Bug 2223244 - [ovs bond]The flow table has no ipv4 tcp traffic for a long time
Summary: [ovs bond]The flow table has no ipv4 tcp traffic for a long time
Keywords:
Status: NEW
Alias: None
Product: Red Hat Enterprise Linux Fast Datapath
Classification: Red Hat
Component: openvswitch
Version: RHEL 8.0
Hardware: x86_64
OS: Linux
unspecified
high
Target Milestone: ---
: ---
Assignee: Timothy Redaelli
QA Contact: mhou
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-07-17 03:38 UTC by mhou
Modified: 2023-07-17 06:49 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker FD-3016 0 None None None 2023-07-17 03:40:45 UTC

Description mhou 2023-07-17 03:38:05 UTC
Description of problem:
start three containers and attach to guestbridge, create dpdkbonding port on bondbridge. Use vtap device to connect guestbrige and containers. On g1,g2 container, use Netperf send traffic with peer side. Found TCP_STREAM didn't work. If only send TCP_STREAM on g1, traffic work as well.

Version-Release number of selected component (if applicable):
kernel version:5.14.0-337.el9.x86_64
openvswitch version: openvswitch3.1-3.1.0-33.el9fdp.x86_64

# ethtool -i ens1f0np0
driver: mlx5_core
version: 5.14.0-337.el9.x86_64
firmware-version: 16.34.1002 (MT_0000000080)
expansion-rom-version: 
bus-info: 0000:12:00.0
supports-statistics: yes
supports-test: yes
supports-eeprom-access: no
supports-register-dump: no
supports-priv-flags: yes


How reproducible:


Steps to Reproduce:
1. create ovs dpdkbonding topo as below:
# ovs-vsctl list Open_vSwitch .
_uuid               : 373a141e-7c36-4e1c-9544-c0fd46279fea
bridges             : [a1a74e89-513f-407f-be47-f09e5b6f2bb4, b13e4d0b-5151-48f1-a927-1c085a463966]
cur_cfg             : 11
datapath_types      : [netdev, system]
datapaths           : {}
db_version          : "8.3.1"
dpdk_initialized    : true
dpdk_version        : "DPDK 22.11.1"
external_ids        : {hostname=hp-dl388g10-03.rhts.eng.pek2.redhat.com, rundir="/var/run/openvswitch", system-id="27de9e73-4d86-4cd3-bd57-5f8479adb8d3"}
iface_types         : [bareudp, dpdk, dpdkvhostuser, dpdkvhostuserclient, erspan, geneve, gre, gtpu, internal, ip6erspan, ip6gre, lisp, patch, stt, system, tap, vxlan]
manager_options     : []
next_cfg            : 11
other_config        : {dpdk-init="true", dpdk-lcore-mask="0x7fe0", dpdk-socket-mem="8192,8192", pmd-cpu-mask="0x78000", vhost-iommu-support="true"}
ovs_version         : "3.1.2"
ssl                 : []
statistics          : {}
system_type         : rhel
system_version      : "9.3"

# ovs-vsctl show
373a141e-7c36-4e1c-9544-c0fd46279fea
    Bridge guestbridge
        datapath_type: netdev
        Port aa0dead04d444_l
            Interface aa0dead04d444_l
        Port "234ced83ef314_l"
            Interface "234ced83ef314_l"
        Port patchguest
            Interface patchguest
                type: patch
                options: {peer=patchbond}
        Port f236b39938b14_l
            Interface f236b39938b14_l
        Port guestbridge
            Interface guestbridge
                type: internal
    Bridge bondbridge
        datapath_type: netdev
        Port patchbond
            Interface patchbond
                type: patch
                options: {peer=patchguest}
        Port bondbridge
            Interface bondbridge
                type: internal
        Port active-backup
            Interface ens1f0np0
                type: dpdk
                options: {dpdk-devargs="class=eth,mac=04:3f:72:b0:35:32", n_rxq="4"}
            Interface ens1f1np1
                type: dpdk
                options: {dpdk-devargs="class=eth,mac=04:3f:72:b0:35:33", n_rxq="4"}
    ovs_version: "3.1.2"

keep flow as NORMAL
[root@hp-dl388g10-03 ovs_bond_function]# ovs-ofctl dump-flows guestbridge
 cookie=0x0, duration=1082.332s, table=0, n_packets=10966941, n_bytes=52598029890, actions=NORMAL
[root@hp-dl388g10-03 ovs_bond_function]# ovs-ofctl dump-flows bondbridge
 cookie=0x0, duration=1091.376s, table=0, n_packets=10967516, n_bytes=52598164888, actions=NORMAL


