Hi Abhishek,
    Can you please send the tcpdump output on both interfaces for pings with 
the same sequence number (so we can easily compare the packets to see what 
changed).

Raja

From: abhishek jain <[email protected]<mailto:[email protected]>>
Date: Thursday, October 1, 2015 at 12:12 AM
To: Rajagopalan Sivaramakrishnan <[email protected]<mailto:[email protected]>>
Cc: "[email protected]<mailto:[email protected]>" 
<[email protected]<mailto:[email protected]>>, 
"[email protected]<mailto:[email protected]>" 
<[email protected]<mailto:[email protected]>>
Subject: Re: [opencontrail-dev] Checksum offload error with 
contrail-vrouter-agent running on compute node

Hi Raja

Please ignore the previous mail.


Please find the below tcpdump -x output at vhost0 interface when ping is 
running along with contrail-vrouter-agent..

192.168.1.11 is the compute node IP.
192.168.1.1 is the Ip of other laptop.


tcpdump -x -i vhost0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on vhost0, link-type EN10MB (Ethernet), capture size 65535 bytes
02:08:37.760912 IP6 fe80::7a45:c4ff:febd:a669.mdns > ff02::fb.mdns: 0 PTR (QM)? 
80.220.84.203.in-addr.arpa. (44)
        0x0000:  6000 0000 0034 11ff fe80 0000 0000 0000
        0x0010:  7a45 c4ff febd a669 ff02 0000 0000 0000
        0x0020:  0000 0000 0000 00fb 14e9 14e9 0034 df72
        0x0030:  0000 0000 0001 0000 0000 0000 0238 3003
        0x0040:  3232 3002 3834 0332 3033 0769 6e2d 6164
        0x0050:  6472 0461 7270 6100 000c 0001
02:08:37.760941 IP 192.168.1.1.mdns > 224.0.0.251.mdns: 0 PTR (QM)? 
80.220.84.203.in-addr.arpa. (44)
        0x0000:  4500 0048 a5b1 4000 fe11 334f c0a8 0101
        0x0010:  e000 00fb 14e9 14e9 0034 1fb9 0000 0000
        0x0020:  0001 0000 0000 0000 0238 3003 3232 3002
        0x0030:  3834 0332 3033 0769 6e2d 6164 6472 0461
        0x0040:  7270 6100 000c 0001
02:08:37.895217 IP 192.168.1.11 > 192.168.1.1<http://192.168.1.1>: ICMP echo 
request, id 8221, seq 281, length 64
        0x0000:  4500 0054 4bdf 4000 4001 6b6d c0a8 010b
        0x0010:  c0a8 0101 0800 10ea 201d 0119 560c dbf5
        0x0020:  000d a8cd 0809 0a0b 0c0d 0e0f 1011 1213
        0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
        0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
        0x0050:  3435 3637
02:08:38.761697 IP6 fe80::7a45:c4ff:febd:a669.mdns > ff02::fb.mdns: 0 PTR (QM)? 
80.220.84.203.in-addr.arpa. (44)
        0x0000:  6000 0000 0034 11ff fe80 0000 0000 0000
        0x0010:  7a45 c4ff febd a669 ff02 0000 0000 0000
        0x0020:  0000 0000 0000 00fb 14e9 14e9 0034 df72
        0x0030:  0000 0000 0001 0000 0000 0000 0238 3003
        0x0040:  3232 3002 3834 0332 3033 0769 6e2d 6164
        0x0050:  6472 0461 7270 6100 000c 0001
02:08:38.761758 IP 192.168.1.1.mdns > 224.0.0.251.mdns: 0 PTR (QM)? 
80.220.84.203.in-addr.arpa. (44)
        0x0000:  4500 0048 a5b3 4000 fe11 334d c0a8 0101
        0x0010:  e000 00fb 14e9 14e9 0034 1fb9 0000 0000
        0x0020:  0001 0000 0000 0000 0238 3003 3232 3002
        0x0030:  3834 0332 3033 0769 6e2d 6164 6472 0461
        0x0040:  7270 6100 000c 0001
02:08:38.895254 IP 192.168.1.11 > 192.168.1.1<http://192.168.1.1>: ICMP echo 
request, id 8221, seq 282, length 64
        0x0000:  4500 0054 4c5f 4000 4001 6aed c0a8 010b
        0x0010:  c0a8 0101 0800 10ca 201d 011a 560c dbf6
        0x0020:  000d a8eb 0809 0a0b 0c0d 0e0f 1011 1213
        0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
        0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
        0x0050:  3435 3637
02:08:39.903241 IP 192.168.1.11 > 192.168.1.1<http://192.168.1.1>: ICMP echo 
request, id 8221, seq 283, length 64
        0x0000:  4500 0054 4d18 4000 4001 6a34 c0a8 010b
        0x0010:  c0a8 0101 0800 f183 201d 011b 560c dbf7
        0x0020:  000d c82f 0809 0a0b 0c0d 0e0f 1011 1213
        0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
        0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
        0x0050:  3435 3637

