Hi Vijay, Yes, APP_OPTIONS_ADD_SEGMENT_SIZE will be needed if any listeners are used. It was there before but was not needed if only one listener was configured.
Regards, Florin > On Mar 16, 2022, at 11:15 AM, Vijay Kumar <vjkumar2...@gmail.com> wrote: > > Hi Florin, > > My application code has not changed b/w 20.05 and 21.06. The below is the > code snippet of my application that binds the TCP listen IP/Port > The option that you mentioned "APP_OPTIONS_ADD_SEGMENT_SIZE" is not set in my > application code but "APP_OPTIONS_SEGMENT_SIZE" is set. > > My application code pasted below worked fine in VPP 20.05 but not in 21.06 > Is the missing option "APP_OPTIONS_ADD_SEGMENT_SIZE" important to be set in > 21.06 VPP? > > > static int nas_server_attach (u32 *nasAppIndex) > { > an_ppe_nas_main_t *pm = &an_ppe_nas_main; > u64 options[APP_OPTIONS_N_OPTIONS]; > vnet_app_attach_args_t _a, *a = &_a; > u32 segment_size = 512 << 20; > > clib_memset (a, 0, sizeof (*a)); > clib_memset (options, 0, sizeof (options)); > > if (pm->private_segment_size) > segment_size = pm->private_segment_size; > a->name = format (0, "nas-tcp-server"); > a->api_client_index = APP_INVALID_INDEX; > a->session_cb_vft = &nas_server_session_cb_vft; > a->options = options; > a->options[APP_OPTIONS_SEGMENT_SIZE] = segment_size; > a->options[APP_OPTIONS_RX_FIFO_SIZE] = pm->fifo_size; > a->options[APP_OPTIONS_TX_FIFO_SIZE] = pm->fifo_size; > a->options[APP_OPTIONS_PRIVATE_SEGMENT_COUNT] = pm->private_segment_count; > a->options[APP_OPTIONS_PREALLOC_FIFO_PAIRS] = > pm->prealloc_fifos ? pm->prealloc_fifos : 0; > > a->options[APP_OPTIONS_FLAGS] = APP_OPTIONS_FLAGS_IS_BUILTIN; > > if (vnet_application_attach (a)) > { > NAS_DBG("Failed to attach "); > return -1; > } > *nasAppIndex = a->app_index; > pm->app_index = a->app_index; > > vec_free (a->name); > return 0; > } > > > > Regards, > Vijay > > On Wed, Mar 16, 2022 at 10:19 PM Florin Coras <fcoras.li...@gmail.com > <mailto:fcoras.li...@gmail.com>> wrote: > Hi Vijay, > > That’s a sign that either fifo allocations failed (not enough memory in the > fifo segment) or that the app refused the session (app_worker_accept_notify > returns non zero). > > Here’s a guess, your app does not set APP_OPTIONS_ADD_SEGMENT_SIZE in the > attach options passed to vnet_application_attach. Some vpp versions ago we > switched to using the first fifo segment as connects segment and all > listeners allocate their first segments based on size provided with this > option. If not provided, listeners fail to allocate segments. > > Regards, > Florin > >> On Mar 16, 2022, at 3:49 AM, Vijay Kumar <vjkumar2...@gmail.com >> <mailto:vjkumar2...@gmail.com>> wrote: >> >> Hi Florin, >> >> The patch helped me to find the exact point of failure in >> tcp46_listen_inline() graph node. >> When I tested again, I get the below error and it maps to this error code >> "TCP_ERROR_CREATE_SESSION_FAIL" >> This counter is incremented when the call to function >> session_stream_accept() returns failure. >> >> Is there any potential reason why allocation fails at this place? >> >> >> show errors output >> =============== >> 4 arp-reply ARP replies >> sent error >> 14 ip4-udp-lookup No >> error error >> 5 tcp4-listen Sessions couldn't >> be allocated error >> 5 esp4-decrypt-tun ESP pkts >> received error >> 5 ipsec4-tun-input good packets >> received error >> 1 ip4-input ip4 ttl >> <= 1 error >> 1 ip4-icmp-error hop limit exceeded >> response sent error >> 3346 ethernet-input unknown >> vlan error >> >> >> On Wed, Mar 16, 2022 at 1:31 PM Vijay Kumar <vjkumar2...