I have configured vlan-limit to 0, but the packets still are not delivered to mitapVm72. Here is the track information:
[root@localhost ~]# ovs-vsctl set o . other_config:vlan-limit=0 [root@localhost ~]# [root@localhost ~]# ovs-appctl ofproto/trace vds1-br in_port=tapVm72 52540067d5615254009abfed8100006408004500005458ad4000400151f502024602020246010800dde3067a0078e030e9650000000088c0020000000000101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334353637 Flow: icmp,in_port=6,dl_vlan=100,dl_vlan_pcp=0,vlan_tci1=0x0000,dl_src=52:54:00:9a:bf:ed,dl_dst=52:54:00:67:d5:61,nw_src=2.2.70.2,nw_dst=2.2.70.1,nw_tos=0,nw_ecn=0,nw_ttl=64,nw_frag=no,icmp_type=8,icmp_code=0 bridge("vds1-br") ----------------- 0. in_port=6, priority 32768 >>>> dropping VLAN 100 tagged packet received on port tapVm72 configured as VLAN 0 access port <<<< output:3 >>>> dropping VLAN 100 tagged packet received on port tapVm71 configured as VLAN 0 access port <<<< Final flow: unchanged Megaflow: recirc_id=0,eth,ip,in_port=6,nw_frag=no Datapath actions: 6 Packets are mirrored in this function. input_vid_is_valid() checked failed when a packet with vlan ingress on tapVm72 , because tapVm72 is an access port. mirror_packet(struct xlate_ctx *ctx, struct xbundle *xbundle, mirror_mask_t mirrors) { struct xvlan in_xvlan; struct xvlan xvlan; /* Figure out what VLAN the packet is in (because mirrors can select * packets on basis of VLAN). */ xvlan_extract(&ctx->xin->flow, &in_xvlan); if (!input_vid_is_valid(ctx, in_xvlan.v[0].vid, xbundle)) { return; } -----邮件原件----- 发件人: Ilya Maximets [mailto:i.maxim...@ovn.org] 发送时间: 2024年3月6日 19:43 收件人: zhangweiwei (RD) <zhang.wei...@h3c.com>; ovs-discuss@openvswitch.org 抄送: i.maxim...@ovn.org 主题: Re: [ovs-discuss] Mirror: ovs-tcpdump cannot capture vlan packets on the port with tag On 3/6/24 08:54, Zhangweiwei via discuss wrote: > Hi, > > I set tag 0 on port tapVm72and tapVm71, and then send ping packets > with vlan > 100 from tapVm72to tapVm71. But ovs-tcpdump cannot capture any packets > with vlan on tapVm72. It seems that vlan check is failed in > mirror_packet(), because > tapVm72 is an access port and the vlan packets are dropped. This is > not reasonable because OVS does not use NORMAL forward. When using > custom OpenFlow tables, mirror action should not consider tag configuration. I don't think that is related to tapVm72 being an access port. Could you, please, run ovs-appctl ofproto/trace on a packet arriving from tapVm72 ? Note that since mitapVm72 is not in vlan 0, mirrored traffic will have both vlan tags pushed to the packet. For this to work the vlan-limit configuration should be 2 or 0 (unlimited). Default value is 1 and that may be one reason why packets are not delivered to mitapVm72. ofproto/trace should be able to confirm if that is the case. Best regards, Ilya Maximets. > > 1、ovs version: 3.2.1 > 2、Bridge > [root@localhost openvswitch-3.2.1]# ovs-vsctl show > Bridge vds1-br > Controller "tcp:172.20.66.228:6633" > is_connected: true > Controller "tcp:172.20.66.229:6633" > is_connected: true > fail_mode: secure > datapath_type: netdev > Port vxlan_vds1-br > Interface vxlan_vds1-br > type: vxlan > options: {key=flow, local_ip="3.3.3.70", > remote_ip=flow, tos=inherit} > Port tapVm72 > tag: 0 > Interface tapVm72 > type: dpdkvhostuserclient > options: > {vhost-server-path="/var/run/openvswitch/tapVm72"} > Port mitapVm72 > Interface mitapVm72 > Port tapVm71 > tag: 0 > Interface tapVm71 > type: dpdkvhostuserclient > options: > {vhost-server-path="/var/run/openvswitch/tapVm71"} > Port vds1-br > Interface vds1-br > type: internal > ovs_version: "3.2.1" > > 3、dpcls: > > [[root@localhost openvswitch-3.2.1]# ovs-appctl dpctl/dump-flows -m | > grep tap > > ufid:21fadb70-e3c1-4a2c-a0db-a042daa051c4, > recirc_id(0),dp_hash(0/0),skb_priority(0/0),in_port(tapVm71),skb_mark( > 0/0),ct_state(0/0x30),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),packet_t > ype(ns=0,id=0),eth(src=52:54:00:67:d5:61,dst=52:54:00:9a:bf:ed),eth_ty > pe(0x8100),vlan(vid=100,pcp=0/0x0),encap(eth_type(0x0800),ipv4(src=2.2 > .70.1,dst=2.2.70.2/255.255.192.0,proto=1,tos=0/0,ttl=64/0,frag=no),icm > p(type=0/0,code=0/0)), packets:4388, bytes:447576, used:0.420s, > dp:ovs, actions:tapVm72, dp-extra-info:miniflow_bits(5,2) > > ufid:83a55534-3c62-4415-9aa7-bd8486675c68, > recirc_id(0),dp_hash(0/0),skb_priority(0/0),in_port(tapVm72),skb_mark( > 0/0),ct_state(0/0x30),ct_zone(0/0),ct_mark(0/0),ct_label(0/0),packet_t > ype(ns=0,id=0),eth(src=52:54:00:9a:bf:ed,dst=52:54:00:67:d5:61),eth_ty > pe(0x8100),vlan(vid=100,pcp=0/0x0),encap(eth_type(0x0800),ipv4(src=2.2 > .70.2,dst=2.2.70.1/255.255.192.0,proto=1,tos=0/0,ttl=64/0,frag=no),icm > p(type=8/0,code=0/0)), packets:4388, bytes:447576, used:0.420s, > dp:ovs, actions:tapVm71, dp-extra-info:miniflow_bits(5,2) ------------------------------------------------------------------------------------------------------------------------------------- 本邮件及其附件含有新华三集团的保密信息,仅限于发送给上面地址中列出 的个人或群组。禁止任何其他人以任何形式使用(包括但不限于全部或部分地泄露、复制、 或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话或邮件通知发件人并删除本 邮件! This e-mail and its attachments contain confidential information from New H3C, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it! _______________________________________________ discuss mailing list disc...@openvswitch.org https://mail.openvswitch.org/mailman/listinfo/ovs-discuss