Please find the below tcpdump -x output at eth0 interface when ping is running 
along with contrail-vrouter-agent..


 tcpdump -x  -i eth0


tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth13, link-type EN10MB (Ethernet), capture size 65535 bytes
02:07:07.721545 IP 192.168.1.1.mdns > 224.0.0.251.mdns: 0 PTR (QM)? 
31.31.223.173.in-addr.arpa. (44)
        0x0000:  4500 0048 a545 4000 ff11 33ba c0a8 0101
        0x0010:  e000 00fb 14e9 14e9 0034 4992 0000 0000
        0x0020:  0001 0000 0000 0000 0233 3102 3331 0332
        0x0030:  3233 0331 3733 0769 6e2d 6164 6472 0461
        0x0040:  7270 6100 000c 0001
02:07:07.721551 IP6 fe80::7a45:c4ff:febd:a669.mdns > ff02::fb.mdns: 0 PTR (QM)? 
31.31.223.173.in-addr.arpa. (44)
        0x0000:  6000 0000 0034 11ff fe80 0000 0000 0000
        0x0010:  7a45 c4ff febd a669 ff02 0000 0000 0000
        0x0020:  0000 0000 0000 00fb 14e9 14e9 0034 094c
        0x0030:  0000 0000 0001 0000 0000 0000 0233 3102
        0x0040:  3331 0332 3233 0331 3733 0769 6e2d 6164
        0x0050:  6472 0461 7270 6100 000c 0001
02:07:07.926782 ARP, Request who-has 192.168.5.1 tell 192.168.6.67, length 28
        0x0000:  0001 0800 0604 0001 0011 2233 4455 c0a8
        0x0010:  0643 0000 0000 0000 c0a8 0501
02:07:08.191225 IP 192.168.1.11 > 192.168.1.1<http://192.168.1.1>: ICMP echo 
request, id 8221, seq 192, length 64
        0x0000:  4500 0054 1d79 4000 3f01 99d4 c0a8 010b
        0x0010:  c0a8 0101 0800 cf8d 201d 00c0 560c db9c
        0x0020:  0002 eae6 0809 0a0b 0c0d 0e0f 1011 1213
        0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
        0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
        0x0050:  3435 3637
02:07:08.723312 IP6 fe80::7a45:c4ff:febd:a669.mdns > ff02::fb.mdns: 0 PTR (QM)? 
31.31.223.173.in-addr.arpa. (44)
        0x0000:  6000 0000 0034 11ff fe80 0000 0000 0000
        0x0010:  7a45 c4ff febd a669 ff02 0000 0000 0000
        0x0020:  0000 0000 0000 00fb 14e9 14e9 0034 094c
        0x0030:  0000 0000 0001 0000 0000 0000 0233 3102
        0x0040:  3331 0332 3233 0331 3733 0769 6e2d 6164
        0x0050:  6472 0461 7270 6100 000c 0001
02:07:08.723382 IP 192.168.1.1.mdns > 224.0.0.251.mdns: 0 PTR (QM)? 
31.31.223.173.in-addr.arpa. (44)
        0x0000:  4500 0048 a547 4000 ff11 33b8 c0a8 0101
        0x0010:  e000 00fb 14e9 14e9 0034 4992 0000 0000
        0x0020:  0001 0000 0000 0000 0233 3102 3331 0332
        0x0030:  3233 0331 3733 0769 6e2d 6164 6472 0461
        0x0040:  7270 6100 000c 0001
02:07:09.192544 IP 192.168.1.11 > 192.168.1.1<http://192.168.1.1>: ICMP echo 
request, id 8221, seq 193, length 64
        0x0000:  4500 0054 1e59 4000 3f01 98f4 c0a8 010b
        0x0010:  c0a8 0101 0800 ca65 201d 00c1 560c db9d
        0x0020:  0002 f00c 0809 0a0b 0c0d 0e0f 1011 1213
        0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
        0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
        0x0050:  3435 3637
02:07:09.927066 ARP, Request who-has 192.168.5.1 tell 192.168.6.67, length 28
        0x0000:  0001 0800 0604 0001 0011 2233 4455 c0a8
        0x0010:  0643 0000 0000 0000 c0a8 0501
02:07:10.199232 IP 192.168.1.11 > 192.168.1.1<http://192.168.1.1>: ICMP echo 
request, id 8221, seq 194, length 64
        0x0000:  4500 0054 1ea1 4000 3f01 98ac c0a8 010b
        0x0010:  c0a8 0101 0800 b065 201d 00c2 560c db9e
        0x0020:  0003 0a0a 0809 0a0b 0c0d 0e0f 1011 1213
        0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
        0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
        0x0050:  3435 3637
02:07:10.723896 IP6 fe80::7a45:c4ff:febd:a669.mdns > ff02::fb.mdns: 0 PTR (QM)? 
31.31.223.173.in-addr.arpa. (44)
        0x0000:  6000 0000 0034 11ff fe80 0000 0000 0000
        0x0010:  7a45 c4ff febd a669 ff02 0000 0000 0000
        0x0020:  0000 0000 0000 00fb 14e9 14e9 0034 094c
        0x0030:  0000 0000 0001 0000 0000 0000 0233 3102
        0x0040:  3331 0332 3233 0331 3733 0769 6e2d 6164
        0x0050:  6472 0461 7270 6100 000c 0001


On Thu, Oct 1, 2015 at 11:28 AM, abhishek jain 
<[email protected]<mailto:[email protected]>> wrote:
Hi Raja

Please find the below tcpdump -x output at vhost0 interface when ping is 
running..

192.168.1.11 is the compute node IP.
192.168.1.1 is the Ip of other laptop.

tcpdump -x -i vhost0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on vhost0, link-type EN10MB (Ethernet), capture size 65535 bytes
00:53:30.463444 IP 192.168.1.11.ssh > 192.168.1.1.47959: Flags [P.], seq 
855860805:855860917, ack 2569895894, win 329, options [nop,nop,TS val 17203641 
ecr 1258224], length 112
    0x0000:  4510 00a4 229d 4000 4006 944a c0a8 010b
    0x0010:  c0a8 0101 0016 bb57 3303 6645 992d 7fd6
    0x0020:  8018 0149 ca34 0000 0101 080a 0106 81b9
    0x0030:  0013 32f0 5072 a094 5c53 1c72 c246 bc3b
    0x0040:  9687 3d3a beac e02d f90d 0c1e e776 f898
    0x0050:  cb23 9892 9e86 fa96 7ef5 811a 9676 9b8a
    0x0060:  7bf5 b90d 3b9f 096d 63bc 9d8a 7254 ef9b
    0x0070:  d157 cb03 acea 54a2 864d 6766 83bb b9ed
    0x0080:  fabb 42aa 35c8 d7e9 8df5 d968 81ba 3fa7
    0x0090:  346e 4b0d 7d49 0050 3a9d 5b28 44bc fa2e
    0x00a0:  0eb3 9a03
00:53:30.463525 IP 192.168.1.11.ssh > 192.168.1.1.47959: Flags [P.], seq 
112:224, ack 1, win 329, options [nop,nop,TS val 17203641 ecr 1258224], length 
112
    0x0000:  4510 00a4 229e 4000 4006 9449 c0a8 010b
    0x0010:  c0a8 0101 0016 bb57 3303 66b5 992d 7fd6
    0x0020:  8018 0149 1f6b 0000 0101 080a 0106 81b9
    0x0030:  0013 32f0 ac93 ac9b da0b 6d93 877e 96d9
    0x0040:  0e52 6af3 a59b 4e1f 97f3 9dc3 b559 6ef7
    0x0050:  a6af f40c f497 57f7 980e 80db cef8 7a43
    0x0060:  38ae b81e 09fa 1fc1 8125 dc4d 2b46 076d
    0x0070:  47e9 705b c985 1fa9 1250 b43b 8ca1 7ecf
    0x0080:  1bf8 1d9e 8ad4 8e49 ebaa 4b25 6551 9c11
    0x0090:  56b8 0ea4 a9ba 4843 7b22 39ec 9e2c 92e6
    0x00a0:  bdd8 3a4a
00:53:30.463704 IP 192.168.1.1.47959 > 192.168.1.11.ssh: Flags [.], ack 112, 
win 184, options [nop,nop,TS val 1258239 ecr 17203641], length 0
    0x0000:  4500 0034 778e 4000 4006 3fd9 c0a8 0101
    0x0010:  c0a8 010b bb57 0016 992d 7fd6 3303 66b5
    0x0020:  8010 00b8 ceac 0000 0101 080a 0013 32ff
    0x0030:  0106 81b9
00:53:30.464186 IP 192.168.1.1.47959 > 192.168.1.11.ssh: Flags [.], ack 224, 
win 184, options [nop,nop,TS val 1258239 ecr 17203641], length 0
    0x0000:  4500 0034 778f 4000 4006 3fd8 c0a8 0101
    0x0010:  c0a8 010b bb57 0016 992d 7fd6 3303 6725
    0x0020:  8010 00b8 ce3c 0000 0101 080a 0013 32ff
    0x0030:  0106 81b9
00:53:31.381118 IP 192.168.1.11 > 192.168.1.1<http://192.168.1.1>: ICMP echo 
request, id 6847, seq 36, length 64
    0x0000:  4500 0054 e3b7 4000 4001 d394 c0a8 010b
    0x0010:  c0a8 0101 0800 0100 1abf 0024 560c ca5b
    0x0020:  0005 d0ac 0809 0a0b 0c0d 0e0f 1011 1213
    0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
    0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
    0x0050:  3435 3637
00:53:31.381399 IP 192.168.1.1 > 192.168.1.11<http://192.168.1.11>: ICMP echo 
reply, id 6847, seq 36, length 64
    0x0000:  4500 0054 db4b 0000 4001 1c01 c0a8 0101
    0x0010:  c0a8 010b 0000 0900 1abf 0024 560c ca5b
    0x0020:  0005 d0ac 0809 0a0b 0c0d 0e0f 1011 1213
    0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
    0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
    0x0050:  3435 3637
00:53:31.466470 IP 192.168.1.11.ssh > 192.168.1.1.47959: Flags [.], seq 
224:1672, ack 1, win 329, options [nop,nop,TS val 17203892 ecr 1258239], length 
1448


Please find the below tcpdump -x output at eth0 interface when ping is running..


 tcpdump -x  -i eth0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth13, link-type EN10MB (Ethernet), capture size 65535 bytes
00:47:57.448047 IP 192.168.1.11.ssh > 192.168.1.1.46976: Flags [P.], seq 
1538147764:1538147956, ack 3851106437, win 329, options [nop,nop,TS val 
17120387 ecr 1174970], length 192
    0x0000:  4510 00f4 048b 4000 4006 b20c c0a8 010b
    0x0010:  c0a8 0101 0016 b780 5bae 45b4 e58b 3885
    0x0020:  8018 0149 227d 0000 0101 080a 0105 3c83
    0x0030:  0011 edba 903e f1db 1817 121b a33c 0c83
    0x0040:  ccd7 ae31 1c43 bc55 6428 7e3b dc4f ef4d
    0x0050:  e60f f06b 2d60 14ce 49af 1c38 1bcf 510b
    0x0060:  cbaa 2ccd 3e6f 439b b428 4861 0b3f 089b
    0x0070:  922e 5cf7 6f6a 7875 6c27 9257 0245 d67e
    0x0080:  8c88 5f88 0039 367c 5425 db64 419d 6023
    0x0090:  85cb 3b5f 6dc6 1a61 4e1b 6e73 ef90 97fb
    0x00a0:  b6f9 c55a dc39 73b2 bbce b722 4ab9 a615
    0x00b0:  2de8 f265 c21a d22b c154 71e9 0593 3332
    0x00c0:  9bb7 047b c0f0 5221 d37e f16b 7fd3 6315
    0x00d0:  b196 c925 0404 458d f359 4c71 6f26 0343
    0x00e0:  c63f 6e40 e274 3dcf 98c5 c27e e3a7 d475
    0x00f0:  5a6a 43e5
00:47:57.448332 IP 192.168.1.1.46976 > 192.168.1.11.ssh: Flags [.], ack 192, 
win 252, options [nop,nop,TS val 1174985 ecr 17120387], length 0
    0x0000:  4500 0034 d33c 4000 4006 e42a c0a8 0101
    0x0010:  c0a8 010b b780 0016 e58b 3885 5bae 4674
    0x0020:  8010 00fc 4f37 0000 0101 080a 0011 edc9
    0x0030:  0105 3c83
00:47:58.341139 IP 192.168.1.11 > 192.168.1.1<http://192.168.1.1>: ICMP echo 
request, id 6685, seq 11, length 64
    0x0000:  4500 0054 3668 4000 4001 80e4 c0a8 010b
    0x0010:  c0a8 0101 0800 9f45 1a1d 000b 560c c90e
    0x0020:  0005 346f 0809 0a0b 0c0d 0e0f 1011 1213
    0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
    0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
    0x0050:  3435 3637
00:47:58.341406 IP 192.168.1.1 > 192.168.1.11<http://192.168.1.11>: ICMP echo 
reply, id 6685, seq 11, length 64
    0x0000:  4500 0054 da1d 0000 4001 1d2f c0a8 0101
    0x0010:  c0a8 010b 0000 a745 1a1d 000b 560c c90e
    0x0020:  0005 346f 0809 0a0b 0c0d 0e0f 1011 1213
    0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
    0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
    0x0050:  3435 3637

On Thu, Oct 1, 2015 at 11:13 AM, Rajagopalan Sivaramakrishnan 
<[email protected]<mailto:[email protected]>> wrote:
Can you please send the output of tcpdump –x on both interfaces for a few 
seconds when ping is running?

Raja

From: abhishek jain <[email protected]<mailto:[email protected]>>
Date: Wednesday, September 30, 2015 at 10:27 PM

To: Rajagopalan Sivaramakrishnan <[email protected]<mailto:[email protected]>>
Cc: "[email protected]<mailto:[email protected]>" 
<[email protected]<mailto:[email protected]>>, 
"[email protected]<mailto:[email protected]>" 
<[email protected]<mailto:[email protected]>>
Subject: Re: [opencontrail-dev] Checksum offload error with 
contrail-vrouter-agent running on compute node

Hi Rajagopalan

I captured packets using tcpdump on vhost0 and eth0 on compute node.The 
checksum is correct when capturing packets at vhost0 interface.However the 
checksum incorrect error occurs when I'm capturing packets at eth0 interface of 
the compute node.

Please find the attached screanshot for the same.



On Thu, Oct 1, 2015 at 12:03 AM, Rajagopalan Sivaramakrishnan 
<[email protected]<mailto:[email protected]>> wrote:
Hi Abhishek,
    Can you please run “tcpdump –x” on vhost0 and the physical interface (eth0) 
concurrently and compare the packets to see if anything changed between vhost0 
and eth0 (I.e. after vrouter processed the packet)?

Raja

From: abhishek jain <[email protected]<mailto:[email protected]>>
Date: Wednesday, September 30, 2015 at 8:41 AM
To: Rajagopalan Sivaramakrishnan <[email protected]<mailto:[email protected]>>
Cc: "[email protected]<mailto:[email protected]>" 
<[email protected]<mailto:[email protected]>>, 
"[email protected]<mailto:[email protected]>" 
<[email protected]<mailto:[email protected]>>

Subject: Re: [opencontrail-dev] Checksum offload error with 
contrail-vrouter-agent running on compute node

Hi Raja

Below are the inline answers for your queries..


Are you seeing any checksum errors go up on the receiver of the ping (using 
netstat)?

The Below fields are incresing at the receiver side when ping is initiated from 
the compute node running contrail-vrouter-agent..


netstat  -s

Ip:
    4666082 total packets received
    4051 with invalid headers
    2 with invalid addresses
    22 forwarded
    0 incoming packets discarded
    4558747 incoming packets delivered
    4493351 requests sent out
    12 outgoing packets dropped
    13 fragments dropped after timeout
    42 reassemblies required
    7 packets reassembled ok
    13 packet reassembles failed
Icmp:
    17279 ICMP messages received
    32 input ICMP message failed.
    ICMP input histogram:
        destination unreachable: 2068
        timeout in transit: 14
        echo requests: 13570
        echo replies: 1627
    17190 ICMP messages sent
    0 ICMP messages failed
    ICMP output histogram:
        destination unreachable: 1776
        redirect: 12
        echo request: 1832
        echo replies: 13570
IcmpMsg:
        InType0: 1627
        InType3: 2068
        InType8: 13570
        InType11: 14
        OutType0: 13570
       OutType3: 1776
        OutType5: 12
        OutType8: 1832
Tcp:
    251330 active connections openings
    127809 passive connection openings
    118574 failed connection attempts
    170 connection resets received
    24 connections established
    3254207 segments received
    3777193 segments send out
    11826 segments retransmited
    144 bad segments received.

The above coloured  field is increasing at the receiver only after ping is 
initiated from the compute node.


Not having the dropstats command on powerpc ubuntu.


When we try to run droptstat command, we got the below prints
#############################################
dropstats

Usage: dropstats [--help]
Usage: dropstats [--core|-c] <core number>

--core <core number>     Show statistics for a specified CPU core
###################################################

Then when we analyse the dropstats.c program, we found that it is getting error 
at the main function itself.

The variable "opt" is not getting any valid values, so the switch case is going 
to the default case and it prints the above prints..

When I print the opt value, it is giving some garbage value itseems,
##################################################
dropstats

OPT VAlue : �
Usage: dropstats [--help]
Usage: dropstats [--core|-c] <core number>

--core <core number>     Show statistics for a specified CPU core
##################################################


Please help us regarding this.

Thanks

On Wed, Sep 30, 2015 at 11:24 AM, Rajagopalan Sivaramakrishnan 
<[email protected]<mailto:[email protected]>> wrote:

>Not having the dropstats command on powerpc ubuntu.

This should be built when you build vrouter utils. If you have “rt” and “nh” 
utilities working, this should work too.

Are you seeing any checksum errors go up on the receiver of the ping (using 
netstat)?

Please check if any counters are going up corresponding to the reception of the 
pings. The absolute values of the counters are not useful.