@gmail.com >> <mailto:vjkumar2...@gmail.com>> wrote: >> Hi Florin, >> >> Thanks for the clarification about the TCP changes b/w the 2 releases >> >> I will use your patch, hopefully I will catch the issue about where the >> drops are. I will try to debug further. >> I will revert back if required. >> >> >> Regards. >> >> On Wed, Mar 16, 2022 at 11:12 AM Florin Coras <fcoras.li...@gmail.com >> <mailto:fcoras.li...@gmail.com>> wrote: >> Hi Vijay, >> >>> On Mar 15, 2022, at 9:58 PM, Vijay Kumar <vjkumar2...@gmail.com >>> <mailto:vjkumar2...@gmail.com>> wrote: >>> >>> Hi florin, >>> >>> Thanks a lot for helping me out. I will try your patch and update you with >>> the result. >> >> Thanks! >> >>> >>> >>> A general observation >>> ====================== >>> In my setup, I think the SYN pkt is dropped much before the SYNS_RCVD >>> counter is incremented. >> >> That’s what I’d expect as well. >> >>> >>> I have seen a lot of changes b/w 20.05 and 21.06 code, like in the graph >>> node tcp46_listen_inline() of VPP 20.05 the SYN pkt trace function is >>> called towards the end i.e. after calling tcp_send_synack() but in 21.06 >>> code, the tcp46_listen_trace_frame() is called at the very beginning of >>> tcp46_listen_inline() graph node. >>> >>> I think moving the pkt trace macro to the end of the function is good >>> (placing it close to the line that calls tcp_send_synack), otherwise it can >>> mislead us and will not help debugging. >>> >> >> Most of the changes were code refactoring/cleanup and buffer handling >> optimizations, not protocol related. TCP tracing, at least as it is now, >> doesn’t provide info about the errors hit, instead it reports the >> connections hit and the reporting of errors is done through node and session >> counters (see show session verbose 2). Obviously that didn’t work properly >> for the listen node. >> >> Regards, >> Florin >> >>> >>> >>> On Wed, Mar 16, 2022 at 10:22 AM Florin Coras <fcoras.li...@gmail.com >>> <mailto:fcoras.li...@gmail.com>> wrote: >>> Hi Vijay, >>> >>> That’s probably because packets are hitting an actual error and it seems >>> the listen node is not reporting anything but syns received. Here’s a patch >>> that might help [1]. It might not cherry-pick cleanly on 21.06. >>> >>> Regards, >>> Florin >>> >>> [1] https://gerrit.fd.io/r/c/vpp/+/35654 >>> <https://gerrit.fd.io/r/c/vpp/+/35654> >>> >>>> On Mar 15, 2022, at 7:54 PM, Vijay Kumar <vjkumar2...@gmail.com >>>> <mailto:vjkumar2...