Bug 2232071 - [BCM57504] [rhel8]vf kernel vlan with spoofchk off and trust on, ipv6 traffic doesn't forward via testpmd
Summary: [BCM57504] [rhel8]vf kernel vlan with spoofchk off and trust on, ipv6 traffi...
Keywords:
Status: NEW
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: dpdk
Version: 8.6
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: OVS Triage
QA Contact: Jiying Qiu
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-08-15 07:25 UTC by Jiying Qiu
Modified: 2023-08-15 07:25 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Type: Bug
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Jiying Qiu 2023-08-15 07:25:14 UTC
This bug was initially created as a copy of Bug #2226979

I am copying this bug because: 
the issue also exist in rhel8.6z
4.18.0-372.70.1.el8_6.x86_64
dpdk-21.11-2.el8_6.x86_64


Description of problem:
Server create vfs ,and set vlan to vfs.set spoofchk off and trust on.  bind vfs to testpmd, send ipv6 traffic from Client, There is no packets captured in testpmd  

Version-Release number of selected component (if applicable):
5.14.0-284.18.1.el9_2.x86_64
dpdk-22.11-4.el9.x86_64

5e:00.2 Ethernet controller: Broadcom Inc. and subsidiaries BCM57504 NetXtreme-E 10Gb/25Gb/40Gb/50Gb/100Gb/200Gb Ethernet (rev 11)
5e:00.3 Ethernet controller: Broadcom Inc. and subsidiaries BCM57504 NetXtreme-E 10Gb/25Gb/40Gb/50Gb/100Gb/200Gb Ethernet (rev 11)

# ethtool -i ens2f2np2
driver: bnxt_en
version: 5.14.0-284.18.1.el9_2.x86_64
firmware-version: 225.0.144.0/pkg 225.1.95.0
expansion-rom-version: 
bus-info: 0000:5e:00.2
supports-statistics: yes
supports-test: yes
supports-eeprom-access: yes
supports-register-dump: yes
supports-priv-flags: no

How reproducible:
always

Steps to Reproduce:
Server and Client is connected back to back
Server side : 
1. create 1 vf on each PF
5f:02.0 Ethernet controller: Broadcom Inc. and subsidiaries BCM5750X NetXtreme-E Ethernet Virtual Function (rev 11)
5f:03.0 Ethernet controller: Broadcom Inc. and subsidiaries BCM5750X NetXtreme-E Ethernet Virtual Function (rev 11)

2. set vlan ,spoofchk off , trust on on vfs
#ip li set ens2f2np2 vf 0 spoofchk off
#ip li set ens2f3np3 vf 0 spoofchk off
#ip li set ens2f2np2 vf 0 trust on
#ip li set ens2f3np3 vf 0 trust on
#ip li set ens2f2np2 vf 0 vlan 2
#ip li set ens2f3np3 vf 0 vlan 2
#ip link
113: ens2f2np2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000
    link/ether 5c:6f:69:82:8f:62 brd ff:ff:ff:ff:ff:ff
    vf 0     link/ether c6:aa:3c:5e:68:dc brd ff:ff:ff:ff:ff:ff, vlan 2, spoof checking off, link-state auto, trust on
    altname enp94s0f2np2
114: ens2f3np3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000
    link/ether 5c:6f:69:82:8f:63 brd ff:ff:ff:ff:ff:ff
    vf 0     link/ether f6:4b:e7:c1:23:96 brd ff:ff:ff:ff:ff:ff, vlan 2, spoof checking off, link-state auto, trust on
    altname enp94s0f3np3



3.bind vf to vfio-pci, then start testpmd ,and set verbose 9 inside testpmd
#driverctl set-override 0000:5f:02.0 vfio-pci
#driverctl set-override 0000:5f:03.0 vfio-pci
#dpdk-testpmd -a 0000:5f:02.0 -a 0000:5f:03.0 -- -i --auto-start
testpmd> set verbose 9

Client side:
send ipv6 traffic with scapy
send_pkt_num = 10
size = 64
pkt = Ether()/Dot1Q(type=0x8100,vlan=2)/IPv6(src="3000::100",dst="3000::200")
pkt.dst = Server_nic2_mac  ## pf mac
payload = max(0, size - len(pkt)) * 'x'
pkt.add_payload(payload.encode())
log(pkt.show())
sendp(pkt,count=send_pkt_num,inter=1,iface='Client_nic1_name')

Actual results:
There is no packet captured in testpmd 

Expected results:
There should be 10 packets in testpmd, And the Client nic2 should receive 10 packets

Additional info:
send ipv4 ,testpmd can receive

beaker job:
https://beaker.engineering.redhat.com/recipes/14411208#task164541163
dpdk-sriov-vf-kernel-vlan-test-spoofchk-disabled-vf-trust-on-without-max-tx-rate-without-qos-IPV6-packets-check
dpdk-sriov-vf-kernel-vlan-test-spoofchk-disabled-vf-trust-on-with-max-tx-rate-without-qos-IPV6-packets-check
dpdk-sriov-vf-kernel-vlan-test-spoofchk-disabled-vf-trust-on-without-max-tx-rate-with-qos-IPV6-packets-check
dpdk-sriov-vf-kernel-vlan-test-spoofchk-disabled-vf-trust-on-with-max-tx-rate-with-qos-IPV6-packets-check


Note You need to log in before you can comment on or make changes to this bug.