Bug 2067163
| Summary: | [OSP 16.1] [HWOFFLOAD] [ML2-OVS] UDP traffic is not offloaded | ||
|---|---|---|---|
| Product: | Red Hat OpenStack | Reporter: | Miguel Angel Nieto <mnietoji> |
| Component: | openstack-neutron | Assignee: | OSP Team <rhos-maint> |
| Status: | CLOSED DUPLICATE | QA Contact: | Eran Kuris <ekuris> |
| Severity: | high | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 16.1 (Train) | CC: | apevec, chrisw, ctrautma, egarciar, hakhande, mtomaska, qding, ralonsoh, scohen, supadhya |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2022-06-21 14:35:19 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
According to the flows, it is like offload is working, but performance is low and i can see packets in representor port tcpdump -i enp4s0f1_1 -nne 12:46:22.334577 fa:16:3e:e9:9d:ea > fa:16:3e:94:1c:39, ethertype IPv4 (0x0800), length 60: 10.10.136.154.32772 > 10.10.137.136.57: UDP, length 18 12:46:22.334587 fa:16:3e:e9:9d:ea > fa:16:3e:94:1c:39, ethertype IPv4 (0x0800), length 60: 10.10.136.154.32772 > 10.10.137.136.57: UDP, length 18 12:46:22.334603 fa:16:3e:e9:9d:ea > fa:16:3e:94:1c:39, ethertype IPv4 (0x0800), length 60: 10.10.136.155.32773 > 10.10.137.137.58: UDP, length 18 12:46:22.334616 fa:16:3e:e9:9d:ea > fa:16:3e:94:1c:39, ethertype IPv4 (0x0800), length 60: 10.10.136.155.32773 > 10.10.137.137.58: UDP, length 18 12:46:22.334629 fa:16:3e:e9:9d:ea > fa:16:3e:94:1c:39, ethertype IPv4 (0x0800), length 60: 10.10.136.155.32773 > 10.10.137.137.58: UDP, length 18 12:46:22.334645 fa:16:3e:e9:9d:ea > fa:16:3e:94:1c:39, ethertype IPv4 (0x0800), length 60: 10.10.136.155.32773 > 10.10.137.137.58: UDP, length 18 12:46:22.334659 fa:16:3e:e9:9d:ea > fa:16:3e:94:1c:39, ethertype IPv4 (0x0800), length 60: 10.10.136.155.32773 > 10.10.137.137.58: UDP, length 18 12:46:22.334672 fa:16:3e:e9:9d:ea > fa:16:3e:94:1c:39, ethertype IPv4 (0x0800), length 60: 10.10.136.154.32772 > 10.10.137.136.57: UDP, length 18 I have checked that offload works without any security group but it is not working if the instance has a security group even if the offload ports have port security disabled.. Some time ago I opened this bz that was fixed in the case of using ovn. In this case it is failing with ml2-ovs. https://bugzilla.redhat.com/show_bug.cgi?id=1940403 Same issue happening with vxlan too.
(overcloud) [stack@undercloud-0 ~]$ openstack server list
+--------------------------------------+-----------------------+--------+------------------------------------------------------------------------------------------------------------------------------+-----------------------+---------------------------+
| ID | Name | Status | Networks | Image | Flavor |
+--------------------------------------+-----------------------+--------+------------------------------------------------------------------------------------------------------------------------------+-----------------------+---------------------------+
| 9b712fc9-3b68-410f-a1d8-7962ac0a798f | testpmd-hwoffload-dut | ACTIVE | hwoffload_net_nic0_vxlan0=10.10.128.140; hwoffload_net_nic1_vxlan1=10.10.129.169; management_net=10.10.134.196, 10.35.185.86 | trex_testpmd_mellanox | perf_numa_0_hwoffload_dut |
| 1c236446-1386-4b14-adb3-63c8b44d2553 | trex | ACTIVE | hwoffload_net_nic0_vxlan0=10.10.128.149; hwoffload_net_nic1_vxlan1=10.10.129.130; management_net=10.10.134.187, 10.35.185.89 | trex_testpmd_mellanox | perf_numa_0_trex |
+--------------------------------------+-----------------------+--------+------------------------------------------------------------------------------------------------------------------------------+-----------------------+---------------------------+
(overcloud) [stack@undercloud-0 ~]$ openstack port list | grep offload
| 14b0e7ea-1d0f-4350-9724-15aaf4962f40 | hwoffload_net_nic0_vxlan0_dut_normal_port-0 | fa:16:3e:2a:ab:af | ip_address='10.10.128.149', subnet_id='6adbaaca-6692-487c-b55a-ad065e4ffcde' | ACTIVE |
| 29e00d0d-94fa-4fd4-93fd-c96af90920fe | hwoffload_net_nic1_vxlan1_dut_normal_port-1 | fa:16:3e:59:96:e0 | ip_address='10.10.129.130', subnet_id='98dc36d4-fb4a-4f2d-805c-de58cee60455' | ACTIVE |
| 39f8225a-57e5-4009-9923-9ab3d6cc962b | hwoffload_net_nic1_vxlan1_dut_normal_port-3 | fa:16:3e:b5:08:ba | ip_address='10.10.129.169', subnet_id='98dc36d4-fb4a-4f2d-805c-de58cee60455' | ACTIVE |
| e9528d68-8d3d-4c9a-9ec4-a8f741f5519a | hwoffload_net_nic0_vxlan0_dut_normal_port-2 | fa:16:3e:c5:a4:6b | ip_address='10.10.128.140', subnet_id='6adbaaca-6692-487c-b55a-ad065e4ffcde' | ACTIVE |
[root@computehwoffload-1 heat-admin]# ovs-appctl dpctl/dump-flows -m
ufid:245b9e8c-70df-4810-9149-7c5909f72ae1, skb_priority(0/0),tunnel(tun_id=0x1,src=10.10.131.117,dst=10.10.131.120,ttl=0/0,tp_dst=4789,flags(+key)),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(vxlan_sys_4789),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:2a:ab:af,dst=fa:16:3e:c5:a4:6b),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:12330113, bytes:739733756, used:0.210s, offloaded:yes, dp:tc, actions:enp4s0f0_7
ufid:e47ab5db-d3f9-4145-bb5f-56865a77635e, skb_priority(0/0),tunnel(tun_id=0x1,src=10.10.131.117,dst=10.10.131.120,tos=0x1,ttl=0/0,tp_dst=4789,flags(+key)),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(vxlan_sys_4789),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:2a:ab:af,dst=fa:16:3e:c5:a4:6b),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:447, bytes:26806, used:0.210s, offloaded:yes, dp:tc, actions:enp4s0f0_7
ufid:c46f8b42-2642-4be1-89e4-2573e9254d5c, skb_priority(0/0),tunnel(tun_id=0x2,src=10.10.131.117,dst=10.10.131.120,ttl=0/0,tp_dst=4789,flags(+key)),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(vxlan_sys_4789),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:59:96:e0,dst=fa:16:3e:b5:08:ba),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:12318191, bytes:738744554, used:0.210s, offloaded:yes, dp:tc, actions:enp4s0f0_5
ufid:1b523c7f-6c13-49ac-87d0-6f5b372930cb, skb_priority(0/0),tunnel(tun_id=0x2,src=10.10.131.117,dst=10.10.131.120,tos=0x1,ttl=0/0,tp_dst=4789,flags(+key)),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(vxlan_sys_4789),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:59:96:e0,dst=fa:16:3e:b5:08:ba),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:454, bytes:27226, used:0.210s, offloaded:yes, dp:tc, actions:enp4s0f0_5
ufid:ac7c2810-18b0-4e7d-99a1-2c5790a9eab9, skb_priority(0/0),skb_mark(0/0),ct_state(0/0x3),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(enp4s0f0_7),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:59:96:e0,dst=fa:16:3e:b5:08:ba),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0x3,ttl=0/0,frag=no), packets:9372628, bytes:431140888, used:0.000s, dp:tc, actions:set(tunnel(tun_id=0x1,src=10.10.131.120,dst=10.10.131.117,ttl=64,tp_dst=4789,flags(key))),vxlan_sys_4789
ufid:719c66ed-d41a-470c-8fb7-cfefbbee5be2, skb_priority(0/0),skb_mark(0/0),ct_state(0/0x3),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(enp4s0f0_7),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:59:96:e0,dst=fa:16:3e:b5:08:ba),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0x1/0x3,ttl=0/0,frag=no), packets:347, bytes:15962, used:0.160s, dp:tc, actions:set(tunnel(tun_id=0x1,src=10.10.131.120,dst=10.10.131.117,tos=0x1,ttl=64,tp_dst=4789,flags(key))),vxlan_sys_4789
ufid:b0dc9609-4740-4df8-a7b5-9b0ee06cae2f, skb_priority(0/0),skb_mark(0/0),ct_state(0/0x3),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(enp4s0f0_5),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:2a:ab:af,dst=fa:16:3e:c5:a4:6b),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0x3,ttl=0/0,frag=no), packets:9381000, bytes:431526000, used:0.000s, dp:tc, actions:set(tunnel(tun_id=0x2,src=10.10.131.120,dst=10.10.131.117,ttl=64,tp_dst=4789,flags(key))),vxlan_sys_4789
ufid:df787ba3-1672-4e56-a8a6-3a810097b3f4, skb_priority(0/0),skb_mark(0/0),ct_state(0/0x3),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(enp4s0f0_5),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:2a:ab:af,dst=fa:16:3e:c5:a4:6b),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0x1/0x3,ttl=0/0,frag=no), packets:333, bytes:15318, used:0.290s, dp:tc, actions:set(tunnel(tun_id=0x2,src=10.10.131.120,dst=10.10.131.117,tos=0x1,ttl=64,tp_dst=4789,flags(key))),vxlan_sys_4789
ufid:65245d77-f184-4942-8d5e-238fbe89b1f3, recirc_id(0),dp_hash(0/0),skb_priority(0/0),tunnel(tun_id=0x3,src=10.10.131.156,dst=10.10.131.120,ttl=0/0,flags(-df-csum+key)),in_port(vxlan_sys_4789),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=00:00:00:00:00:00/00:00:00:00:00:00,dst=00:00:00:00:00:00/00:00:00:00:00:00),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:1682, bytes:90828, used:0.381s, dp:ovs, actions:userspace(pid=2986179747,slow_path(match))
ufid:7cb2dfd7-00cb-4862-a827-45cd7b259d2c, recirc_id(0),dp_hash(0/0),skb_priority(0/0),in_port(enp6s0f1),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=e4:fc:82:34:4b:50,dst=01:00:5e:00:00:01),eth_type(0x8100),vlan(vid=134,pcp=0/0x0),encap(eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no)), packets:0, bytes:0, used:never, dp:ovs, actions:userspace(pid=2895439325,slow_path(match))
[root@computehwoffload-1 heat-admin]# ovs-appctl dpctl/dump-flows -m type=offloaded
ufid:245b9e8c-70df-4810-9149-7c5909f72ae1, skb_priority(0/0),tunnel(tun_id=0x1,src=10.10.131.117,dst=10.10.131.120,ttl=0/0,tp_dst=4789,flags(+key)),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(vxlan_sys_4789),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:2a:ab:af,dst=fa:16:3e:c5:a4:6b),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:13857378, bytes:831369656, used:0.150s, offloaded:yes, dp:tc, actions:enp4s0f0_7
ufid:e47ab5db-d3f9-4145-bb5f-56865a77635e, skb_priority(0/0),tunnel(tun_id=0x1,src=10.10.131.117,dst=10.10.131.120,tos=0x1,ttl=0/0,tp_dst=4789,flags(+key)),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(vxlan_sys_4789),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:2a:ab:af,dst=fa:16:3e:c5:a4:6b),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:498, bytes:29866, used:0.150s, offloaded:yes, dp:tc, actions:enp4s0f0_7
ufid:c46f8b42-2642-4be1-89e4-2573e9254d5c, skb_priority(0/0),tunnel(tun_id=0x2,src=10.10.131.117,dst=10.10.131.120,ttl=0/0,tp_dst=4789,flags(+key)),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(vxlan_sys_4789),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:59:96:e0,dst=fa:16:3e:b5:08:ba),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:13845439, bytes:830379434, used:0.150s, offloaded:yes, dp:tc, actions:enp4s0f0_5
ufid:1b523c7f-6c13-49ac-87d0-6f5b372930cb, skb_priority(0/0),tunnel(tun_id=0x2,src=10.10.131.117,dst=10.10.131.120,tos=0x1,ttl=0/0,tp_dst=4789,flags(+key)),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(vxlan_sys_4789),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:59:96:e0,dst=fa:16:3e:b5:08:ba),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:505, bytes:30286, used:0.150s, offloaded:yes, dp:tc, actions:enp4s0f0_5
ufid:a260e7dc-9daa-4a66-8f7e-cb7639011478, skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(mx-bond),packet_type(ns=0/0,id=0/0),eth(src=e4:fc:82:34:4b:7b,dst=01:80:c2:00:00:0e),eth_type(0x88cc), packets:0, bytes:0, used:4.240s, offloaded:yes, dp:tc, actions:drop
29: enp4s0f0: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 9000 qdisc mq master mx-bond state UP mode DEFAULT group default qlen 1000
link/ether 98:03:9b:9d:73:74 brd ff:ff:ff:ff:ff:ff
vf 0 link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off
vf 1 link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off
vf 2 link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off
vf 3 link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off
vf 4 link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off
vf 5 link/ether fa:16:3e:b5:08:ba brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off
vf 6 link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off
vf 7 link/ether fa:16:3e:c5:a4:6b brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off
vf 8 link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off
vf 9 link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking off, link-state disable, trust off, query_rss off
tcpdump -i enp4s0f0_5 -nne
12:27:40.221667 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.153.32772 > 10.10.129.134.57: UDP, length 18
12:27:40.221682 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.153.32772 > 10.10.129.134.57: UDP, length 18
12:27:40.221698 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.153.32772 > 10.10.129.134.57: UDP, length 18
12:27:40.221710 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.153.32772 > 10.10.129.134.57: UDP, length 18
12:27:40.221725 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.153.32772 > 10.10.129.134.57: UDP, length 18
12:27:40.221741 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.153.32772 > 10.10.129.134.57: UDP, length 18
12:27:40.221756 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.153.32772 > 10.10.129.134.57: UDP, length 18
12:27:40.221776 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.153.32772 > 10.10.129.134.57: UDP, length 18
12:27:40.221791 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18
12:27:40.221807 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18
12:27:40.222141 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18
12:27:40.222148 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18
12:27:40.222153 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18
12:27:40.222159 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18
12:27:40.222164 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18
12:27:40.222169 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18
12:27:40.222173 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18
12:27:40.222179 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18
12:27:40.222184 fa:16:3e:2a:ab:af > fa:16:3e:c5:a4:6b, ethertype IPv4 (0x0800), length 60: 10.10.128.155.32774 > 10.10.129.136.59: UDP, length 18
Apparently there are offload flows, but packet can be seen in representor port, and the performance is low, so traffic is not offloaded. I have generated a new sos report after running with vxlan
*** This bug has been marked as a duplicate of bug 2099569 *** *** This bug has been marked as a duplicate of bug 2133466 *** |
Description of problem: UDP traffic is not offloaded in a hwoffload deployment with ml2-ovs (overcloud) [stack@undercloud-0 ~]$ openstack server list --a +--------------------------------------+-----------------------+--------+------------------------------------------------------------------------------------------------------------------------+-----------------------+---------------------------+ | ID | Name | Status | Networks | Image | Flavor | +--------------------------------------+-----------------------+--------+------------------------------------------------------------------------------------------------------------------------+-----------------------+---------------------------+ | dad0601b-d133-44bf-a8fa-72a2d145d5db | testpmd-hwoffload-dut | ACTIVE | hwoffload_net_nic0_136=10.10.136.160; hwoffload_net_nic1_137=10.10.137.191; management_net=10.10.134.128, 10.35.185.86 | trex_testpmd_mellanox | perf_numa_0_hwoffload_dut | | 4f8ea113-0641-4ab4-88be-969917e4f1ba | trex | ACTIVE | hwoffload_net_nic0_136=10.10.136.150; hwoffload_net_nic1_137=10.10.137.132; management_net=10.10.134.167, 10.35.185.93 | trex_testpmd_mellanox | perf_numa_0_trex | +--------------------------------------+-----------------------+--------+------------------------------------------------------------------------------------------------------------------------+-----------------------+---------------------------+ (overcloud) [stack@undercloud-0 ~]$ openstack port list | egrep "offload" | 03bf6bf3-d312-4b89-ac75-1b2531251801 | hwoffload_net_nic1_137_dut_normal_port-1 | fa:16:3e:52:21:c1 | ip_address='10.10.137.132', subnet_id='3a6cb405-6b49-49d9-840d-a24392fd7f96' | ACTIVE | | 6816495d-2335-4381-a61f-2819330fb42d | hwoffload_net_nic0_136_dut_normal_port-2 | fa:16:3e:94:1c:39 | ip_address='10.10.136.160', subnet_id='f8f171d9-7e82-4bdb-8cea-2fba56531cda' | ACTIVE | | a390fbb3-299c-4860-bc34-4eb65d63cbdd | hwoffload_net_nic0_136_dut_normal_port-0 | fa:16:3e:e9:9d:ea | ip_address='10.10.136.150', subnet_id='f8f171d9-7e82-4bdb-8cea-2fba56531cda' | ACTIVE | | be7a38ce-bbb7-4734-8fac-132cb2703924 | hwoffload_net_nic1_137_dut_normal_port-3 | fa:16:3e:cb:19:85 | ip_address='10.10.137.191', subnet_id='3a6cb405-6b49-49d9-840d-a24392fd7f96' | ACTIVE | Version-Release number of selected component (if applicable): RHOS-16.1-RHEL-8-20220315.n.1 openvswitch2.13-2.13.0-143.el8fdp.x86_64 How reproducible: 1. Deploy hwoffload templates (i will attach them) 2. Create 2 vms using offload ports 3. Send traffic between vms 4. get flows: ovs-appctl dpctl/dump-flows -m type=offloaded 5. get tcpdump on representor prots [root@computehwoffload-1 heat-admin]# ovs-appctl dpctl/dump-flows -m type=offloaded ufid:59e5892c-1bea-4cef-a711-a18cbce4efe0, skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(mx-bond),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:e9:9d:ea,dst=fa:16:3e:94:1c:39),eth_type(0x8100),vlan(vid=136,pcp=0),encap(eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no)), packets:39017717, bytes:2341051596, used:0.520s, offloaded:yes, dp:tc, actions:pop_vlan,enp4s0f1_2 ufid:17b67bd2-25fa-4ec7-8733-c08e30d373c7, skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(mx-bond),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:52:21:c1,dst=fa:16:3e:cb:19:85),eth_type(0x8100),vlan(vid=137,pcp=0),encap(eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no)), packets:39014764, bytes:2340885658, used:0.520s, offloaded:yes, dp:tc, actions:pop_vlan,enp4s0f1_1 [root@computehwoffload-1 heat-admin]# ovs-appctl dpctl/dump-flows -m ufid:59e5892c-1bea-4cef-a711-a18cbce4efe0, skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(mx-bond),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:e9:9d:ea,dst=fa:16:3e:94:1c:39),eth_type(0x8100),vlan(vid=136,pcp=0),encap(eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no)), packets:45797797, bytes:2747856396, used:0.000s, offloaded:yes, dp:tc, actions:pop_vlan,enp4s0f1_2 ufid:17b67bd2-25fa-4ec7-8733-c08e30d373c7, skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(mx-bond),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:52:21:c1,dst=fa:16:3e:cb:19:85),eth_type(0x8100),vlan(vid=137,pcp=0),encap(eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no)), packets:45794726, bytes:2747683378, used:0.000s, offloaded:yes, dp:tc, actions:pop_vlan,enp4s0f1_1 ufid:35206544-27ea-446d-9de5-c40f75ae121f, skb_priority(0/0),skb_mark(0/0),ct_state(0/0x3),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(enp4s0f1_2),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:52:21:c1,dst=fa:16:3e:cb:19:85),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:37731252, bytes:1735637592, used:0.000s, dp:tc, actions:push_vlan(vid=136,pcp=0),mx-bond ufid:9905c73b-b341-4760-a450-63cfa9bbe563, skb_priority(0/0),skb_mark(0/0),ct_state(0/0x3),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(enp4s0f1_1),packet_type(ns=0/0,id=0/0),eth(src=fa:16:3e:e9:9d:ea,dst=fa:16:3e:94:1c:39),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:37734921, bytes:1735806366, used:0.000s, dp:tc, actions:push_vlan(vid=137,pcp=0),mx-bond ufid:ca099a86-18e6-46f5-a085-370c2aff47e3, recirc_id(0),dp_hash(0/0),skb_priority(0/0),tunnel(tun_id=0x1,src=10.10.131.156,dst=10.10.131.120,ttl=0/0,flags(-df-csum+key)),in_port(vxlan_sys_4789),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),eth(src=00:00:00:00:00:00/00:00:00:00:00:00,dst=00:00:00:00:00:00/00:00:00:00:00:00),eth_type(0x0800),ipv4(src=0.0.0.0/0.0.0.0,dst=0.0.0.0/0.0.0.0,proto=0/0,tos=0/0,ttl=0/0,frag=no), packets:5850, bytes:315900, used:1.306s, dp:ovs, actions:userspace(pid=2986179747,slow_path(match)) Actual results: traffic is not offloaded Expected results: traffic should be offloaded Additional info: i attach templates and sosreport