@gmail.com>> wrote: >>>> >>>> Hi Florin, >>>> >>>> I have the output of show node counters (show errors) taken on both 20.05 >>>> and 21.06 vpp. In 21.06 I don't see any counters in tcp4-listen or >>>> tcp4-output etc. >>>> >>>> Please let me know why SYN rcvd counter itself is not incremented but in >>>> the earlier reply I already pasted the show trace ouput where we saw the >>>> SYN pkt was landed on tcp4-litsen node. >>>> >>>> VPP 20.05 >>>> =========== >>>> pp# show node counters >>>> Count Node Reason >>>> 3 memif-input not ip packet >>>> 10259 an_ppe_wfectrl wfectrl packets received >>>> 10259 an_ppe_wfectrl wfectrl replies sent >>>> 1 an_ppe_wfectrl wfectrl packet >>>> processing failed >>>> 8123 an_ppe_wfectrl session stat request >>>> received >>>> 1 an_ppe_wfectrl service construct config >>>> request received >>>> 1 an_ppe_wfectrl service construct config >>>> request success >>>> 1 an_ppe_wfectrl service config request >>>> received >>>> 1 an_ppe_wfectrl service config request >>>> success >>>> 1686 an_ppe_wfectrl dpi stats request >>>> received >>>> 1686 an_ppe_wfectrl dpi stats request success >>>> 70 an_ppe_wfectrl nat stats request >>>> received >>>> 70 an_ppe_wfectrl nat stats request success >>>> 70 an_ppe_wfectrl vpp stats request >>>> received >>>> 70 an_ppe_wfectrl vpp stats request success >>>> 1 an_ppe_wfectrl udp tunnel resource >>>> block add request received >>>> 1 an_ppe_wfectrl udp tunnel resource >>>> block add request success >>>> 1 an_ppe_wfectrl l3rm resource block >>>> update request received >>>> 1 an_ppe_wfectrl l3rm resource block >>>> update request success >>>> 1 an_ppe_wfectrl ue registration request >>>> received >>>> 17 an_ppe_wfectrl ike msg received from >>>> ikemgr >>>> 17 an_ppe_wfectrl ike msg send to network >>>> success >>>> 3 an_ppe_wfectrl ipsec sa install msg >>>> received from ikemgr >>>> 3 an_ppe_wfectrl ipsec sa install msg >>>> processed successfully >>>> 1 an_ppe_vppctrl_input Success in insert in >>>> ueidentifier >>>> 1 an_ppe_vppctrl_input Success in insert in >>>> uecontext >>>> 2 an_ppe_vppctrl_input Downlink message sent to >>>> UE successfully >>>> 1 an_ppe_vppctrl_input TCP ESTABLISHMENT >>>> message received >>>> 1 an_ppe_vppctrl_input UPLINK NAS message >>>> received >>>> 1 an_ppe_vppctrl_input NAS TCP CLOSE message >>>> received >>>> 7 an_ppe_router_input packets received in rtr >>>> 7 an_ppe_router_input packets dropped to host. >>>> no tacptcp session found >>>> 17 an-ppe-isakmp4-output Total IKEV4 packets >>>> dispatched to network >>>> 17 an-ppe-isakmpmgr-input packets processed by >>>> isakmpmgr input plugin >>>> 17 an-ppe-isakmpmgr-input Received IKE packets >>>> 17 an-ppe-isakmpmgr-input Successfully sent ike >>>> message to Session Manager >>>> 5 an-ppe-isakmpmgr-input Received ike exchange >>>> AUTH packet >>>> 4 an-ppe-isakmpmgr-input Received ike exchange >>>> CREATE CHILD SA packet >>>> 1 an-ppe-isakmpmgr-input Received ike exchange SA >>>> INIT packet >>>> 7 an-ppe-isakmpmgr-input Received ike exchange >>>> INFORMATIONAL packet >>>> 5 arp-reply ARP replies sent >>>> 4 session-queue Packets transmitted >>>> 17 ip4-udp-lookup No error >>>> 1 tcp4-listen SYNs received >>>> 2 tcp4-rcv-process Pure ACKs received >>>> 1 tcp4-established Packets pushed into rx >>>> fifo >>>> 2 tcp4-established Pure ACKs received >>>> 1 tcp4-established FINs received >>>> 5 tcp4-output Packets sent >>>> 7 esp4-decrypt-tun ESP pkts received >>>> 5 esp4-encrypt-tun ESP pkts received >>>> 5 esp4-encrypt-tun total control pkts >>>> received >>>> 7 ipsec4-tun-input good packets received >>>> 2 ip4-local unknown ip protocol >>>> 5 ethernet-input unknown vlan >>>> vpp# >>>> vpp# >>>> >>>> >>>> >>>> >>>> >>>> VPP 21.06 output >>>> =============== >>>> vpp# >>>> vpp# show version >>>> vpp v21.06.0-3~g2a4af2b5d-dirty built by an-vijay_kumar on 500aaad2d090 at >>>> 2022-03-15T01:16:27 >>>> vpp# >>>> vpp# >>>> vpp# show node counters >>>> Count Node >>>> Reason Severity >>>> 1 null-node blackholed >>>> packets error >>>> 6690 an_ppe_wfectrl wfectrl >>>> packets received error >>>> 6690 an_ppe_wfectrl wfectrl >>>> replies sent error >>>> 1 an_ppe_wfectrl wfectrl packet >>>> processing failed error >>>> 5329 an_ppe_wfectrl session stat >>>> request received error >>>> 1 an_ppe_wfectrl service construct >>>> config request received error >>>> 1 an_ppe_wfectrl service construct >>>> config request success error >>>> 1 an_ppe_wfectrl service config >>>> request received error >>>> 1 an_ppe_wfectrl service config >>>> request success error >>>> 1068 an_ppe_wfectrl dpi stats >>>> request received error >>>> 1068 an_ppe_wfectrl dpi stats >>>> request success error >>>> 44 an_ppe_wfectrl nat stats >>>> request received error >>>> 44 an_ppe_wfectrl nat stats >>>> request success error >>>> 44 an_ppe_wfectrl vpp stats >>>> request received error >>>> 44 an_ppe_wfectrl vpp stats >>>> request success error >>>> 1 an_ppe_wfectrl udp tunnel resource >>>> block add request received error >>>> 1 an_ppe_wfectrl udp tunnel resource >>>> block add request success error >>>> 1 an_ppe_wfectrl l3rm resource block >>>> update request received error >>>> 1 an_ppe_wfectrl l3rm resource block >>>> update request success error >>>> 1 an_ppe_wfectrl ue registration >>>> request received error >>>> 1 an_ppe_wfectrl ue deregistration >>>> request received error >>>> 14 an_ppe_wfectrl ike msg >>>> received from ikemgr error >>>> 14 an_ppe_wfectrl ike msg send to >>>> network success error >>>> 3 an_ppe_wfectrl ipsec sa install msg >>>> received from ikemgr error >>>> 3 an_ppe_wfectrl ipsec sa delete msg >>>> received from ikemgr error >>>> 3 an_ppe_wfectrl ipsec sa install msg >>>> processed successfully error >>>> 3 an_ppe_wfectrl ipsec sa delete msg >>>> processed successfully error >>>> 1 an_ppe_vppctrl_input Success in delete >>>> in ueidentifier error >>>> 1 an_ppe_vppctrl_input Success in insert >>>> in ueidentifier error >>>> 1 an_ppe_vppctrl_input Success in >>>> insert in uecontext error >>>> 1 an_ppe_vppctrl_input Success in >>>> delete in uecontext error >>>> 5 an_ppe_router_input packets >>>> received in rtr error >>>> 5 an_ppe_router_input packets dropped to host. >>>> no tacptcp session found error >>>> 14 an-ppe-isakmp4-output Total IKEV4 packets >>>> dispatched to network error >>>> 14 an-ppe-isakmpmgr-input packets processed by >>>> isakmpmgr input plugin error >>>> 14 an-ppe-isakmpmgr-input Received >>>> IKE packets error >>>> 14 an-ppe-isakmpmgr-input Successfully sent ike >>>> message to Session Manager error >>>> 5 an-ppe-isakmpmgr-input Received ike >>>> exchange AUTH packet error >>>> 4 an-ppe-isakmpmgr-input Received ike exchange >>>> CREATE CHILD SA packet error >>>> 1 an-ppe-isakmpmgr-input Received ike >>>> exchange SA INIT packet error >>>> 4 an-ppe-isakmpmgr-input Received ike exchange >>>> INFORMATIONAL packet error >>>> 3 arp-reply ARP >>>> replies sent error >>>> 14 ip4-udp-lookup No >>>> error error >>>> 5 esp4-decrypt-tun ESP pkts >>>> received error >>>> 5 ipsec4-tun-input good packets >>>> received error >>>> 1 ip4-input ip4 ttl >>>> <= 1 error >>>> 1 ip4-icmp-error hop limit >>>> exceeded response sent error >>>> 27628 ethernet-input unknown >>>> vlan error >>>> vpp# >>>> vpp# >>>> >>>> >>>> >>>> >>>> On Wed, Mar 16, 2022 at 6:52 AM Florin Coras <fcoras.li...