Bug 2223244
| Summary: | [ovs bond]The flow table has no ipv4 tcp traffic for a long time | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux Fast Datapath | Reporter: | mhou <mhou> |
| Component: | openvswitch | Assignee: | Timothy Redaelli <tredaelli> |
| openvswitch sub component: | ovs-dpdk | QA Contact: | mhou <mhou> |
| Status: | NEW --- | Docs Contact: | |
| Severity: | high | ||
| Priority: | unspecified | CC: | ctrautma, jhsiao, ktraynor |
| Version: | RHEL 8.0 | ||
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | Bug | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
I also replace bond-port to a single port. Single dpdk port work as well. ovs-vsctl add-port bondbridge dpdk0 -- set Interface dpdk0 type=dpdk options:dpdk-devargs=class=eth,mac=04:3f:72:b0:35:33 options:n_rxq=4 mtu_request=9000 podman exec -dt g1 netperf -4 -t TCP_STREAM -H 172.150.150.1 -l 120 -- -m 9000 podman exec -dt g2 netperf -4 -t TCP_STREAM -H 172.150.150.1 -l 120 -- -m 9000 podman exec -dt g2 netperf -6 -t UDP_STREAM -H 2001:db8:150:150::1 -l 120 -- -m 9000 podman exec -dt g1 netperf -6 -t UDP_STREAM -H 2001:db8:150:150::1 -l 120 -- -m 9000 # ovs-appctl dpif/dump-flows -m guestbridge ufid:4313b2e4-9dfa-44ce-bd43-73377dc384ae skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(4b91e38439544_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:12,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::52/::,dst=2001:db8:150:150::1/::,label=0xa90a6/0,proto=6/0,tclass=0/0,hlimit=64/0,frag=no),tcp(src=32807/0,dst=12865/0),tcp_flags(0/0), packets:4750578, bytes:598573284, used:0.007s, flags:SFP., actions:dpdk0 ufid:9ef06e93-2683-4c18-ae46-821cf19e8701 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.42/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=6/0,tos=0/0,ttl=64/0,frag=no),tcp(src=43955/0,dst=12865/0),tcp_flags(0/0), packets:230857, bytes:1494279530, used:0.007s, flags:SP., actions:dpdk0 ufid:6614a87c-9eee-4eea-8666-8893779fdb2d skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(4b91e38439544_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:12,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.52/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=6/0,tos=0/0,ttl=64/0,frag=no),tcp(src=41711/0,dst=12865/0),tcp_flags(0/0), packets:205653, bytes:1382835510, used:0.000s, flags:SP., actions:dpdk0 ufid:81e31505-ce8b-4416-b988-705ae899323f skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::42/::,dst=2001:db8:150:150::1/::,label=0x3a458/0,proto=6/0,tclass=0/0,hlimit=64/0,frag=no),tcp(src=55633/0,dst=12865/0),tcp_flags(0/0), packets:4875316, bytes:614290312, used:0.004s, flags:FP., actions:dpdk0 When use a single dpdk port to send traffic, check below log 2023-07-17T06:40:39.864Z|00357|poll_loop|INFO|Dropped 85942 log messages in last 6 seconds (most recently, 0 seconds ago) due to excessive rate 2023-07-17T06:40:39.864Z|00358|poll_loop|INFO|wakeup due to [POLLIN] on fd 80 (AF_PACKET(4b91e38439544_l)(protocol=0x3)<->) at ../lib/netdev-linux.c:1542 (99% CPU usage) 2023-07-17T06:40:45.864Z|00359|poll_loop|INFO|Dropped 85313 log messages in last 6 seconds (most recently, 0 seconds ago) due to excessive rate 2023-07-17T06:40:45.864Z|00360|poll_loop|INFO|wakeup due to [POLLIN] on fd 80 (AF_PACKET(4b91e38439544_l)(protocol=0x3)<->) at ../lib/netdev-linux.c:1542 (99% CPU usage) 2023-07-17T06:40:51.864Z|00361|poll_loop|INFO|Dropped 86126 log messages in last 6 seconds (most recently, 0 seconds ago) due to excessive rate 2023-07-17T06:40:51.864Z|00362|poll_loop|INFO|wakeup due to [POLLIN] on fd 81 (AF_PACKET(0990732161cc4_l)(protocol=0x3)<->) at ../lib/netdev-linux.c:1542 (99% CPU usage) 2023-07-17T06:40:57.864Z|00363|poll_loop|INFO|Dropped 86135 log messages in last 6 seconds (most recently, 0 seconds ago) due to excessive rate 2023-07-17T06:40:57.864Z|00364|poll_loop|INFO|wakeup due to [POLLIN] on fd 81 (AF_PACKET(0990732161cc4_l)(protocol=0x3)<->) at ../lib/netdev-linux.c:1542 (99% CPU usage) 2023-07-17T06:41:03.992Z|00365|poll_loop|INFO|Dropped 67464 log messages in last 6 seconds (most recently, 0 seconds ago) due to excessive rate 2023-07-17T06:41:03.992Z|00366|poll_loop|INFO|wakeup due to [POLLIN] on fd 23 (FIFO pipe:[159994475]) at ../vswitchd/bridge.c:421 (56% CPU usage) |
