Uploaded image for project: 'Fast Datapath Product'
  1. Fast Datapath Product
  2. FDP-1039

[ARM] other_config:forward-bpdu not working with mcast address '01:80:c2:00:00:01'

    • Icon: Epic Epic
    • Resolution: Cannot Reproduce
    • Icon: Normal Normal
    • None
    • None
    • ovs-dpdk
    • [ARM] other_config:forward-bpdu not working with mcast address '01:80:c2:00:00:01'
    • False
    • False
    • Hide

      Please mark each item below with ( / ) if completed or ( x ) if incomplete:

      ( ) The acceptance criteria defined below are met.

      Given an ARM system with other_config:forward-bpdu=true enabled on a bridge,

      When packets are sent with the destination MAC address 01:80:c2:00:00:01,

      Then those packets should be forwarded as expected and visible in the packet capture logs on the receiving system.


      ( ) The epics work is available in a downstream build (nightly/Async or other)


      ( ) All cards under the epic have been moved to Done

      Show
      Please mark each item below with ( / ) if completed or ( x ) if incomplete: ( ) The acceptance criteria defined below are met. Given an ARM system with other_config:forward-bpdu=true enabled on a bridge, When packets are sent with the destination MAC address 01:80:c2:00:00:01, Then those packets should be forwarded as expected and visible in the packet capture logs on the receiving system. ( ) The epics work is available in a downstream build (nightly/Async or other) ( ) All cards under the epic have been moved to Done
    • rhel-9
    • rhel-net-ovs-dpdk
    • 100% To Do, 0% In Progress, 0% Done
    • ssg_networking

      This epic tracks all the effort needed to deliver the solution related to the bug described below.
      Steps to reproduce:

      DUT (ARM system):

      Peer system directly connected to DUT:

      • dnf -y install wireshark-cli
      • dnf -y install scapy

      Capture packets on receiving interface of peer system:

      • tshark -a duration:100 -nV -i enp130s0f1np1 -f 'ether host 01:80:c2:00:00:01' -c1 -T fields -e eth.dst | tee ~/tshark.log &
      • /usr/libexec/platform-python -c 'from scapy.all import *; sendp(Ether(dst='\''01:80:c2:00:00:01'\'')/IP()/ICMP(), iface='\''enp130s0f0np0'\'')'

      kill tshark

      • pkill tshark

      check results of packet capture:

      • cat ~/tshark.log --> should contain 01:80:c2:00:00:01 but does not

      Notes:

              ovsdpdk-bot ovsdpdk bot
              ralongi@redhat.com Rick Alongi
              Rick Alongi
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated:
                Resolved: