The is the output of show trace and show interface
============================================

Packet 36

00:03:26:875694: dpdk-input
  VirtualFuncEthernet0/7/0 rx queue 0
  buffer 0x4c1b21: current data 0, length 138, buffer-pool 0, ref-count 1,
totlen-nifb 0, trace handle 0x1000023
                   ext-hdr-valid
                   l4-cksum-computed l4-cksum-correct
  PKT MBUF: port 0, nb_segs 1, pkt_len 138
    buf_len 2176, data_len 138, ol_flags 0x182, data_off 128, phys_addr
0xc266c8c0
    packet_type 0x691 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0
    rss 0xde0c21da fdir.hi 0x0 fdir.lo 0xde0c21da
    Packet Offload Flags
      PKT_RX_RSS_HASH (0x0002) RX packet with RSS hash result
      PKT_RX_IP_CKSUM_GOOD (0x0080) IP cksum of RX pkt. is valid
      PKT_RX_L4_CKSUM_GOOD (0x0100) L4 cksum of RX pkt. is valid
    Packet Types
      RTE_PTYPE_L2_ETHER (0x0001) Ethernet packet
      RTE_PTYPE_L3_IPV4_EXT_UNKNOWN (0x0090) IPv4 packet with or without
extension headers
      RTE_PTYPE_L4_NONFRAG (0x0600) Non-fragmented IP packet
  IP4: fa:16:3e:4b:6b:42 -> fa:16:3e:97:04:19 802.1q vlan 1556
  IPSEC_ESP: 20.20.99.215 -> 80.80.80.80
    tos 0x00, ttl 64, length 120, checksum 0x21c9 dscp CS0 ecn NON_ECN
    fragment id 0x0000, flags DONT_FRAGMENT
00:03:26:875702: ethernet-input
  frame: flags 0x3, hw-if-index 3, sw-if-index 3
  IP4: fa:16:3e:4b:6b:42 -> fa:16:3e:97:04:19 802.1q vlan 1556
00:03:26:875708: ip4-input
  IPSEC_ESP: 20.20.99.215 -> 80.80.80.80
    tos 0x00, ttl 64, length 120, checksum 0x21c9 dscp CS0 ecn NON_ECN
    fragment id 0x0000, flags DONT_FRAGMENT
00:03:26:875714: ip4-lookup
  fib 2 dpo-idx 27 flow hash: 0x00000000
  IPSEC_ESP: 20.20.99.215 -> 80.80.80.80
    tos 0x00, ttl 64, length 120, checksum 0x21c9 dscp CS0 ecn NON_ECN
    fragment id 0x0000, flags DONT_FRAGMENT
00:03:26:875715: ip4-local
    IPSEC_ESP: 20.20.99.215 -> 80.80.80.80
      tos 0x00, ttl 64, length 120, checksum 0x21c9 dscp CS0 ecn NON_ECN
      fragment id 0x0000, flags DONT_FRAGMENT
00:03:26:875717: ipsec4-tun-input
  IPSec: remote:20.20.99.215 spi:4213 (0x00001075) sa:1 tun:0 seq 1 sa
-2029505104
00:03:26:875719: esp4-decrypt-tun
  esp: crypto aes-cbc-256 integrity sha1-96 pkt-seq 1 sa-seq 1 sa-seq-hi 0
00:03:26:875801: ip4-input-no-checksum
  TCP: 44.44.44.44 -> 30.30.30.30
    tos 0x00, ttl 64, length 60, checksum 0x3cfa dscp CS0 ecn NON_ECN
    fragment id 0x692e, flags DONT_FRAGMENT
  TCP: 45723 -> 1234
    seq. 0x119d35d0 ack 0x00000000
    flags 0x02 SYN, tcp header: 40 bytes
    window 64240, checksum 0xd6be
00:03:26:875803: ip4-lookup
  fib 2 dpo-idx 25 flow hash: 0x00000000
  TCP: 44.44.44.44 -> 30.30.30.30
    tos 0x00, ttl 64, length 60, checksum 0x3cfa dscp CS0 ecn NON_ECN
    fragment id 0x692e, flags DONT_FRAGMENT
  TCP: 45723 -> 1234
    seq. 0x119d35d0 ack 0x00000000
    flags 0x02 SYN, tcp header: 40 bytes
    window 64240, checksum 0xd6be
00:03:26:875803: ip4-local
    TCP: 44.44.44.44 -> 30.30.30.30
      tos 0x00, ttl 64, length 60, checksum 0x3cfa dscp CS0 ecn NON_ECN
      fragment id 0x692e, flags DONT_FRAGMENT
    TCP: 45723 -> 1234
      seq. 0x119d35d0 ack 0x00000000
      flags 0x02 SYN, tcp header: 40 bytes
      window 64240, checksum 0xd6be
00:03:26:875805: an_ppe_router_input
  AN_PPE_ROUTER_INPUT: sw_if_index 1, next index 3

00:03:26:875819: tcp4-input
  [0:0][T] :::0->:::0 state CLOSED
  TCP: 45723 -> 1234
    seq. 0x119d35d0 ack 0x00000000
    flags 0x02 SYN, tcp header: 40 bytes
    window 64240, checksum 0xd6be
00:03:26:875826: tcp4-listen
  1234 -> 45723 (LISTEN)


Interface details
====================
vpp# show interface
              Name               Idx    State  MTU (L3/IP4/IP6/MPLS)
Counter          Count
VirtualFuncEthernet0/7/0          3      up          1500/0/0/0     rx
packets                  3922
                                                                    rx
bytes                  239610
                                                                    tx
packets                    17
                                                                    tx
bytes                    6704
                                                                    drops
                    3914
VirtualFuncEthernet0/7/0.1557     13     up          1500/0/0/0
VirtualFuncEthernet0/7/0.1556     14     up          1500/0/0/0     rx
packets                    22
                                                                    rx
bytes                    5130
                                                                    tx
packets                    17
                                                                    tx
bytes                    6704
                                                                    drops
                      14
                                                                    ip4
                      19
VirtualFuncEthernet0/8/0          4     down         9000/0/0/0
gre1                              2      up          9000/0/0/0
ipip0                             1      up          9000/0/0/0     rx
packets                     5
                                                                    rx
bytes                     500
                                                                    ip4
                       5
local0                            0     down          0/0/0/0
loop2                             8      up          9000/0/0/0
loop3                             9      up          9000/0/0/0
loop4                             10     up          9000/0/0/0
loop5                             11     up          9000/0/0/0
loop6                             12     up          9000/0/0/0
memif0/0                          5      up         0/65535/0/0     rx
packets                  1036
                                                                    rx
bytes                67766832
                                                                    tx
packets                  1049
                                                                    tx
bytes                67822842
                                                                    drops
                       2
                                                                    ip4
                    1036
memif128/0                        6      up         0/65535/0/0
memif192/0                        7      up         0/65535/0/0
memif210/0                        15     up         0/65535/0/0
memif210/1                        16     up         0/65535/0/0
vpp#
vpp#

On Tue, Mar 15, 2022 at 2:32 PM Vijay Kumar via lists.fd.io <vjkumar2003=
gmail....@lists.fd.io> wrote:

> Hi experts,
>
> I recently integrated vpp stack 21.06 and am running my NAS TCP protocol
> test cases. The pcap dispatch trace that I captured shows  the TCP SYN
> packets are coming to tcp-input() and then to tcp-listen() but from here
> pkts are dropped instead of going to tcp-output() graph nodes for sending
> the SYN-ACK
>
> NOTE
> =========
> The session layer is enabled and the TCP listen IP/port is also showing in
> the session verbose command.
>
> The same test case used to work fine in the VPP 20.05. Am I missing
> anything?
> Let me know if there is anything I need to look at.
>
> vpp# show session verbose
> Connection                                                  State
>  Rx-f      Tx-f
> [0:0][T] 30.30.30.30:1234->0.0.0.0:0                        LISTEN
>   0         0
> Thread 0: active sessions 1
> Thread 1: no sessions
>
> 
>
>
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#21019): https://lists.fd.io/g/vpp-dev/message/21019
Mute This Topic: https://lists.fd.io/mt/89793823/21656
Group Owner: vpp-dev+ow...@lists.fd.io
Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to