From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx0b-000f0801.pphosted.com (mx0b-000f0801.pphosted.com [67.231.152.113]) by dpdk.org (Postfix) with ESMTP id 1D34F5683 for ; Thu, 26 Nov 2015 23:27:42 +0100 (CET) Received: from pps.filterd (m0048192.ppops.net [127.0.0.1]) by mx0b-000f0801.pphosted.com (8.15.0.59/8.15.0.59) with SMTP id tAQMMVTl020878 for ; Thu, 26 Nov 2015 14:27:41 -0800 Received: from brmwp-exmb12.corp.brocade.com ([208.47.132.227]) by mx0b-000f0801.pphosted.com with ESMTP id 1ye54a8k0k-1 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT) for ; Thu, 26 Nov 2015 14:27:40 -0800 Received: from EMEAWP-EXMB12.corp.brocade.com (172.29.11.86) by BRMWP-EXMB12.corp.brocade.com (172.16.59.130) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 26 Nov 2015 15:27:23 -0700 Received: from [10.252.59.10] (10.252.59.10) by EMEAWP-EXMB12.corp.brocade.com (172.29.11.86) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 26 Nov 2015 23:27:20 +0100 To: From: Tom Kiely Message-ID: <56578742.7040205@brocade.com> Date: Thu, 26 Nov 2015 22:27:14 +0000 User-Agent: Mozilla/5.0 (X11; Linux i686 on x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [10.252.59.10] X-ClientProxiedBy: hq1wp-excas13.corp.brocade.com (10.70.36.103) To EMEAWP-EXMB12.corp.brocade.com (172.29.11.86) X-Proofpoint-SPF-Result: neutral X-Proofpoint-SPF-Record: v=spf1 include:spf-000f0801.pphosted.com include:salesforce.com include:Spf.protection.outlook.com include:mktomail.com include:bmsend.com ip4:208.74.204.0/22 ip4:46.19.168.0/23 mx ?all X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.15.21, 1.0.33, 0.0.0000 definitions=2015-11-26_14:2015-11-25,2015-11-26,1970-01-01 signatures=0 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 suspectscore=1 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=7.0.1-1508030000 definitions=main-1511260397 Subject: [dpdk-dev] Problems with SR-IOV and transparent vlan under DPDK X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches and discussions about DPDK List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 26 Nov 2015 22:27:42 -0000 Hi, I wonder if anyone might have advice in relation to a major problem we're encountering. We have an SR-IOV setup on Debian 8 with 4 VFs. Each VF is configured with transparent vlan 1000. We have 4 VMs via KVM. 2xCentos (C1, C2) and 2xDebian8 (VR1, VR2) with DPDK based dataplane. C1 can ping correctly to C2. However, when C1 pings VR2, it fails because the received packets on VR2 are tagged with the "transparent" vlan 1000. VR2 is not configured for vlans and discards the packets. All VMs are configured identically from the KVM perspective. SR-IOV VFs are attached using: "virsh attach-device " where xmlfile is of the form:
"ip link show" shows the various VFs with the associated vlans. $ ip link | grep vlan vf 0 MAC 52:54:00:68:cf:67, vlan 1000, spoof checking off, link-state auto vf 1 MAC 52:54:00:33:22:1a, vlan 1000, spoof checking off, link-state auto vf 2 MAC ba:10:05:10:00:03, vlan 1000, spoof checking off, link-state auto vf 3 MAC ba:10:05:10:00:04, vlan 1000, spoof checking off, link-state auto vf 0 MAC 52:54:00:fe:e0:6e, vlan 1000, spoof checking off, link-state auto vf 1 MAC 52:54:00:9c:f8:96, vlan 1000, spoof checking off, link-state auto vf 2 MAC ba:10:05:10:01:03, vlan 1000, spoof checking off, link-state auto vf 3 MAC ba:10:05:10:01:04, vlan 1000, spoof checking off, link-state auto Wireshark on the Centos VMs show the correct packets being received but show the packets with the incorrect vlan header on the DPDK based VR1/2. So my question is: How should DPDK deal with the transparent vlan handling ? Where should it be notifying the hardware to apply and strip the transparent vlan tags on traffic from and to the VMs ? Any insights gratefuly received. Thanks, Tom