2. select g1 send TCP_STREAM.
as follow https://access.redhat.com/solutions/3964031, need disable checksum on vtap device.
# podman exec -it g1 /bin/bash
# ethtool -K eth1 tx off

# ethtool -k eth1 | grep tx
tx-checksumming: off
	tx-checksum-ipv4: off [fixed]
	tx-checksum-ip-generic: off
	tx-checksum-ipv6: off [fixed]
	tx-checksum-fcoe-crc: off [fixed]
	tx-checksum-sctp: off
	tx-scatter-gather: on
	tx-scatter-gather-fraglist: on
	tx-tcp-segmentation: off [requested on]
	tx-tcp-ecn-segmentation: off [requested on]
	tx-tcp-mangleid-segmentation: off [requested on]
	tx-tcp6-segmentation: off [requested on

# podman exec -dt g1 netperf -4 -t TCP_STREAM -H 172.150.150.1 -l 10 -- -m 9000
MIGRATED TCP STREAM TEST from 0.0.0.0 (0.0.0.0) port 0 AF_INET to 172.150.150.1 () port 0 AF_INET
Recv   Send    Send
Socket Socket  Message  Elapsed
Size   Size    Size     Time     Throughput
bytes  bytes   bytes    secs.    10^6bits/sec

131072  16384     64    10.00     759.28

3.select g1 and g2 send TCP_STREAM and UDP_STREAM traffic
Open four sessions respectively and run the following four netperf commands
podman exec -dt g1 netperf -4 -t TCP_STREAM -H 172.150.150.1 -l 120 -- -m 9000
podman exec -dt g2 netperf -4 -t TCP_STREAM -H 172.150.150.1 -l 120 -- -m 9000
podman exec -dt g2 netperf -6 -t UDP_STREAM -H 2001:db8:150:150::1 -l 120 -- -m 9000
podman exec -dt g1 netperf -6 -t UDP_STREAM -H 2001:db8:150:150::1 -l 120 -- -m 9000

wait about 10s, only ipv6 udp traffic was found
# ovs-appctl dpif/dump-flows -m guestbridge
ufid:1e657b4b-266e-4387-a0ed-482e1a9ccdc7 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::42/::,dst=2001:db8:150:150::1/::,label=0xb9971/0,proto=44/0,tclass=0/0,hlimit=64/0,frag=later), packets:185627, bytes:21903986, used:0.005s, actions:ens1f0np0
ufid:566e4a36-01e4-4c7e-b29b-6e0edc2725e5 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::42/::,dst=2001:db8:150:150::1/::,label=0xb9971/0,proto=17/0,tclass=0/0,hlimit=64/0,frag=first),udp(src=43604/0,dst=60243/0), packets:204371, bytes:1842200194, used:0.005s, actions:ens1f0np0
ufid:e2461d24-57c9-4fc0-8b15-6d3d8349a4f9 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(4b91e38439544_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:12,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::52/::,dst=2001:db8:150:150::1/::,label=0xc3ca5/0,proto=17/0,tclass=0/0,hlimit=64/0,frag=first),udp(src=38997/0,dst=43358/0), packets:165351, bytes:1490473914, used:0.006s, actions:ens1f0np0
ufid:6e49c95c-14b4-4d63-8518-2b5c75812164 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(4b91e38439544_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:12,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::52/::,dst=2001:db8:150:150::1/::,label=0xc3ca5/0,proto=44/0,tclass=0/0,hlimit=64/0,frag=later), packets:152880, bytes:18039840, used:0.006s, actions:ens1f0np0

4. use g1 & g2 send ipv4 tcp stream
podman exec -dt g1 netperf -4 -t TCP_STREAM -H 172.150.150.1 -l 120 -- -m 9000
podman exec -dt g2 netperf -4 -t TCP_STREAM -H 172.150.150.1 -l 120 -- -m 9000

# ovs-appctl dpif/dump-flows -m guestbridge
ufid:7bb7aa46-f16a-4b4b-b1ea-1e019146b549 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.42/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=6/0,tos=0/0,ttl=64/0,frag=no),tcp(src=40149/0,dst=12865/0),tcp_flags(0/0), packets:1143492, bytes:10307367152, used:0.004s, flags:SP., actions:ens1f0np0
ufid:78c5e365-ce0d-4fc0-9067-fe5d656ab7ac skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(4b91e38439544_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:12,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.52/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=6/0,tos=0/0,ttl=64/0,frag=no),tcp(src=49263/0,dst=12865/0),tcp_flags(0/0), packets:1146398, bytes:10333560704, used:0.004s, flags:SP., actions:ens1f0np0

5. use g1 & g2 send ipv4/ipv6 udp stream
nohup podman exec -it g1 bash -c 'netperf -4 -t UDP_STREAM -H 172.150.150.1 -l 120 -- -m 9000' &> /dev/null &
sleep 1
nohup podman exec -it g2 bash -c 'netperf -4 -t UDP_STREAM -H 172.150.150.1 -l 120 -- -m 9000' &> /dev/null &
sleep 1
nohup podman exec -it g2 bash -c 'netperf -6 -t UDP_STREAM -H 2001:db8:150:150::1 -l 120 -- -m 9000' &> /dev/null &
sleep 1
nohup podman exec -it g1 bash -c 'netperf -6 -t UDP_STREAM -H 2001:db8:150:150::1 -l 120 -- -m 9000' &> /dev/null &

# ovs-appctl dpif/dump-flows -m guestbridge
ufid:808d941f-ef5a-420b-9d39-f320f4275a76 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.42/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=17/0,tos=0/0,ttl=64/0,frag=first),udp(src=38103/0,dst=36140/0), packets:414868, bytes:3737960680, used:0.005s, actions:ens1f0np0
ufid:64ebcf18-2b10-4881-8f4b-00cf3356c0a4 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::42/::,dst=2001:db8:150:150::1/::,label=0xfe10/0,proto=17/0,tclass=0/0,hlimit=64/0,frag=first),udp(src=43790/0,dst=35890/0), packets:345109, bytes:3110812526, used:0.005s, actions:ens1f0np0
ufid:9c86b37d-efba-48d3-8a12-d89a2b36deb8 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(4b91e38439544_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:12,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.52/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=17/0,tos=0/0,ttl=64/0,frag=first),udp(src=52771/0,dst=33108/0), packets:721833, bytes:6503715330, used:0.005s, actions:ens1f0np0
ufid:9eaeb02d-541f-4fbd-a219-cd8f41e00d0a skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=ff:ff:ff:ff:ff:ff),eth_type(0x0806),arp(sip=172.150.150.42,tip=172.150.150.1,op=1,sha=00:de:ad:96:02:02/00:00:00:00:00:00,tha=00:00:00:00:00:00/00:00:00:00:00:00), packets:0, bytes:0, used:never, actions:guestbridge,bondbridge,ens1f0np0,4b91e38439544_l,4e2a566fc7954_l
ufid:7b734c18-b06f-44e8-90fb-49f6677c1711 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.42/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=17/0,tos=0/0,ttl=64/0,frag=later), packets:368523, bytes:24322518, used:0.005s, actions:ens1f0np0
ufid:6ebd61b5-f886-4266-9b7f-90a765a418b5 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(4b91e38439544_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:12,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.52/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=17/0,tos=0/0,ttl=64/0,frag=later), packets:664667, bytes:43868022, used:0.005s, actions:ens1f0np0
ufid:0760d7b1-37a2-48e3-98c1-ef5f8ca7e206 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::42/::,dst=2001:db8:150:150::1/::,label=0xfe10/0,proto=44/0,tclass=0/0,hlimit=64/0,frag=later), packets:314058, bytes:37058844, used:0.005s, actions:ens1f0np0

6. 5. use g1 & g2 send ipv4/ipv6 tcp stream
nohup podman exec -it g1 bash -c 'netperf -4 -t TCP_STREAM -H 172.150.150.1 -l 120 -- -m 9000' &> /dev/null &
sleep 1
nohup podman exec -it g2 bash -c 'netperf -4 -t TCP_STREAM -H 172.150.150.1 -l 120 -- -m 9000' &> /dev/null &
sleep 1
nohup podman exec -it g2 bash -c 'netperf -6 -t TCP_STREAM -H 2001:db8:150:150::1 -l 120 -- -m 9000' &> /dev/null &
sleep 1
nohup podman exec -it g1 bash -c 'netperf -6 -t TCP_STREAM -H 2001:db8:150:150::1 -l 120 -- -m 9000' &> /dev/null &

# ovs-appctl dpif/dump-flows -m guestbridge
ufid:ac4f41b4-48b6-4cb5-8286-6ccbedaf4250 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.42/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=6/0,tos=0/0,ttl=64/0,frag=no),tcp(src=35167/0,dst=12865/0),tcp_flags(0/0), packets:132088, bytes:1190570364, used:0.001s, flags:SP., actions:ens1f0np0
ufid:bd187471-0929-42b3-86eb-9239e292707f skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(4b91e38439544_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:12,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::52/::,dst=2001:db8:150:150::1/::,label=0x229b1/0,proto=6/0,tclass=0/0,hlimit=64/0,frag=no),tcp(src=35341/0,dst=12865/0),tcp_flags(0/0), packets:79169, bytes:713549750, used:0.079s, flags:SP., actions:ens1f0np0
ufid:745279b4-d031-4765-a2f0-4e7202070220 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(4b91e38439544_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:12,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.52/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=6/0,tos=0/0,ttl=64/0,frag=no),tcp(src=44681/0,dst=12865/0),tcp_flags(0/0), packets:134777, bytes:1214817958, used:0.001s, flags:SP., actions:ens1f0np0
ufid:977becc1-1a87-4009-9de9-b0cada8a72db skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::42/::,dst=2001:db8:150:150::1/::,label=0x92deb/0,proto=6/0,tclass=0/0,hlimit=64/0,frag=no),tcp(src=49201/0,dst=12865/0),tcp_flags(0/0), packets:98421, bytes:887105134, used:0.001s, flags:SP., actions:ens1f0np0

Actual results:
1. base on step3.
when start mix ipv4+tcp & ipv6+udp traffic, ipv4 + tcp_stream didn't found on ovs bridge.

Expected results:
1. the stpe3 should work as step4,5,6

Additional info:

Comment 1 mhou 2023-07-17 06:41:06 UTC
I also replace bond-port to a single port. Single dpdk port work as well.
ovs-vsctl add-port bondbridge dpdk0 -- set Interface dpdk0 type=dpdk options:dpdk-devargs=class=eth,mac=04:3f:72:b0:35:33 options:n_rxq=4 mtu_request=9000

podman exec -dt g1 netperf -4 -t TCP_STREAM -H 172.150.150.1 -l 120 -- -m 9000
podman exec -dt g2 netperf -4 -t TCP_STREAM -H 172.150.150.1 -l 120 -- -m 9000
podman exec -dt g2 netperf -6 -t UDP_STREAM -H 2001:db8:150:150::1 -l 120 -- -m 9000
podman exec -dt g1 netperf -6 -t UDP_STREAM -H 2001:db8:150:150::1 -l 120 -- -m 9000

# ovs-appctl dpif/dump-flows -m guestbridge
ufid:4313b2e4-9dfa-44ce-bd43-73377dc384ae skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(4b91e38439544_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:12,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::52/::,dst=2001:db8:150:150::1/::,label=0xa90a6/0,proto=6/0,tclass=0/0,hlimit=64/0,frag=no),tcp(src=32807/0,dst=12865/0),tcp_flags(0/0), packets:4750578, bytes:598573284, used:0.007s, flags:SFP., actions:dpdk0
ufid:9ef06e93-2683-4c18-ae46-821cf19e8701 skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.42/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=6/0,tos=0/0,ttl=64/0,frag=no),tcp(src=43955/0,dst=12865/0),tcp_flags(0/0), packets:230857, bytes:1494279530, used:0.007s, flags:SP., actions:dpdk0
ufid:6614a87c-9eee-4eea-8666-8893779fdb2d skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(4b91e38439544_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:12,dst=40:a6:b7:3e:a5:60),eth_type(0x0800),ipv4(src=172.150.150.52/0.0.0.0,dst=172.150.150.1/0.0.0.0,proto=6/0,tos=0/0,ttl=64/0,frag=no),tcp(src=41711/0,dst=12865/0),tcp_flags(0/0), packets:205653, bytes:1382835510, used:0.000s, flags:SP., actions:dpdk0
ufid:81e31505-ce8b-4416-b988-705ae899323f skb_priority(0/0),skb_mark(0/0),ct_state(0/0),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),recirc_id(0),dp_hash(0/0),in_port(0990732161cc4_l),packet_type(ns=0,id=0),eth(src=00:de:ad:96:02:02,dst=40:a6:b7:3e:a5:60),eth_type(0x86dd),ipv6(src=2001:db8:150:150::42/::,dst=2001:db8:150:150::1/::,label=0x3a458/0,proto=6/0,tclass=0/0,hlimit=64/0,frag=no),tcp(src=55633/0,dst=12865/0),tcp_flags(0/0), packets:4875316, bytes:614290312, used:0.004s, flags:FP., actions:dpdk0

Comment 2 mhou 2023-07-17 06:49:05 UTC
When use a single dpdk port to send traffic, check below log
2023-07-17T06:40:39.864Z|00357|poll_loop|INFO|Dropped 85942 log messages in last 6 seconds (most recently, 0 seconds ago) due to excessive rate
2023-07-17T06:40:39.864Z|00358|poll_loop|INFO|wakeup due to [POLLIN] on fd 80 (AF_PACKET(4b91e38439544_l)(protocol=0x3)<->) at ../lib/netdev-linux.c:1542 (99% CPU usage)
2023-07-17T06:40:45.864Z|00359|poll_loop|INFO|Dropped 85313 log messages in last 6 seconds (most recently, 0 seconds ago) due to excessive rate
2023-07-17T06:40:45.864Z|00360|poll_loop|INFO|wakeup due to [POLLIN] on fd 80 (AF_PACKET(4b91e38439544_l)(protocol=0x3)<->) at ../lib/netdev-linux.c:1542 (99% CPU usage)
2023-07-17T06:40:51.864Z|00361|poll_loop|INFO|Dropped 86126 log messages in last 6 seconds (most recently, 0 seconds ago) due to excessive rate
2023-07-17T06:40:51.864Z|00362|poll_loop|INFO|wakeup due to [POLLIN] on fd 81 (AF_PACKET(0990732161cc4_l)(protocol=0x3)<->) at ../lib/netdev-linux.c:1542 (99% CPU usage)
2023-07-17T06:40:57.864Z|00363|poll_loop|INFO|Dropped 86135 log messages in last 6 seconds (most recently, 0 seconds ago) due to excessive rate
2023-07-17T06:40:57.864Z|00364|poll_loop|INFO|wakeup due to [POLLIN] on fd 81 (AF_PACKET(0990732161cc4_l)(protocol=0x3)<->) at ../lib/netdev-linux.c:1542 (99% CPU usage)
2023-07-17T06:41:03.992Z|00365|poll_loop|INFO|Dropped 67464 log messages in last 6 seconds (most recently, 0 seconds ago) due to excessive rate
2023-07-17T06:41:03.992Z|00366|poll_loop|INFO|wakeup due to [POLLIN] on fd 23 (FIFO pipe:[159994475]) at ../vswitchd/bridge.c:421 (56% CPU usage)


Note You need to log in before you can comment on or make changes to this bug.