stable/carbon: |