@gmail.com >>>> <mailto:fcoras.li...@gmail.com>> wrote: >>>> Hi Vijay, >>>> >>>> You won’t see the syn/syn-acks in traces because of the way they are >>>> generated. Nonetheless, you can verify that the syns were received with >>>> “show error” and check that the syn-acks were actually generated with a >>>> pcap trace rxtx <output interface> >>>> >>>> Previously tracing worked because buffers were re-used and incoming >>>> packets were directly sent to output. More recently we’ve started >>>> dispatching syn-acks through the session layer in order to minimize size >>>> of tx bursts per dispatch. >>>> >>>> Regards, >>>> Florin >>>> >>>>> On Mar 15, 2022, at 6:08 PM, Vijay Kumar <vjkumar2...@gmail.com >>>>> <mailto:vjkumar2...@gmail.com>> wrote: >>>>> >>>>> Hi Florin, >>>>> >>>>> Thanks for the quick response. >>>>> >>>>> It means it is expected to see the SYN pkts getting dropped after it is >>>>> terminated but I was not able to see any SYN-ACK going out of VPP. >>>>> >>>>> In both, "show trace" cmd output and also the pcap taken at dspatch graph >>>>> node level, I was not able to see the SYN-ACK going out. The route to >>>>> the SYN-ACK destination (which is the original source that started SYN) >>>>> is also present in the ip fib output. The configuration is the same that >>>>> was working fine for me in vp 20.05. >>>>> >>>>> Is there anything that I can look at for the SYN-ACK not sending issue? >>>>> >>>>> >>>>> >>>>> On Wed, 16 Mar 2022, 00:40 Florin Coras, <fcoras.li...@gmail.com >>>>> <mailto:fcoras.li...@gmail.com>> wrote: >>>>> Hi Vijay, >>>>> >>>>> I see an_ppe_router_input forwards syns to tcp-input and those packets >>>>> are delivered to tcp-listen, i.e., you’ve created a listener that’s >>>>> matched by the incoming traffic. >>>>> >>>>> The thing to keep in mind is that tcp terminates incoming flows and it >>>>> does not reuse buffers. That is, the syn hits the listen node and a >>>>> syn-ack is programmed for this new connection that still needs to >>>>> complete the handshake. The original syn packet is discarded and >>>>> therefore you see it as a drop. >>>>> >>>>> Regards, >>>>> Florin >>>>> >>>>>> On Mar 15, 2022, at 3:50 AM, Vijay Kumar <vjkumar2...@gmail.com >>>>>> <mailto:vjkumar2...@gmail.com>> wrote: >>>>>> >>>>>> The is the output of show trace and show interface >>>>>> ============================================ >>>>>> >>>>>> Packet 36 >>>>>> >>>>>> 00:03:26:875694: dpdk-input >>>>>> VirtualFuncEthernet0/7/0 rx queue 0 >>>>>> buffer 0x4c1b21: current data 0, length 138, buffer-pool 0, ref-count >>>>>> 1, totlen-nifb 0, trace handle 0x1000023 >>>>>> ext-hdr-valid >>>>>> l4-cksum-computed l4-cksum-correct >>>>>> PKT MBUF: port 0, nb_segs 1, pkt_len 138 >>>>>> buf_len 2176, data_len 138, ol_flags 0x182, data_off 