Description of problem: start three containers and attach to guestbridge, create dpdkbonding port on bondbridge. Use vtap device to connect guestbrige and containers. On g1,g2 container, use Netperf send traffic with peer side. Found TCP_STREAM didn't work. If only send TCP_STREAM on g1, traffic work as well. Version-Release number of selected component (if applicable): kernel version:5.14.0-337.el9.x86_64 openvswitch version: openvswitch3.1-3.1.0-33.el9fdp.x86_64 # ethtool -i ens1f0np0 driver: mlx5_core version: 5.14.0-337.el9.x86_64 firmware-version: 16.34.1002 (MT_0000000080) expansion-rom-version: bus-info: 0000:12:00.0 supports-statistics: yes supports-test: yes supports-eeprom-access: no supports-register-dump: no supports-priv-flags: yes How reproducible: Steps to Reproduce: 1. create ovs dpdkbonding topo as below: # ovs-vsctl list Open_vSwitch . _uuid : 373a141e-7c36-4e1c-9544-c0fd46279fea bridges : [a1a74e89-513f-407f-be47-f09e5b6f2bb4, b13e4d0b-5151-48f1-a927-1c085a463966] cur_cfg : 11 datapath_types : [netdev, system] datapaths : {} db_version : "8.3.1" dpdk_initialized : true dpdk_version : "DPDK 22.11.1" external_ids : {hostname=hp-dl388g10-03.rhts.eng.pek2.redhat.com, rundir="/var/run/openvswitch", system-id="27de9e73-4d86-4cd3-bd57-5f8479adb8d3"} iface_types : [bareudp, dpdk, dpdkvhostuser, dpdkvhostuserclient, erspan, geneve, gre, gtpu, internal, ip6erspan, ip6gre, lisp, patch, stt, system, tap, vxlan] manager_options : [] next_cfg : 11 other_config : {dpdk-init="true", dpdk-lcore-mask="0x7fe0", dpdk-socket-mem="8192,8192", pmd-cpu-mask="0x78000", vhost-iommu-support="true"} ovs_version : "3.1.2" ssl : [] statistics : {} system_type : rhel system_version : "9.3" # ovs-vsctl show 373a141e-7c36-4e1c-9544-c0fd46279fea Bridge guestbridge datapath_type: netdev Port aa0dead04d444_l Interface aa0dead04d444_l Port "234ced83ef314_l" Interface "234ced83ef314_l" Port patchguest Interface patchguest type: patch options: {peer=patchbond} Port f236b39938b14_l Interface f236b39938b14_l Port guestbridge Interface guestbridge type: internal Bridge bondbridge datapath_type: netdev Port patchbond Interface patchbond type: patch options: {peer=patchguest} Port bondbridge Interface bondbridge type: internal Port active-backup Interface ens1f0np0 type: dpdk options: {dpdk-devargs="class=eth,mac=04:3f:72:b0:35:32", n_rxq="4"} Interface ens1f1np1 type: dpdk options: {dpdk-devargs="class=eth,mac=04:3f:72:b0:35:33", n_rxq="4"} ovs_version: "3.1.2" keep flow as NORMAL [root@hp-dl388g10-03 ovs_bond_function]# ovs-ofctl dump-flows guestbridge cookie=0x0, duration=1082.332s, table=0, n_packets=10966941, n_bytes=52598029890, actions=NORMAL [root@hp-dl388g10-03 ovs_bond_function]# ovs-ofctl dump-flows bondbridge cookie=0x0, duration=1091.376s, table=0, n_packets=10967516, n_bytes=52598164888, actions=NORMAL 2. select g1 send TCP_STREAM. as follow https://access.redhat.com/solutions/3964031, need disable checksum on vtap device. # podman exec -it g1 /bin/bash # ethtool -K eth1 tx off # ethtool -k eth1 | grep tx tx-checksumming: off tx-checksum-ipv4: off [fixed] tx-checksum-ip-generic: off tx-checksum-ipv6: off [fixed] tx-checksum-fcoe-crc: off [fixed] tx-checksum-sctp: off tx-scatter-gather: on tx-scatter-gather-fraglist: on tx-tcp-segmentation: off [requested on] tx-tcp-ecn-segmentation: off [requested on] tx-tcp-mangleid-segmentation: off [requested on] tx-tcp6-segmentation: off [requested on # podman exec -dt g1 netperf -4 -t TCP_STREAM -H 172.150.150.1 -l 10 -- -m 9000 MIGRATED TCP STREAM TEST from 0.0.0.0 (0.0.0.0) port 0 AF_INET to 172.150.150.1 () port 0 AF_INET Recv Send Send Socket Socket Message Elapsed Size Size Size Time Throughput bytes bytes bytes secs. 10^6bits/sec 131072 16384 64 10.00 759.28 3.select g1 and g2 send TCP_STREAM and UDP_STREAM traffic Open four sessions respectively and run the following four netperf commands podman exec -dt g1 netperf -4 -t TCP_STREAM -H 172.150.150.1 -l 120 -- -m 9000 podman exec -dt g2 netperf -4 -t TCP_STREAM -H 172.150.150.1 -l 120 -- -m 9000 podman exec -dt g2 netperf -6 -t UDP_STREAM -H 2001:db8:150:150::1 -l 120 -- -m 9000 podman exec -dt g1 netperf -6 -t UDP_STREAM -H 2001:db8:150:150::1 -l 120 -- -m 9000 wait about 10s, only ipv6 udp traffic was found # ovs-appctl dpif/dump-flows -m guestbridge ufid:1e657b4b-266e-4387-a0ed-482e1a9ccdc7 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::42/::,dst=2001:db8:150:150::1/::,label=0xb9971/0,proto=44/0,tclass=0/0,hlimit=64/0,frag=later), packets:185627, bytes:21903986, used:0.005s, actions:ens1f0np0 ufid:566e4a36-01e4-4c7e-b29b-6e0edc2725e5 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::42/::,dst=2001:db8:150:150::1/::,label=0xb9971/0,proto=17/0,tclass=0/0,hlimit=64/0,frag=first),udp(src=43604/0,dst=60243/0), packets:204371, bytes:1842200194, used:0.005s, actions:ens1f0np0 ufid:e2461d24-57c9-4fc0-8b15-6d3d8349a4f9 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(4b91e38439544_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:12,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::52/::,dst=2001:db8:150:150::1/::,label=0xc3ca5/0,proto=17/0,tclass=0/0,hlimit=64/0,frag=first),udp(src=38997/0,dst=43358/0), packets:165351, bytes:1490473914, used:0.006s, actions:ens1f0np0 ufid:6e49c95c-14b4-4d63-8518-2b5c75812164 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(4b91e38439544_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:12,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::52/::,dst=2001:db8:150:150::1/::,label=0xc3ca5/0,proto=44/0,tclass=0/0,hlimit=64/0,frag=later), packets:152880, bytes:18039840, used:0.006s, actions:ens1f0np0 4. use g1 & g2 send ipv4 tcp stream podman exec -dt g1 netperf -4 -t TCP_STREAM -H 172.150.150.1 -l 120 -- -m 9000 podman exec -dt g2 netperf -4 -t TCP_STREAM -H 172.150.150.1 -l 120 -- -m 9000 # ovs-appctl dpif/dump-flows -m guestbridge ufid:7bb7aa46-f16a-4b4b-b1ea-1e019146b549 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.42/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=6/0,tos=0/0,ttl=64/0,frag=no),tcp(src=40149/0,dst=12865/0),tcp_flags(0/0), packets:1143492, bytes:10307367152, used:0.004s, flags:SP., actions:ens1f0np0 ufid:78c5e365-ce0d-4fc0-9067-fe5d656ab7ac skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(4b91e38439544_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:12,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.52/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=6/0,tos=0/0,ttl=64/0,frag=no),tcp(src=49263/0,dst=12865/0),tcp_flags(0/0), packets:1146398, bytes:10333560704, used:0.004s, flags:SP., actions:ens1f0np0 5. use g1 & g2 send ipv4/ipv6 udp stream nohup podman exec -it g1 bash -c 'netperf -4 -t UDP_STREAM -H 172.150.150.1 -l 120 -- -m 9000' &> /dev/null & sleep 1 nohup podman exec -it g2 bash -c 'netperf -4 -t UDP_STREAM -H 172.150.150.1 -l 120 -- -m 9000' &> /dev/null & sleep 1 nohup podman exec -it g2 bash -c 'netperf -6 -t UDP_STREAM -H 2001:db8:150:150::1 -l 120 -- -m 9000' &> /dev/null & sleep 1 nohup podman exec -it g1 bash -c 'netperf -6 -t UDP_STREAM -H 2001:db8:150:150::1 -l 120 -- -m 9000' &> /dev/null & # ovs-appctl dpif/dump-flows -m guestbridge ufid:808d941f-ef5a-420b-9d39-f320f4275a76 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.42/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=17/0,tos=0/0,ttl=64/0,frag=first),udp(src=38103/0,dst=36140/0), packets:414868, bytes:3737960680, used:0.005s, actions:ens1f0np0 ufid:64ebcf18-2b10-4881-8f4b-00cf3356c0a4 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::42/::,dst=2001:db8:150:150::1/::,label=0xfe10/0,proto=17/0,tclass=0/0,hlimit=64/0,frag=first),udp(src=43790/0,dst=35890/0), packets:345109, bytes:3110812526, used:0.005s, actions:ens1f0np0 ufid:9c86b37d-efba-48d3-8a12-d89a2b36deb8 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(4b91e38439544_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:12,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.52/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=17/0,tos=0/0,ttl=64/0,frag=first),udp(src=52771/0,dst=33108/0), packets:721833, bytes:6503715330, used:0.005s, actions:ens1f0np0 ufid:9eaeb02d-541f-4fbd-a219-cd8f41e00d0a skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=ff:ff:ff:ff:ff:ff),eth_type(0x0806),arp(sip=172.150.150.42,tip=172.150.150.1,op=1,sha=00:de:ad:96:02:02/00:00:00:00:00:00,tha=00:00:00:00:00:00/00:00:00:00:00:00), packets:0, bytes:0, used:never, actions:guestbridge,bondbridge,ens1f0np0,4b91e38439544_l,4e2a566fc7954_l ufid:7b734c18-b06f-44e8-90fb-49f6677c1711 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.42/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=17/0,tos=0/0,ttl=64/0,frag=later), packets:368523, bytes:24322518, used:0.005s, actions:ens1f0np0 ufid:6ebd61b5-f886-4266-9b7f-90a765a418b5 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(4b91e38439544_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:12,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.52/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=17/0,tos=0/0,ttl=64/0,frag=later), packets:664667, bytes:43868022, used:0.005s, actions:ens1f0np0 ufid:0760d7b1-37a2-48e3-98c1-ef5f8ca7e206 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::42/::,dst=2001:db8:150:150::1/::,label=0xfe10/0,proto=44/0,tclass=0/0,hlimit=64/0,frag=later), packets:314058, bytes:37058844, used:0.005s, actions:ens1f0np0 6. 5. use g1 & g2 send ipv4/ipv6 tcp stream nohup podman exec -it g1 bash -c 'netperf -4 -t TCP_STREAM -H 172.150.150.1 -l 120 -- -m 9000' &> /dev/null & sleep 1 nohup podman exec -it g2 bash -c 'netperf -4 -t TCP_STREAM -H 172.150.150.1 -l 120 -- -m 9000' &> /dev/null & sleep 1 nohup podman exec -it g2 bash -c 'netperf -6 -t TCP_STREAM -H 2001:db8:150:150::1 -l 120 -- -m 9000' &> /dev/null & sleep 1 nohup podman exec -it g1 bash -c 'netperf -6 -t TCP_STREAM -H 2001:db8:150:150::1 -l 120 -- -m 9000' &> /dev/null & # ovs-appctl dpif/dump-flows -m guestbridge ufid:ac4f41b4-48b6-4cb5-8286-6ccbedaf4250 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.42/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=6/0,tos=0/0,ttl=64/0,frag=no),tcp(src=35167/0,dst=12865/0),tcp_flags(0/0), packets:132088, bytes:1190570364, used:0.001s, flags:SP., actions:ens1f0np0 ufid:bd187471-0929-42b3-86eb-9239e292707f skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(4b91e38439544_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:12,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::52/::,dst=2001:db8:150:150::1/::,label=0x229b1/0,proto=6/0,tclass=0/0,hlimit=64/0,frag=no),tcp(src=35341/0,dst=12865/0),tcp_flags(0/0), packets:79169, bytes:713549750, used:0.079s, flags:SP., actions:ens1f0np0 ufid:745279b4-d031-4765-a2f0-4e7202070220 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(4b91e38439544_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:12,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.52/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=6/0,tos=0/0,ttl=64/0,frag=no),tcp(src=44681/0,dst=12865/0),tcp_flags(0/0), packets:134777, bytes:1214817958, used:0.001s, flags:SP., actions:ens1f0np0 ufid:977becc1-1a87-4009-9de9-b0cada8a72db skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::42/::,dst=2001:db8:150:150::1/::,label=0x92deb/0,proto=6/0,tclass=0/0,hlimit=64/0,frag=no),tcp(src=49201/0,dst=12865/0),tcp_flags(0/0), packets:98421, bytes:887105134, used:0.001s, flags:SP., actions:ens1f0np0 Actual results: 1. base on step3. when start mix ipv4+tcp & ipv6+udp traffic, ipv4 + tcp_stream didn't found on ovs bridge. Expected results: 1. the stpe3 should work as step4,5,6 Additional info: