Currently, in ML2/OVS deployments, Open vSwitch (OVS) does not support offloading OpenFlow rules that have the `skb_priority`, `skb_mark`, or output queue fields set. These fields are required for Quality of Service (QoS) support for virtio ports.
+
If you set a minimum bandwidth rule for a virtio port, the Networking service (neutron) OVS agent marks the traffic of this port with a Packet Mark field. This traffic cannot be offloaded, and it affects the traffic in other ports. If you set a bandwidth limit rule, all traffic is marked with the default 0 queue, which means that no traffic can be offloaded.
+
Workaround: If your environment includes OVS hardware offload ports, disable packet marking in the nodes that require hardware offloading. When you disable packet marking, it is not possible to set rate limiting rules for virtio ports. However, differentiated services code point (DSCP) marking rules are still available.
+
In the configuration file, set the `disable_packet_marking` flag to `true`. When you edit the configuration file, you must restart the `neutron_ovs_agent` container.
For example:
+
----
$ cat `/var/lib/config-data/puppet-generated/neutron/etc/neutron/plugins/ml2/openvswitch_agent.ini`
[ovs]
disable_packet_marking=True
----
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.
For information on the advisory (Release of components for Red Hat OpenStack Platform 17.1 (Wallaby)), and where to find the updated
files, follow the link below.
If the solution does not work for you, open a new bug report.
https://access.redhat.com/errata/RHEA-2023:4577
Description of problem: Traffic is not offloaded when in a ml2-ovs environment. It is not offloaded any kind of traffic (udp, tcp, icmp) and any kind of network (vxlan/vlan) I will provide information here for the udp traffic using a vlan provider network. Instances | 2cb69a30-3783-47b2-93db-ef7e90fe6702 | tempest-TestNfvOffload-server-1969830224 | ACTIVE | mellanox-geneve-provider=10.35.228.38, 20.20.220.188; mellanox-vlan-provider=30.30.220.126 | rhel-guest-image-7-6-210-x86-64-qcow2 | nfv_qe_base_flavor | | 2731aa4c-9479-4caa-baa3-592949d372cf | tempest-TestNfvOffload-server-443738151 | ACTIVE | mellanox-geneve-provider=10.35.228.42, 20.20.220.120; mellanox-vlan-provider=30.30.220.188 | rhel-guest-image-7-6-210-x86-64-qcow2 | nfv_qe_base_flavor | hypervisor 2cb69a30-3783-47b2-93db-ef7e90fe6702 --> computehwoffload-r740.localdomain 2731aa4c-9479-4caa-baa3-592949d372cf --> computehwoffload-r730.localdomain ports | a899400b-ee25-42d7-9c74-cc55be9c764c | tempest-port-smoke-1130153445 | fa:16:3e:32:53:b2 | ip_address='30.30.220.126', subnet_id='86a1d524-6ca0-45f7-a1e0-4c018f710b17' | ACTIVE | | ba5a2485-911c-4692-8c98-dcd7f9400314 | tempest-port-smoke-1890404038 | fa:16:3e:5f:73:05 | ip_address='30.30.220.188', subnet_id='86a1d524-6ca0-45f7-a1e0-4c018f710b17' | ACTIVE | [stack@undercloud-0 ~]$ openstack port show a899400b-ee25-42d7-9c74-cc55be9c764c [36/1813] /usr/lib/python3.9/site-packages/ansible/_vendor/__init__.py:42: UserWarning: One or more Python packages bundled by this ansible-core distribution were already loaded (pyparsing). This may result in undefined b ehavior. warnings.warn('One or more Python packages bundled by this ansible-core distribution were already ' +-------------------------+-------------------------------------------------------------------------------------------------------------------+ | Field | Value | +-------------------------+-------------------------------------------------------------------------------------------------------------------+ | admin_state_up | UP | | allowed_address_pairs | | | binding_host_id | computehwoffload-r740.localdomain | | binding_profile | capabilities='['switchdev']', pci_slot='0000:18:01.4', pci_vendor_info='15b3:1018', physical_network='mx-network' | | binding_vif_details | bridge_name='br-int', connectivity='l2', datapath_type='system', ovs_hybrid_plug='False', port_filter='True' | | binding_vif_type | ovs | | binding_vnic_type | direct | | created_at | 2022-07-22T15:16:46Z | | data_plane_status | None | | description | | | device_id | 2cb69a30-3783-47b2-93db-ef7e90fe6702 | | device_owner | compute:nova | | device_profile | None | | dns_assignment | None | | dns_domain | None | | dns_name | None | | extra_dhcp_opts | | | fixed_ips | ip_address='30.30.220.126', subnet_id='86a1d524-6ca0-45f7-a1e0-4c018f710b17' | | id | a899400b-ee25-42d7-9c74-cc55be9c764c | | ip_allocation | None | | mac_address | fa:16:3e:32:53:b2 | | name | tempest-port-smoke-1130153445 | | network_id | b480e016-82aa-4a3c-9484-6d51126e364b | | numa_affinity_policy | None | | port_security_enabled | False | | project_id | 8951bd38994849e0baba17c3116e4142 | | propagate_uplink_status | None | | qos_network_policy_id | None | | qos_policy_id | None | | resource_request | None | | revision_number | 4 | | security_group_ids | | | status | ACTIVE | | tags | | | trunk_details | None | | updated_at | 2022-07-22T15:17:13Z | +-------------------------+-------------------------------------------------------------------------------------------------------------------+ [stack@undercloud-0 ~]$ openstack port show ba5a2485-911c-4692-8c98-dcd7f9400314 /usr/lib/python3.9/site-packages/ansible/_vendor/__init__.py:42: UserWarning: One or more Python packages bundled by this ansible-core distribution were already loaded (pyparsing). This may result in undefined behavior. warnings.warn('One or more Python packages bundled by this ansible-core distribution were already ' +-------------------------+-------------------------------------------------------------------------------------------------------------------+ | Field | Value | +-------------------------+-------------------------------------------------------------------------------------------------------------------+ | admin_state_up | UP | | allowed_address_pairs | | | binding_host_id | computehwoffload-r730.localdomain | | binding_profile | capabilities='['switchdev']', pci_slot='0000:04:02.3', pci_vendor_info='15b3:1018', physical_network='mx-network' | | binding_vif_details | bridge_name='br-int', connectivity='l2', datapath_type='system', ovs_hybrid_plug='False', port_filter='True' | | binding_vif_type | ovs | | binding_vnic_type | direct | | created_at | 2022-07-22T15:16:45Z | | data_plane_status | None | | description | | | device_id | 2731aa4c-9479-4caa-baa3-592949d372cf | | device_owner | compute:nova | | device_profile | None | | dns_assignment | None | | dns_domain | None | | dns_name | None | | extra_dhcp_opts | | | fixed_ips | ip_address='30.30.220.188', subnet_id='86a1d524-6ca0-45f7-a1e0-4c018f710b17' | | id | ba5a2485-911c-4692-8c98-dcd7f9400314 | | ip_allocation | None | | mac_address | fa:16:3e:5f:73:05 | | name | tempest-port-smoke-1890404038 | | network_id | b480e016-82aa-4a3c-9484-6d51126e364b | | numa_affinity_policy | None | | port_security_enabled | False | | project_id | 8951bd38994849e0baba17c3116e4142 | | propagate_uplink_status | None | | qos_network_policy_id | None | | qos_policy_id | None | | resource_request | None | | revision_number | 4 | | security_group_ids | | | status | ACTIVE | | tags | | | trunk_details | None | | updated_at | 2022-07-22T15:17:10Z | +-------------------------+-------------------------------------------------------------------------------------------------------------------+ iperf commands Sending traffic (udp) from 30.30.220.188 to 30.30.220.126 iperf -s -B 30.30.220.188 -p 8858 -t 10 -u iperf -c 30.30.220.188 -T s2 -p 8858 -t 10 -u tcpdump commands nohup timeout 10 tcpdump -i enp4s0f1np1_1 -nne ether host fa:16:3e:5f:73:05 and ether host fa:16:3e:32:53:b2 nohup timeout 10 tcpdump -i ens6f1np1_0 -nne ether host fa:16:3e:5f:73:05 and ether host fa:16:3e:32:53:b2 flows computehwoffload-r730.localdomain ufid:71263ff5-7645-43aa-90e4-b983cac94f07, skb_priority(0/0),tunnel(tun_id=0x4233,src=10.10.141.144,dst=10.10.141.179,ttl=0/0,tp_dst=4789,flags(+key)),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(vxlan_sys_4789),packet_type(ns=0/0,id=0/0),eth(src=00:00:00:00:00:00/00:00:00:00:00:00,dst=00:00:00:00:00:00/00:00:00:00:00:00),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:561, bytes:30294, used:1.470s, offloaded:yes, dp:tc, actions:drop ufid:802e5035-dca9-4d4c-b72a-ec4ab5baf9f9, skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(enp6s0f1),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:32:53:b2,dst=fa:16:3e:5f:73:05),eth_type(0x8100),vlan(vid=144,pcp=0),encap(eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no)), packets:426, bytes:638148, used:4.860s, dp:tc, actions:drop ufid:500ab18e-5196-4489-aaeb-d57de06d827e, skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(enp6s0f1),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:32:53:b2,dst=fa:16:3e:5f:73:05),eth_type(0x8100),vlan(vid=144,pcp=0),encap(eth_type(0x0806),arp(sip=0.0.0.0/0.0.0.0,tip=0.0.0.0/0.0.0.0,op=0/0,sha=00:00:00:00:00:00/00:00:00:00:00:00,tha=00:00:00:00:00:00/00:00:00:00:00:00)), packets:0, bytes:0, used:5.130s, dp:tc, actions:drop ufid:b73899d4-5a29-466f-973c-35cb34f9b03c, recirc_id(0),dp_hash(0/0),skb_priority(0),in_port(mx-bond),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=fa:16:3e:32:53:b2,dst=fa:16:3e:5f:73:05),eth_type(0x8100),vlan(vid=144,pcp=0),encap(eth_type(0x0806),arp(sip=0.0.0.0/0.0.0.0,tip=0.0.0.0/0.0.0.0,op=0/0,sha=00:00:00:00:00:00/00:00:00:00:00:00,tha=00:00:00:00:00:00/00:00:00:00:00:00)), packets:0, bytes:0, used:never, dp:ovs, actions:pop_vlan,set(skb_priority(0x10001)),enp4s0f1np1_1 ufid:81fb77a1-4a95-4070-b9a6-a84e439d37f3, recirc_id(0),dp_hash(0/0),skb_priority(0),in_port(enp6s0f0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=fa:16:3e:32:53:b2,dst=fa:16:3e:5f:73:05),eth_type(0x8100),vlan(vid=144,pcp=0/0x0),encap(eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no)), packets:414, bytes:627624, used:4.868s, dp:ovs, actions:br-link1 ufid:7cc5b64a-885d-4552-9650-c13646623386, recirc_id(0),dp_hash(0/0),skb_priority(0),in_port(enp4s0f1np1_1),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=fa:16:3e:5f:73:05,dst=fa:16:3e:32:53:b2),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:0, bytes:0, used:never, dp:ovs, actions:push_vlan(vid=144,pcp=0),set(skb_priority(0x10001)),mx-bond ufid:10d53de8-7aec-4012-97e1-bcfa87117b09, recirc_id(0),dp_hash(0/0),skb_priority(0),in_port(enp4s0f1np1_1),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=fa:16:3e:5f:73:05,dst=fa:16:3e:32:53:b2),eth_type(0x0806),arp(sip=0.0.0.0/0.0.0.0,tip=0.0.0.0/0.0.0.0,op=0/0,sha=00:00:00:00:00:00/00:00:00:00:00:00,tha=00:00:00:00:00:00/00:00:00:00:00:00), packets:0, bytes:0, used:never, dp:ovs, actions:push_vlan(vid=144,pcp=0),set(skb_priority(0x10001)),mx-bond ufid:204f9c35-e873-4ddf-b837-0a7dfb4f83ae, recirc_id(0),dp_hash(0/0),skb_priority(0),in_port(mx-bond),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=fa:16:3e:32:53:b2,dst=fa:16:3e:5f:73:05),eth_type(0x8100),vlan(vid=144,pcp=0),encap(eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no)), packets:829, bytes:1256764, used:0.213s, dp:ovs, actions:pop_vlan,set(skb_priority(0x10001)),enp4s0f1np1_1 ufid:1122fc0e-e88b-4f24-af6e-e964ac69fd81, recirc_id(0),dp_hash(0/0),skb_priority(0/0),in_port(mx-bond),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=f4:52:14:25:28:74,dst=01:80:c2:00:00:00),eth_type(0/0xffff), packets:531, bytes:31860, used:0.185s, dp:ovs, actions:drop