Sorry, I messed up the mail body, just resend it again.
OVS generates a dp flow to drop the loopback packet by defaut,shown as below, recirc_id(0),in_port(3),eth(src=b0:00:b4:67:17:9b,dst=b0:00:b4:67:17:9b),eth_type(0x9000), packets:5, bytes:300, used:0.476s, actions:drop port(3) is the port which connected by the physical nic. Is it possible that the loopback packet can be out from ovs switch, i.e., out from port(3) in this case? We also deployed about 500 kvm host with ovs vlan network, this problem happpened too. ovs overview in one of the hosts shown as below, $ ovs-vsctl show 248fd0b2-6c73-4a5a-b5c6-ec4af56fe569 Bridge br-int fail_mode: secure Port "tapa74a924e-e5" tag: 1 Interface "tapa74a924e-e5" Port br-int Interface br-int type: internal Port "tapfe684b50-b0" tag: 1 Interface "tapfe684b50-b0" Port "int-br100" Interface "int-br100" type: patch options: {peer="phy-br100"} Port "tap8d7dcd11-86" tag: 1 Interface "tap8d7dcd11-86" Port "tapaac394c0-ae" tag: 1 Interface "tapaac394c0-ae" Bridge "br100" Port "enp2s0" Interface "enp2s0" Port "br100" Interface "br100" type: internal Port "phy-br100" Interface "phy-br100" type: patch options: {peer="int-br100"} ovs_version: "2.4.0" Now, I plan to do below jobs to debug this problem, 1) tcpdump on enp2s0 to capture the loopback packet, tcpdump command tcpdump -i enp2s0 -e -nn "not ip and not arp" -w /home/enp2s0.pcap 2) set port mirror for select_src_port of port enp2s0 in br100, and veth0 connecting to the mirror port, then tcpdump on veth0, tcpdump command tcpdump -i veth0 -e -nn "not ip and not arp" -w /home/veth0.pcap 3) set port mirror for select_dst_port of port enp2s0 in br100, and veth1 connecting to the mirror port, then tcpdump on veth0, tcpdump command tcpdump -i veth0 -e -nn "not ip and not arp" -w /home/veth1.pcap When the physical switch port was set to err-disabled, means that it received the loopback packet returned from host, then checking enp2s0.pcap, veth0.pcap, veth1.pcap. If the loopback packet found in veth1.pcap and veth0.pcap, we can conclude that this problem is caused by ovs, if the loopback packet not found in veth1.pcap, but found in enp2s0.pcap, we can conclude that this problem is caused by physical nic or nic driver, even kernel. Am I right? I also encounter the same problem as Liang Dong did. http://thread.gmane.org/gmane.linux.network.openvswitch.general/11704 Then I can give you the same response. It's really hard to debug problems that are intermittent and require specific hardware. If you can eliminate one of those parts of the problem, then it's easier to deal with. To attack the intermittent part, perhaps you could make the Cisco switch send these keepalive messages much more frequently. To attack the specific hardware part, maybe you could reproduce this by sending similar keepalive messages in software and demonstrate that sometimes OVS sends them back. _______________________________________________ dev mailing list dev@openvswitch.org http://openvswitch.org/mailman/listinfo/dev