Hi All, I have created a bridge domain with three interface. host-interface, and two physical interface (sriov VF). vpp# sh bridge-domain 20 detail BD-ID Index BSN Age(min) Learning U-Forwrd UU-Flood Flooding ARP-Term arp-ufwd BVI-Intf 20 1 0 off on on flood on off off N/A
Interface If-idx ISN SHG BVI TxFlood VLAN-Tag-Rewrite eth1 2 2 0 - * none eth0 1 3 0 - * none host-net1 3 1 0 - * none Two network traffic is coming from application POD to host-inteface (10.42.x.x ) and 10.32.x.x. The 10.32.x.x trafiic works well which passes through eth0. But for 10.42.x.x traffic also passing through eth0-output. so ping is not working for 10.42.x.x network. vpp# sh trace Limiting display to 50 packets. To display more specify max. ------------------- Start of thread 0 vpp_main ------------------- Packet 1 02:09:36:193834: af-packet-input af_packet: hw_if_index 3 next-index 4 tpacket2_hdr: status 0x20000009 len 55 snaplen 55 mac 66 net 80 sec 0x64172af6 nsec 0x47a18f6 vlan 0 vlan_tpid 0 02:09:36:193837: ethernet-input IP4: 2e:5d:06:ef:df:f0 -> 6e:a7:f1:e0:39:bc 02:09:36:193838: l2-input l2-input: sw_if_index 3 dst 6e:a7:f1:e0:39:bc src 2e:5d:06:ef:df:f0 02:09:36:193840: l2-learn l2-learn: sw_if_index 3 dst 6e:a7:f1:e0:39:bc src 2e:5d:06:ef:df:f0 bd_index 1 02:09:36:193842: l2-fwd l2-fwd: sw_if_index 3 dst 6e:a7:f1:e0:39:bc src 2e:5d:06:ef:df:f0 bd_index 1 result [0x36a0000000001, 1] none 02:09:36:193844: l2-output l2-output: sw_if_index 1 dst 6e:a7:f1:e0:39:bc src 2e:5d:06:ef:df:f0 data 08 00 45 00 00 29 0c 0c 40 00 40 11 02:09:36:193844: eth0-output eth0 IP4: 2e:5d:06:ef:df:f0 -> 6e:a7:f1:e0:39:bc UDP: 10.22.119.38 -> 10.32.31.4 tos 0x00, ttl 64, length 41, checksum 0x8458 dscp CS0 ecn NON_ECN fragment id 0x0c0c, flags DONT_FRAGMENT UDP: 12001 -> 2900 length 21, checksum 0x0000 02:09:36:193846: eth0-tx eth0 tx queue 0 buffer 0xfd7be6: current data 0, length 55, buffer-pool 0, ref-count 1, totlen-nifb 0, trace handle 0x0 ip4 offload-udp-cksum l2-hdr-offset 0 l3-hdr-offset 14 PKT MBUF: port 65535, nb_segs 1, pkt_len 55 buf_len 2176, data_len 55, ol_flags 0xb0000000000000, data_off 128, phys_addr 0x3f5efa00 packet_type 0x0 l2_len 14 l3_len 20 outer_l2_len 0 outer_l3_len 0 rss 0x0 fdir.hi 0x0 fdir.lo 0x0 Packet Offload Flags PKT_TX_TCP_CKSUM (0x0000) TCP cksum of TX pkt. computed by NIC PKT_TX_SCTP_CKSUM (0x0000) SCTP cksum of TX pkt. computed by NIC IP4: 2e:5d:06:ef:df:f0 -> 6e:a7:f1:e0:39:bc UDP: 10.22.119.38 -> 10.32.31.4 tos 0x00, ttl 64, length 41, checksum 0x8458 dscp CS0 ecn NON_ECN fragment id 0x0c0c, flags DONT_FRAGMENT UDP: 12001 -> 2900 length 21, checksum 0xaa86 Packet 2 02:09:39:234444: af-packet-input af_packet: hw_if_index 3 next-index 4 tpacket2_hdr: status 0x20000009 len 55 snaplen 55 mac 66 net 80 sec 0x64172af9 nsec 0x6e5780a vlan 0 vlan_tpid 0 02:09:39:234446: ethernet-input IP4: 2e:5d:06:ef:df:f0 -> 6e:a7:f1:e0:39:bc 02:09:39:234447: l2-input l2-input: sw_if_index 3 dst 6e:a7:f1:e0:39:bc src 2e:5d:06:ef:df:f0 02:09:39:234448: l2-learn l2-learn: sw_if_index 3 dst 6e:a7:f1:e0:39:bc src 2e:5d:06:ef:df:f0 bd_index 1 02:09:39:234448: l2-fwd l2-fwd: sw_if_index 3 dst 6e:a7:f1:e0:39:bc src 2e:5d:06:ef:df:f0 bd_index 1 result [0x36a0000000001, 1] none 02:09:39:234450: l2-output l2-output: sw_if_index 1 dst 6e:a7:f1:e0:39:bc src 2e:5d:06:ef:df:f0 data 08 00 45 00 00 29 0d 47 40 00 40 11 02:09:39:234450: eth0-output eth0 IP4: 2e:5d:06:ef:df:f0 -> 6e:a7:f1:e0:39:bc UDP: 10.22.119.38 -> 10.32.31.4 tos 0x00, ttl 64, length 41, checksum 0x831d dscp CS0 ecn NON_ECN fragment id 0x0d47, flags DONT_FRAGMENT UDP: 12001 -> 2900 length 21, checksum 0x0000 02:09:39:234451: eth0-tx eth0 tx queue 0 buffer 0xff638d: current data 0, length 55, buffer-pool 0, ref-count 1, totlen-nifb 0, trace handle 0x1 ip4 offload-udp-cksum l2-hdr-offset 0 l3-hdr-offset 14 PKT MBUF: port 65535, nb_segs 1, pkt_len 55 buf_len 2176, data_len 55, ol_flags 0xb0000000000000, data_off 128, phys_addr 0x3fd8e3c0 packet_type 0x0 l2_len 14 l3_len 20 outer_l2_len 0 outer_l3_len 0 rss 0x0 fdir.hi 0x0 fdir.lo 0x0 Packet Offload Flags PKT_TX_TCP_CKSUM (0x0000) TCP cksum of TX pkt. computed by NIC PKT_TX_SCTP_CKSUM (0x0000) SCTP cksum of TX pkt. computed by NIC IP4: 2e:5d:06:ef:df:f0 -> 6e:a7:f1:e0:39:bc UDP: 10.22.119.38 -> 10.32.31.4 tos 0x00, ttl 64, length 41, checksum 0x831d dscp CS0 ecn NON_ECN fragment id 0x0d47, flags DONT_FRAGMENT UDP: 12001 -> 2900 length 21, checksum 0xaa86 When eth0 interface shutdown then ping for 10.42.x.x works fine. Can you pl explain why 10.42.x.x traffic only tx through eth0 only/ Thanks, Praveen
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#22723): https://lists.fd.io/g/vpp-dev/message/22723 Mute This Topic: https://lists.fd.io/mt/97717286/21656 Mute #vpp:https://lists.fd.io/g/vpp-dev/mutehashtag/vpp Group Owner: vpp-dev+ow...@lists.fd.io Unsubscribe: https://lists.fd.io/g/vpp-dev/leave/1480452/21656/631435203/xyzzy [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-