ufid:afca4546-f6e2-415e-9e9c-da14cad84c91, recirc_id(0),dp_hash(0/0),skb_priority(0),in_port(enp6s0f0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=fa:16:3e:32:53:b2,dst=fa:16:3e:5f:73:05),eth_type(0x8100),vlan(vid=144,pcp=0/0x0),encap(eth_type(0x0806),arp(sip=0.0.0.0/0.0.0.0,tip=0.0.0.0/0.0.0.0,op=0/0,sha=00:00:00:00:00:00/00:00:00:00:00:00,tha=00:00:00:00:00:00/00:00:00:00:00:00)), packets:0, bytes:0, used:never, dp:ovs, actions:br-link1 computehwoffload-r740.localdomain ufid:71263ff5-7645-43aa-90e4-b983cac94f07, skb_priority(0/0),tunnel(tun_id=0x4233,src=10.10.141.144,dst=10.10.141.179,ttl=0/0,tp_dst=4789,flags(+key)),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(vxlan_sys_4789),packet_type(ns=0/0,id=0/0),eth(src=00:00:00:00:00:00/00:00:00:00:00:00,dst=00:00:00:00:00:00/00:00:00:00:00:00),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:561, bytes:30294, used:1.470s, offloaded:yes, dp:tc, actions:drop ufid:802e5035-dca9-4d4c-b72a-ec4ab5baf9f9, skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(enp6s0f1),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:32:53:b2,dst=fa:16:3e:5f:73:05),eth_type(0x8100),vlan(vid=144,pcp=0),encap(eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no)), packets:426, bytes:638148, used:4.860s, dp:tc, actions:drop ufid:500ab18e-5196-4489-aaeb-d57de06d827e, skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(enp6s0f1),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:32:53:b2,dst=fa:16:3e:5f:73:05),eth_type(0x8100),vlan(vid=144,pcp=0),encap(eth_type(0x0806),arp(sip=0.0.0.0/0.0.0.0,tip=0.0.0.0/0.0.0.0,op=0/0,sha=00:00:00:00:00:00/00:00:00:00:00:00,tha=00:00:00:00:00:00/00:00:00:00:00:00)), packets:0, bytes:0, used:5.130s, dp:tc, actions:drop ufid:b73899d4-5a29-466f-973c-35cb34f9b03c, recirc_id(0),dp_hash(0/0),skb_priority(0),in_port(mx-bond),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=fa:16:3e:32:53:b2,dst=fa:16:3e:5f:73:05),eth_type(0x8100),vlan(vid=144,pcp=0),encap(eth_type(0x0806),arp(sip=0.0.0.0/0.0.0.0,tip=0.0.0.0/0.0.0.0,op=0/0,sha=00:00:00:00:00:00/00:00:00:00:00:00,tha=00:00:00:00:00:00/00:00:00:00:00:00)), packets:0, bytes:0, used:never, dp:ovs, actions:pop_vlan,set(skb_priority(0x10001)),enp4s0f1np1_1 ufid:81fb77a1-4a95-4070-b9a6-a84e439d37f3, recirc_id(0),dp_hash(0/0),skb_priority(0),in_port(enp6s0f0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=fa:16:3e:32:53:b2,dst=fa:16:3e:5f:73:05),eth_type(0x8100),vlan(vid=144,pcp=0/0x0),encap(eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no)), packets:414, bytes:627624, used:4.868s, dp:ovs, actions:br-link1 ufid:7cc5b64a-885d-4552-9650-c13646623386, recirc_id(0),dp_hash(0/0),skb_priority(0),in_port(enp4s0f1np1_1),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=fa:16:3e:5f:73:05,dst=fa:16:3e:32:53:b2),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:0, bytes:0, used:never, dp:ovs, actions:push_vlan(vid=144,pcp=0),set(skb_priority(0x10001)),mx-bond ufid:10d53de8-7aec-4012-97e1-bcfa87117b09, recirc_id(0),dp_hash(0/0),skb_priority(0),in_port(enp4s0f1np1_1),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=fa:16:3e:5f:73:05,dst=fa:16:3e:32:53:b2),eth_type(0x0806),arp(sip=0.0.0.0/0.0.0.0,tip=0.0.0.0/0.0.0.0,op=0/0,sha=00:00:00:00:00:00/00:00:00:00:00:00,tha=00:00:00:00:00:00/00:00:00:00:00:00), packets:0, bytes:0, used:never, dp:ovs, actions:push_vlan(vid=144,pcp=0),set(skb_priority(0x10001)),mx-bond ufid:204f9c35-e873-4ddf-b837-0a7dfb4f83ae, recirc_id(0),dp_hash(0/0),skb_priority(0),in_port(mx-bond),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=fa:16:3e:32:53:b2,dst=fa:16:3e:5f:73:05),eth_type(0x8100),vlan(vid=144,pcp=0),encap(eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no)), packets:829, bytes:1256764, used:0.213s, dp:ovs, actions:pop_vlan,set(skb_priority(0x10001)),enp4s0f1np1_1 ufid:1122fc0e-e88b-4f24-af6e-e964ac69fd81, recirc_id(0),dp_hash(0/0),skb_priority(0/0),in_port(mx-bond),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=f4:52:14:25:28:74,dst=01:80:c2:00:00:00),eth_type(0/0xffff), packets:531, bytes:31860, used:0.185s, dp:ovs, actions:drop ufid:afca4546-f6e2-415e-9e9c-da14cad84c91, recirc_id(0),dp_hash(0/0),skb_priority(0),in_port(enp6s0f0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=fa:16:3e:32:53:b2,dst=fa:16:3e:5f:73:05),eth_type(0x8100),vlan(vid=144,pcp=0/0x0),encap(eth_type(0x0806),arp(sip=0.0.0.0/0.0.0.0,tip=0.0.0.0/0.0.0.0,op=0/0,sha=00:00:00:00:00:00/00:00:00:00:00:00,tha=00:00:00:00:00:00/00:00:00:00:00:00)), packets:0, bytes:0, used:never, dp:ovs, actions:br-link1 tcpdump output computehwoffload-r730.localdomain 15:34:56.827165 fa:16:3e:32:53:b2 > fa:16:3e:5f:73:05, ethertype IPv4 (0x0800), length 1512: 30.30.220.126.40729 > 30.30.220.188.8858: UDP, length 1470 15:34:56.838377 fa:16:3e:32:53:b2 > fa:16:3e:5f:73:05, ethertype IPv4 (0x0800), length 1512: 30.30.220.126.40729 > 30.30.220.188.8858: UDP, length 1470 15:34:56.849591 fa:16:3e:32:53:b2 > fa:16:3e:5f:73:05, ethertype IPv4 (0x0800), length 1512: 30.30.220.126.40729 > 30.30.220.188.8858: UDP, length 1470 15:34:56.860773 fa:16:3e:32:53:b2 > fa:16:3e:5f:73:05, ethertype IPv4 (0x0800), length 1512: 30.30.220.126.40729 > 30.30.220.188.8858: UDP, length 1470 15:34:56.872022 fa:16:3e:32:53:b2 > fa:16:3e:5f:73:05, ethertype IPv4 (0x0800), length 1512: 30.30.220.126.40729 > 30.30.220.188.8858: UDP, length 1470 15:34:56.883236 fa:16:3e:32:53:b2 > fa:16:3e:5f:73:05, ethertype IPv4 (0x0800), length 1512: 30.30.220.126.40729 > 30.30.220.188.8858: UDP, length 1470 15:34:56.894452 fa:16:3e:32:53:b2 > fa:16:3e:5f:73:05, ethertype IPv4 (0x0800), length 1512: 30.30.220.126.40729 > 30.30.220.188.8858: UDP, length 1470 737 packets captured 804 packets received by filter 0 packets dropped by kernel computehwoffload-r740.localdomain 15:34:56.961091 fa:16:3e:32:53:b2 > fa:16:3e:5f:73:05, ethertype IPv4 (0x0800), length 1512: 30.30.220.126.40729 > 30.30.220.188.8858: UDP, length 1470 15:34:56.972300 fa:16:3e:32:53:b2 > fa:16:3e:5f:73:05, ethertype IPv4 (0x0800), length 1512: 30.30.220.126.40729 > 30.30.220.188.8858: UDP, length 1470 15:34:56.983522 fa:16:3e:32:53:b2 > fa:16:3e:5f:73:05, ethertype IPv4 (0x0800), length 1512: 30.30.220.126.40729 > 30.30.220.188.8858: UDP, length 1470 15:34:56.994731 fa:16:3e:32:53:b2 > fa:16:3e:5f:73:05, ethertype IPv4 (0x0800), length 1512: 30.30.220.126.40729 > 30.30.220.188.8858: UDP, length 1470 15:34:57.005961 fa:16:3e:32:53:b2 > fa:16:3e:5f:73:05, ethertype IPv4 (0x0800), length 1512: 30.30.220.126.40729 > 30.30.220.188.8858: UDP, length 1470 747 packets captured 818 packets received by filter 0 packets dropped by kernel compute configuration computehwoffload-r730.localdomain sudo ovs-vsctl get Open_vSwitch . other_config:hw-offload "true" ip link 12: enp4s0f0np0: <BROADCAST,MULTICAST,PROMISC,SLAVE,UP,LOWER_UP> mtu 9000 qdisc mq master mx-bond state UP mode DEFAULT group default qlen 1000 link/ether ec:0d:9a:7d:7d:2a brd ff:ff:ff:ff:ff:ff vf 0 link/ether fa:16:3e:8c:2a:f8 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 1 link/ether fa:16:3e:7a:a7:8e brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 2 link/ether f6:84:5a:f6:f5:1b brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 3 link/ether 4e:7c:7b:0d:1d:6c brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 4 link/ether d6:34:80:e2:54:d6 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 5 link/ether a2:8a:4e:c3:04:a7 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 6 link/ether 42:e1:b7:2d:0f:25 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 7 link/ether 02:01:c6:9c:86:20 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 8 link/ether 5a:de:b9:23:26:fb brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 9 link/ether be:db:c0:64:a0:95 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off 13: enp4s0f1np1: <BROADCAST,MULTICAST,PROMISC,SLAVE,UP,LOWER_UP> mtu 9000 qdisc mq master mx-bond state UP mode DEFAULT group default qlen 1000 link/ether ec:0d:9a:7d:7d:2a brd ff:ff:ff:ff:ff:ff permaddr ec:0d:9a:7d:7d:2b vf 0 link/ether fa:16:3e:c1:af:89 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 1 link/ether fa:16:3e:5f:73:05 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 2 link/ether ba:6b:3f:3d:b5:b7 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 3 link/ether 12:20:8f:3f:99:e2 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 4 link/ether 0a:62:f1:e6:39:94 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 5 link/ether 72:40:f1:17:fc:e9 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 6 link/ether 46:df:87:17:0d:22 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 7 link/ether 8a:df:b4:a2:ad:62 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 8 link/ether 2e:b1:4f:ed:78:bc brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 9 link/ether fe:75:a7:29:5f:89 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off computehwoffload-r740.localdomain sudo ovs-vsctl get Open_vSwitch . other_config:hw-offload "true" ip link 11: ens6f0np0: <BROADCAST,MULTICAST,PROMISC,SLAVE,UP,LOWER_UP> mtu 9000 qdisc mq master mx-bond state UP mode DEFAULT group default qlen 1000 link/ether 98:03:9b:9d:73:00 brd ff:ff:ff:ff:ff:ff vf 0 link/ether fa:16:3e:28:d2:67 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 1 link/ether fa:16:3e:a0:47:5b brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 2 link/ether 32:e3:96:f8:a0:19 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 3 link/ether 4e:de:20:a9:cf:92 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 4 link/ether b6:e8:06:92:05:d6 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 5 link/ether b2:21:ff:c1:98:f5 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 6 link/ether d2:b8:2d:aa:b8:04 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 7 link/ether 9a:03:74:a6:1e:e7 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 8 link/ether ce:24:71:f5:44:c7 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 9 link/ether 02:1f:aa:98:81:30 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off altname enp24s0f0np0 12: ens6f1np1: <BROADCAST,MULTICAST,PROMISC,SLAVE,UP,LOWER_UP> mtu 9000 qdisc mq master mx-bond state UP mode DEFAULT group default qlen 1000 link/ether 98:03:9b:9d:73:00 brd ff:ff:ff:ff:ff:ff permaddr 98:03:9b:9d:73:01 vf 0 link/ether fa:16:3e:32:53:b2 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 1 link/ether fa:16:3e:73:c9:a0 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 2 link/ether 8e:cc:b8:16:d8:48 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 3 link/ether ce:ed:b1:03:b6:5d brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 4 link/ether be:d5:bb:d4:f4:44 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 5 link/ether aa:93:0a:72:09:13 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 6 link/ether 32:40:e0:0d:a9:2d brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 7 link/ether 3e:bf:87:65:48:50 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 8 link/ether ea:27:99:12:fb:00 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off vf 9 link/ether 76:ac:ce:2b:02:4d brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off Version-Release number of selected component (if applicable): RHOS-17.0-RHEL-9-20220701.n.1 openvswitch2.17-2.17.0-10.el9fdp.x86_64 How reproducible: Deploy 17.0 ml2-ovs hwoffload templates (i will attach them) Run Testcase nfv_tempest_plugin.tests.scenario.test_nfv_offload.TestNfvOffload.test_offload_udp The testcase do the following steps: 1. create 2 vms 2. execute tcpdump in representor port 3. execute iperf in vms 4. checks: - for each flow there should be 1 packet in representor port Actual results: Traffic is not offloaded Expected results: Traffic should be offloaded Additional info: