Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.

Bug 2067163

Summary: [OSP 16.1] [HWOFFLOAD] [ML2-OVS] UDP traffic is not offloaded
Product: Red Hat OpenStack Reporter: Miguel Angel Nieto <mnietoji>
Component: openstack-neutronAssignee: OSP Team <rhos-maint>
Status: CLOSED DUPLICATE QA Contact: Eran Kuris <ekuris>
Severity: high Docs Contact:
Priority: unspecified    
Version: 16.1 (Train)CC: apevec, chrisw, ctrautma, egarciar, hakhande, mtomaska, qding, ralonsoh, scohen, supadhya
Target Milestone: ---   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-06-21 14:35:19 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Miguel Angel Nieto 2022-03-23 12:43:13 UTC
Description of problem:
UDP traffic is not offloaded in a hwoffload deployment with ml2-ovs

(overcloud) [stack@undercloud-0 ~]$ openstack server list --a
+--------------------------------------+-----------------------+--------+------------------------------------------------------------------------------------------------------------------------+-----------------------+---------------------------+
| ID                                   | Name                  | Status | Networks                                                                                                               | Image          
      | Flavor                    |
+--------------------------------------+-----------------------+--------+------------------------------------------------------------------------------------------------------------------------+-----------------------+---------------------------+
| dad0601b-d133-44bf-a8fa-72a2d145d5db | testpmd-hwoffload-dut | ACTIVE | hwoffload_net_nic0_136=10.10.136.160; hwoffload_net_nic1_137=10.10.137.191; management_net=10.10.134.128, 10.35.185.86 | trex_testpmd_mellanox | perf_numa_0_hwoffload_dut |
| 4f8ea113-0641-4ab4-88be-969917e4f1ba | trex                  | ACTIVE | hwoffload_net_nic0_136=10.10.136.150; hwoffload_net_nic1_137=10.10.137.132; management_net=10.10.134.167, 10.35.185.93 | trex_testpmd_mellanox | perf_numa_0_trex          |
+--------------------------------------+-----------------------+--------+------------------------------------------------------------------------------------------------------------------------+-----------------------+---------------------------+

(overcloud) [stack@undercloud-0 ~]$ openstack port list | egrep "offload"
| 03bf6bf3-d312-4b89-ac75-1b2531251801 | hwoffload_net_nic1_137_dut_normal_port-1        | fa:16:3e:52:21:c1 | ip_address='10.10.137.132', subnet_id='3a6cb405-6b49-49d9-840d-a24392fd7f96'   | ACTIVE |
| 6816495d-2335-4381-a61f-2819330fb42d | hwoffload_net_nic0_136_dut_normal_port-2        | fa:16:3e:94:1c:39 | ip_address='10.10.136.160', subnet_id='f8f171d9-7e82-4bdb-8cea-2fba56531cda'   | ACTIVE |
| a390fbb3-299c-4860-bc34-4eb65d63cbdd | hwoffload_net_nic0_136_dut_normal_port-0        | fa:16:3e:e9:9d:ea | ip_address='10.10.136.150', subnet_id='f8f171d9-7e82-4bdb-8cea-2fba56531cda'   | ACTIVE |
| be7a38ce-bbb7-4734-8fac-132cb2703924 | hwoffload_net_nic1_137_dut_normal_port-3        | fa:16:3e:cb:19:85 | ip_address='10.10.137.191', subnet_id='3a6cb405-6b49-49d9-840d-a24392fd7f96'   | ACTIVE |






Version-Release number of selected component (if applicable):
RHOS-16.1-RHEL-8-20220315.n.1
openvswitch2.13-2.13.0-143.el8fdp.x86_64


How reproducible:
1. Deploy hwoffload templates (i will attach them)
2. Create 2 vms using offload ports
3. Send traffic between vms
4. get flows: ovs-appctl dpctl/dump-flows -m type=offloaded
5. get tcpdump on representor prots 

[root@computehwoffload-1 heat-admin]# ovs-appctl dpctl/dump-flows -m type=offloaded
ufid:59e5892c-1bea-4cef-a711-a18cbce4efe0, skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(mx-bond),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:e9:9d:ea,dst=fa:16:3e:94:1c:39),eth_type(0x8100),vlan(vid=136,pcp=0),encap(eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no)), packets:39017717, bytes:2341051596, used:0.520s, offloaded:yes, dp:tc, actions:pop_vlan,enp4s0f1_2
ufid:17b67bd2-25fa-4ec7-8733-c08e30d373c7, skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(mx-bond),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:52:21:c1,dst=fa:16:3e:cb:19:85),eth_type(0x8100),vlan(vid=137,pcp=0),encap(eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no)), packets:39014764, bytes:2340885658, used:0.520s, offloaded:yes, dp:tc, actions:pop_vlan,enp4s0f1_1

[root@computehwoffload-1 heat-admin]# ovs-appctl dpctl/dump-flows -m
ufid:59e5892c-1bea-4cef-a711-a18cbce4efe0, skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(mx-bond),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:e9:9d:ea,dst=fa:16:3e:94:1c:39),eth_type(0x8100),vlan(vid=136,pcp=0),encap(eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no)), packets:45797797, bytes:2747856396, used:0.000s, offloaded:yes, dp:tc, actions:pop_vlan,enp4s0f1_2
ufid:17b67bd2-25fa-4ec7-8733-c08e30d373c7, skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(mx-bond),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:52:21:c1,dst=fa:16:3e:cb:19:85),eth_type(0x8100),vlan(vid=137,pcp=0),encap(eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no)), packets:45794726, bytes:2747683378, used:0.000s, offloaded:yes, dp:tc, actions:pop_vlan,enp4s0f1_1
ufid:35206544-27ea-446d-9de5-c40f75ae121f, skb_priority(0/0),skb_mark(0/0),ct_state(0/0x3),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(enp4s0f1_2),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:52:21:c1,dst=fa:16:3e:cb:19:85),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:37731252, bytes:1735637592, used:0.000s, dp:tc, actions:push_vlan(vid=136,pcp=0),mx-bond
ufid:9905c73b-b341-4760-a450-63cfa9bbe563, skb_priority(0/0),skb_mark(0/0),ct_state(0/0x3),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(enp4s0f1_1),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:e9:9d:ea,dst=fa:16:3e:94:1c:39),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:37734921, bytes:1735806366, used:0.000s, dp:tc, actions:push_vlan(vid=137,pcp=0),mx-bond
ufid:ca099a86-18e6-46f5-a085-370c2aff47e3, recirc_id(0),dp_hash(0/0),skb_priority(0/0),tunnel(tun_id=0x1,src=10.10.131.156,dst=10.10.131.120,ttl=0/0,flags(-df-csum+key)),in_port(vxlan_sys_4789),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=00:00:00:00:00:00/00:00:00:00:00:00,dst=00:00:00:00:00:00/00:00:00:00:00:00),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:5850, bytes:315900, used:1.306s, dp:ovs, actions:userspace(pid=2986179747,slow_path(match))




Actual results:
traffic is not offloaded


Expected results:
traffic should be offloaded


Additional info:
i attach templates and sosreport

Comment 1 Miguel Angel Nieto 2022-03-23 12:47:34 UTC
According to the flows, it is like offload is working, but performance is low and i can see packets in representor port
tcpdump -i enp4s0f1_1 -nne
12:46:22.334577 fa:16:3e:e9:9d:ea > fa:16:3e:94:1c:39, ethertype IPv4 (0x0800), length 60: 10.10.136.154.32772 > 10.10.137.136.57: UDP, length 18
12:46:22.334587 fa:16:3e:e9:9d:ea > fa:16:3e:94:1c:39, ethertype IPv4 (0x0800), length 60: 10.10.136.154.32772 > 10.10.137.136.57: UDP, length 18
12:46:22.334603 fa:16:3e:e9:9d:ea > fa:16:3e:94:1c:39, ethertype IPv4 (0x0800), length 60: 10.10.136.155.32773 > 10.10.137.137.58: UDP, length 18
12:46:22.334616 fa:16:3e:e9:9d:ea > fa:16:3e:94:1c:39, ethertype IPv4 (0x0800), length 60: 10.10.136.155.32773 > 10.10.137.137.58: UDP, length 18
12:46:22.334629 fa:16:3e:e9:9d:ea > fa:16:3e:94:1c:39, ethertype IPv4 (0x0800), length 60: 10.10.136.155.32773 > 10.10.137.137.58: UDP, length 18
12:46:22.334645 fa:16:3e:e9:9d:ea > fa:16:3e:94:1c:39, ethertype IPv4 (0x0800), length 60: 10.10.136.155.32773 > 10.10.137.137.58: UDP, length 18
12:46:22.334659 fa:16:3e:e9:9d:ea > fa:16:3e:94:1c:39, ethertype IPv4 (0x0800), length 60: 10.10.136.155.32773 > 10.10.137.137.58: UDP, length 18
12:46:22.334672 fa:16:3e:e9:9d:ea > fa:16:3e:94:1c:39, ethertype IPv4 (0x0800), length 60: 10.10.136.154.32772 > 10.10.137.136.57: UDP, length 18

Comment 2 Miguel Angel Nieto 2022-03-23 16:26:57 UTC
I have checked that offload works without any security group but it is not working if the instance has a security group even if the offload ports have port security disabled..

Some time ago I opened this bz that was fixed in the case of using ovn. In this case it is failing with ml2-ovs.
https://bugzilla.redhat.com/show_bug.cgi?id=1940403

Comment 6 Miguel Angel Nieto 2022-03-24 14:07:11 UTC
Same issue happening with vxlan too.
(overcloud) [stack@undercloud-0 ~]$ openstack server list
+--------------------------------------+-----------------------+--------+------------------------------------------------------------------------------------------------------------------------------+-----------------------+---------------------------+
| ID                                   | Name                  | Status | Networks                                                                                                                     | Image                 | Flavor                    |
+--------------------------------------+-----------------------+--------+------------------------------------------------------------------------------------------------------------------------------+-----------------------+---------------------------+
| 9b712fc9-3b68-410f-a1d8-7962ac0a798f | testpmd-hwoffload-dut | ACTIVE | hwoffload_net_nic0_vxlan0=10.10.128.140; hwoffload_net_nic1_vxlan1=10.10.129.169; management_net=10.10.134.196, 10.35.185.86 | trex_testpmd_mellanox | perf_numa_0_hwoffload_dut |
| 1c236446-1386-4b14-adb3-63c8b44d2553 | trex                  | ACTIVE | hwoffload_net_nic0_vxlan0=10.10.128.149; hwoffload_net_nic1_vxlan1=10.10.129.130; management_net=10.10.134.187, 10.35.185.89 | trex_testpmd_mellanox | perf_numa_0_trex          |
+--------------------------------------+-----------------------+--------+------------------------------------------------------------------------------------------------------------------------------+-----------------------+---------------------------+
(overcloud) [stack@undercloud-0 ~]$ openstack port list | grep offload
| 14b0e7ea-1d0f-4350-9724-15aaf4962f40 | hwoffload_net_nic0_vxlan0_dut_normal_port-0     | fa:16:3e:2a:ab:af | ip_address='10.10.128.149', subnet_id='6adbaaca-6692-487c-b55a-ad065e4ffcde'   | ACTIVE |
| 29e00d0d-94fa-4fd4-93fd-c96af90920fe | hwoffload_net_nic1_vxlan1_dut_normal_port-1     | fa:16:3e:59:96:e0 | ip_address='10.10.129.130', subnet_id='98dc36d4-fb4a-4f2d-805c-de58cee60455'   | ACTIVE |
| 39f8225a-57e5-4009-9923-9ab3d6cc962b | hwoffload_net_nic1_vxlan1_dut_normal_port-3     | fa:16:3e:b5:08:ba | ip_address='10.10.129.169', subnet_id='98dc36d4-fb4a-4f2d-805c-de58cee60455'   | ACTIVE |
| e9528d68-8d3d-4c9a-9ec4-a8f741f5519a | hwoffload_net_nic0_vxlan0_dut_normal_port-2     | fa:16:3e:c5:a4:6b | ip_address='10.10.128.140', subnet_id='6adbaaca-6692-487c-b55a-ad065e4ffcde'   | ACTIVE |

[root@computehwoffload-1 heat-admin]# ovs-appctl dpctl/dump-flows -m
ufid:245b9e8c-70df-4810-9149-7c5909f72ae1, skb_priority(0/0),tunnel(tun_id=0x1,src=10.10.131.117,dst=10.10.131.120,ttl=0/0,tp_dst=4789,flags(+key)),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(vxlan_sys_4789),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:2a:ab:af,dst=fa:16:3e:c5:a4:6b),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:12330113, bytes:739733756, used:0.210s, offloaded:yes, dp:tc, actions:enp4s0f0_7
ufid:e47ab5db-d3f9-4145-bb5f-56865a77635e, skb_priority(0/0),tunnel(tun_id=0x1,src=10.10.131.117,dst=10.10.131.120,tos=0x1,ttl=0/0,tp_dst=4789,flags(+key)),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(vxlan_sys_4789),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:2a:ab:af,dst=fa:16:3e:c5:a4:6b),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:447, bytes:26806, used:0.210s, offloaded:yes, dp:tc, actions:enp4s0f0_7
ufid:c46f8b42-2642-4be1-89e4-2573e9254d5c, skb_priority(0/0),tunnel(tun_id=0x2,src=10.10.131.117,dst=10.10.131.120,ttl=0/0,tp_dst=4789,flags(+key)),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(vxlan_sys_4789),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:59:96:e0,dst=fa:16:3e:b5:08:ba),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:12318191, bytes:738744554, used:0.210s, offloaded:yes, dp:tc, actions:enp4s0f0_5
ufid:1b523c7f-6c13-49ac-87d0-6f5b372930cb, skb_priority(0/0),tunnel(tun_id=0x2,src=10.10.131.117,dst=10.10.131.120,tos=0x1,ttl=0/0,tp_dst=4789,flags(+key)),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(vxlan_sys_4789),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:59:96:e0,dst=fa:16:3e:b5:08:ba),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:454, bytes:27226, used:0.210s, offloaded:yes, dp:tc, actions:enp4s0f0_5
ufid:ac7c2810-18b0-4e7d-99a1-2c5790a9eab9, skb_priority(0/0),skb_mark(0/0),ct_state(0/0x3),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(enp4s0f0_7),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:59:96:e0,dst=fa:16:3e:b5:08:ba),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0x3,ttl=0/0,frag=no), packets:9372628, bytes:431140888, used:0.000s, dp:tc, actions:set(tunnel(tun_id=0x1,src=10.10.131.120,dst=10.10.131.117,ttl=64,tp_dst=4789,flags(key))),vxlan_sys_4789
ufid:719c66ed-d41a-470c-8fb7-cfefbbee5be2, skb_priority(0/0),skb_mark(0/0),ct_state(0/0x3),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(enp4s0f0_7),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:59:96:e0,dst=fa:16:3e:b5:08:ba),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0x1/0x3,ttl=0/0,frag=no), packets:347, bytes:15962, used:0.160s, dp:tc, actions:set(tunnel(tun_id=0x1,src=10.10.131.120,dst=10.10.131.117,tos=0x1,ttl=64,tp_dst=4789,flags(key))),vxlan_sys_4789
ufid:b0dc9609-4740-4df8-a7b5-9b0ee06cae2f, skb_priority(0/0),skb_mark(0/0),ct_state(0/0x3),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(enp4s0f0_5),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:2a:ab:af,dst=fa:16:3e:c5:a4:6b),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0x3,ttl=0/0,frag=no), packets:9381000, bytes:431526000, used:0.000s, dp:tc, actions:set(tunnel(tun_id=0x2,src=10.10.131.120,dst=10.10.131.117,ttl=64,tp_dst=4789,flags(key))),vxlan_sys_4789
ufid:df787ba3-1672-4e56-a8a6-3a810097b3f4, skb_priority(0/0),skb_mark(0/0),ct_state(0/0x3),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(enp4s0f0_5),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:2a:ab:af,dst=fa:16:3e:c5:a4:6b),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0x1/0x3,ttl=0/0,frag=no), packets:333, bytes:15318, used:0.290s, dp:tc, actions:set(tunnel(tun_id=0x2,src=10.10.131.120,dst=10.10.131.117,tos=0x1,ttl=64,tp_dst=4789,flags(key))),vxlan_sys_4789
ufid:65245d77-f184-4942-8d5e-238fbe89b1f3, recirc_id(0),dp_hash(0/0),skb_priority(0/0),tunnel(tun_id=0x3,src=10.10.131.156,dst=10.10.131.120,ttl=0/0,flags(-df-csum+key)),in_port(vxlan_sys_4789),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=00:00:00:00:00:00/00:00:00:00:00:00,dst=00:00:00:00:00:00/00:00:00:00:00:00),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:1682, bytes:90828, used:0.381s, dp:ovs, actions:userspace(pid=2986179747,slow_path(match))
ufid:7cb2dfd7-00cb-4862-a827-45cd7b259d2c, recirc_id(0),dp_hash(0/0),skb_priority(0/0),in_port(enp6s0f1),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=e4:fc:82:34:4b:50,dst=01:00:5e:00:00:01),eth_type(0x8100),vlan(vid=134,pcp=0/0x0),encap(eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no)), packets:0, bytes:0, used:never, dp:ovs, actions:userspace(pid=2895439325,slow_path(match))
[root@computehwoffload-1 heat-admin]# ovs-appctl dpctl/dump-flows -m type=offloaded
ufid:245b9e8c-70df-4810-9149-7c5909f72ae1, skb_priority(0/0),tunnel(tun_id=0x1,src=10.10.131.117,dst=10.10.131.120,ttl=0/0,tp_dst=4789,flags(+key)),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(vxlan_sys_4789),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:2a:ab:af,dst=fa:16:3e:c5:a4:6b),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:13857378, bytes:831369656, used:0.150s, offloaded:yes, dp:tc, actions:enp4s0f0_7
ufid:e47ab5db-d3f9-4145-bb5f-56865a77635e, skb_priority(0/0),tunnel(tun_id=0x1,src=10.10.131.117,dst=10.10.131.120,tos=0x1,ttl=0/0,tp_dst=4789,flags(+key)),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(vxlan_sys_4789),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:2a:ab:af,dst=fa:16:3e:c5:a4:6b),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:498, bytes:29866, used:0.150s, offloaded:yes, dp:tc, actions:enp4s0f0_7
ufid:c46f8b42-2642-4be1-89e4-2573e9254d5c, skb_priority(0/0),tunnel(tun_id=0x2,src=10.10.131.117,dst=10.10.131.120,ttl=0/0,tp_dst=4789,flags(+key)),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(vxlan_sys_4789),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:59:96:e0,dst=fa:16:3e:b5:08:ba),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:13845439, bytes:830379434, used:0.150s, offloaded:yes, dp:tc, actions:enp4s0f0_5
ufid:1b523c7f-6c13-49ac-87d0-6f5b372930cb, skb_priority(0/0),tunnel(tun_id=0x2,src=10.10.131.117,dst=10.10.131.120,tos=0x1,ttl=0/0,tp_dst=4789,flags(+key)),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(vxlan_sys_4789),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:59:96:e0,dst=fa:16:3e:b5:08:ba),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:505, bytes:30286, used:0.150s, offloaded:yes, dp:tc, actions:enp4s0f0_5
ufid:a260e7dc-9daa-4a66-8f7e-cb7639011478, skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(mx-bond),packet_type(ns=0/0,id=0/0),eth(src=e4:fc:82:34:4b:7b,dst=01:80:c2:00:00:0e),eth_type(0x88cc), packets:0, bytes:0, used:4.240s, offloaded:yes, dp:tc, actions:drop

29: enp4s0f0: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 9000 qdisc mq master mx-bond state UP mode DEFAULT group default qlen 1000
    link/ether 98:03:9b:9d:73:74 brd ff:ff:ff:ff:ff:ff
    vf 0     link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off
    vf 1     link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off
    vf 2     link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off
    vf 3     link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off
    vf 4     link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off
    vf 5     link/ether fa:16:3e:b5:08:ba brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off
    vf 6     link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off
    vf 7     link/ether fa:16:3e:c5:a4:6b brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off
    vf 8     link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off
    vf 9     link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off


tcpdump -i enp4s0f0_5 -nne
12:27:40.221667 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.153.32772 > 10.10.129.134.57: UDP, length 18                                                                 
12:27:40.221682 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.153.32772 > 10.10.129.134.57: UDP, length 18                                                                 
12:27:40.221698 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.153.32772 > 10.10.129.134.57: UDP, length 18                                                                 
12:27:40.221710 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.153.32772 > 10.10.129.134.57: UDP, length 18                                                                 
12:27:40.221725 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.153.32772 > 10.10.129.134.57: UDP, length 18                                                                 
12:27:40.221741 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.153.32772 > 10.10.129.134.57: UDP, length 18                                                                 
12:27:40.221756 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.153.32772 > 10.10.129.134.57: UDP, length 18                                                                 
12:27:40.221776 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.153.32772 > 10.10.129.134.57: UDP, length 18                                                                 
12:27:40.221791 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18                                                                 
12:27:40.221807 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18                                                                 
12:27:40.222141 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18                                                                 
12:27:40.222148 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18                                                                 
12:27:40.222153 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18                                                                 
12:27:40.222159 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18                                                                 
12:27:40.222164 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18                                                                 
12:27:40.222169 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18                                                                 
12:27:40.222173 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18                                                                 
12:27:40.222179 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18                                                                 
12:27:40.222184 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18             

Apparently there are offload flows, but packet can be seen in representor port, and the performance is low, so traffic is not offloaded. I have generated a new sos report after running with vxlan

Comment 21 Rodolfo Alonso 2022-06-21 14:35:19 UTC

*** This bug has been marked as a duplicate of bug 2099569 ***

Comment 23 Miguel Angel Nieto 2022-11-25 09:10:59 UTC

*** This bug has been marked as a duplicate of bug 2133466 ***