 netstat -s
Ip:
    621360 total packets received
    1722 with invalid headers
    2 with invalid addresses
    1 forwarded
    0 incoming packets discarded
    596580 incoming packets delivered
    490572 requests sent out
    1 outgoing packets dropped
    3 fragments dropped after timeout
    8 reassemblies required
    1 packets reassembled ok
    3 packet reassembles failed
Icmp:
    5542 ICMP messages received
    10 input ICMP message failed.
    ICMP input histogram:
        destination unreachable: 180
        timeout in transit: 12
        echo requests: 3730
        echo replies: 1620
    5717 ICMP messages sent
    0 ICMP messages failed
    ICMP output histogram:
        destination unreachable: 180
        redirect: 1
        echo request: 1806
        echo replies: 3730
IcmpMsg:
        InType0: 1620
        InType3: 180
        InType8: 3730
        InType11: 12
        OutType0: 3730
        OutType3: 180
        OutType5: 1
        OutType8: 1806
Tcp:
    46413 active connections openings
    23428 passive connection openings
    21350 failed connection attempts
    45 connection resets received
    42 connections established
    434130 segments received
    431999 segments send out
    938 segments retransmited
    32 bad segments received.
    22332 resets sent
Udp:
    182146 packets received
    21 packets to unknown port received.
    0 packet receive errors
    51965 packets sent
UdpLite:
TcpExt:
    24030 TCP sockets finished time wait in fast timer
    2774 delayed acks sent
    Quick ack mode was activated 154 times
    36 packets directly queued to recvmsg prequeue.
    2176 bytes directly received in process context from prequeue
    68980 packet headers predicted
    4 packets header predicted and directly queued to user
    81153 acknowledgments not containing data payload received
    50692 predicted acknowledgments
    20 times recovered from packet loss by selective acknowledgements
    Detected reordering 2 times using SACK
    Detected reordering 6 times using time stamp
    7 congestion windows fully recovered without slow start
    59 congestion windows partially recovered using Hoe heuristic
    1 congestion windows recovered without slow start by DSACK
    309 congestion windows recovered without slow start after partial ack
    20 fast retransmits
    11 forward retransmits
    11 retransmits in slow start
    584 other TCP timeouts
    1 SACK retransmits failed
    212 DSACKs sent for old packets
    29 DSACKs sent for out of order packets
    240 DSACKs received
    272 connections reset due to unexpected data
    22 connections reset due to early user close
    30 connections aborted due to timeout
    TCPDSACKIgnoredOld: 1
    TCPDSACKIgnoredNoUndo: 50
    TCPSackShiftFallback: 198
    IPReversePathFilter: 120
    TCPRcvCoalesce: 15109
    TCPChallengeACK: 37
    TCPSYNChallenge: 32
IpExt:
    InMcastPkts: 57521
    OutMcastPkts: 4516
    InBcastPkts: 54973
    OutBcastPkts: 521
    InOctets: 128287765
    OutOctets: 58739537
    InMcastOctets: 14558645
    OutMcastOctets: 372894
    InBcastOctets: 7484935
    OutBcastOctets: 92175




On Wed, Sep 30, 2015 at 11:08 AM, Rajagopalan Sivaramakrishnan 
<[email protected]<mailto:[email protected]>> wrote:
Hi Abhishek,
   Are you still able to ping when the agent is not running?  Did you try using 
“dropstats" to see if there are any drops inside vrouter?
Are you seeing any checksum errors go up on the receiver of the ping (using 
netstat)?

Raja

From: Dev 
<[email protected]<mailto:[email protected]>> 
on behalf of abhishek jain 
<[email protected]<mailto:[email protected]>>
Date: Tuesday, September 29, 2015 at 10:50 AM
To: "[email protected]<mailto:[email protected]>" 
<[email protected]<mailto:[email protected]>>, 
"[email protected]<mailto:[email protected]>" 
<[email protected]<mailto:[email protected]>>
Subject: Re: [opencontrail-dev] Checksum offload error with 
contrail-vrouter-agent running on compute node

CCing Omartsyniuk

On Tue, Sep 29, 2015 at 7:36 PM, abhishek jain 
<[email protected]<mailto:[email protected]>> wrote:
Hi Team


We are getting checksum error from the powerpc  ubuntu 32 bit as compute node 
when the contrail-voruter-agent userspace agent is running after ping is 
initiated from the compute node.Please find the attached screanshot for the 
same.We have  disabled checksum offload at both eth0 as well as vhost0 on the 
powerpc ubuntu.

ethtool -K eth0 tx off

ethtool -k vhost0 | grep checksum
rx-checksumming: off [fixed]
tx-checksumming: off
        tx-checksum-ipv4: off [fixed]
        tx-checksum-ip-generic: off [fixed]
        tx-checksum-ipv6: off [fixed]
        tx-checksum-fcoe-crc: off [fixed]
        tx-checksum-sctp: off [fixed]


However still we are not able ping the outside world with 
contrail-vrouter-agent binary running and we are facing same ipv4 checksum 
offload incorrect error when we capture packets after ping is initiated from 
the compute node.

Do we need to make changes in contrail-vrouter-agent code regarding this?


Please help regarding this.
Thanks
[https://ssl.gstatic.com/ui/v1/icons/mail/images/cleardot.gif]






_______________________________________________
Dev mailing list
[email protected]
http://lists.opencontrail.org/mailman/listinfo/dev_lists.opencontrail.org

Reply via email to