128, phys_addr >>>>>> 0xc266c8c0 >>>>>> packet_type 0x691 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 >>>>>> rss 0xde0c21da fdir.hi 0x0 fdir.lo 0xde0c21da >>>>>> Packet Offload Flags >>>>>> PKT_RX_RSS_HASH (0x0002) RX packet with RSS hash result >>>>>> PKT_RX_IP_CKSUM_GOOD (0x0080) IP cksum of RX pkt. is valid >>>>>> PKT_RX_L4_CKSUM_GOOD (0x0100) L4 cksum of RX pkt. is valid >>>>>> Packet Types >>>>>> RTE_PTYPE_L2_ETHER (0x0001) Ethernet packet >>>>>> RTE_PTYPE_L3_IPV4_EXT_UNKNOWN (0x0090) IPv4 packet with or without >>>>>> extension headers >>>>>> RTE_PTYPE_L4_NONFRAG (0x0600) Non-fragmented IP packet >>>>>> IP4: fa:16:3e:4b:6b:42 -> fa:16:3e:97:04:19 802.1q vlan 1556 >>>>>> IPSEC_ESP: 20.20.99.215 -> 80.80.80.80 >>>>>> tos 0x00, ttl 64, length 120, checksum 0x21c9 dscp CS0 ecn NON_ECN >>>>>> fragment id 0x0000, flags DONT_FRAGMENT >>>>>> 00:03:26:875702: ethernet-input >>>>>> frame: flags 0x3, hw-if-index 3, sw-if-index 3 >>>>>> IP4: fa:16:3e:4b:6b:42 -> fa:16:3e:97:04:19 802.1q vlan 1556 >>>>>> 00:03:26:875708: ip4-input >>>>>> IPSEC_ESP: 20.20.99.215 -> 80.80.80.80 >>>>>> tos 0x00, ttl 64, length 120, checksum 0x21c9 dscp CS0 ecn NON_ECN >>>>>> fragment id 0x0000, flags DONT_FRAGMENT >>>>>> 00:03:26:875714: ip4-lookup >>>>>> fib 2 dpo-idx 27 flow hash: 0x00000000 >>>>>> IPSEC_ESP: 20.20.99.215 -> 80.80.80.80 >>>>>> tos 0x00, ttl 64, length 120, checksum 0x21c9 dscp CS0 ecn NON_ECN >>>>>> fragment id 0x0000, flags DONT_FRAGMENT >>>>>> 00:03:26:875715: ip4-local >>>>>> IPSEC_ESP: 20.20.99.215 -> 80.80.80.80 >>>>>> tos 0x00, ttl 64, length 120, checksum 0x21c9 dscp CS0 ecn NON_ECN >>>>>> fragment id 0x0000, flags DONT_FRAGMENT >>>>>> 00:03:26:875717: ipsec4-tun-input >>>>>> IPSec: remote:20.20.99.215 spi:4213 (0x00001075) sa:1 tun:0 seq 1 sa >>>>>> -2029505104 >>>>>> 00:03:26:875719: esp4-decrypt-tun >>>>>> esp: crypto aes-cbc-256 integrity sha1-96 pkt-seq 1 sa-seq 1 sa-seq-hi >>>>>> 0 >>>>>> 00:03:26:875801: ip4-input-no-checksum >>>>>> TCP: 44.44.44.44 -> 30.30.30.30 >>>>>> tos 0x00, ttl 64, length 60, checksum 0x3cfa dscp CS0 ecn NON_ECN >>>>>> fragment id 0x692e, flags DONT_FRAGMENT >>>>>> TCP: 45723 -> 1234 >>>>>> seq. 0x119d35d0 ack 0x00000000 >>>>>> flags 0x02 SYN, tcp header: 40 bytes >>>>>> window 64240, checksum 0xd6be >>>>>> 00:03:26:875803: ip4-lookup >>>>>> fib 2 dpo-idx 25 flow hash: 0x00000000 >>>>>> TCP: 44.44.44.44 -> 30.30.30.30 >>>>>> tos 0x00, ttl 64, length 60, checksum 0x3cfa dscp CS0 ecn NON_ECN >>>>>> fragment id 0x692e, flags DONT_FRAGMENT >>>>>> TCP: 45723 -> 1234 >>>>>> seq. 0x119d35d0 ack 0x00000000 >>>>>> flags 0x02 SYN, tcp header: 40 bytes >>>>>> window 64240, checksum 0xd6be >>>>>> 00:03:26:875803: ip4-local >>>>>> TCP: 44.44.44.44 -> 30.30.30.30 >>>>>> tos 0x00, ttl 64, length 60, checksum 0x3cfa dscp CS0 ecn NON_ECN >>>>>> fragment id 0x692e, flags DONT_FRAGMENT >>>>>> TCP: 45723 -> 1234 >>>>>> seq. 0x119d35d0 ack 0x00000000 >>>>>> flags 0x02 SYN, tcp header: 40 bytes >>>>>> window 64240, checksum 0xd6be >>>>>> 00:03:26:875805: an_ppe_router_input >>>>>> AN_PPE_ROUTER_INPUT: sw_if_index 1, next index 3 >>>>>> >>>>>> 00:03:26:875819: tcp4-input >>>>>> [0:0][T] :::0->:::0 state CLOSED >>>>>> TCP: 45723 -> 1234 >>>>>> seq. 0x119d35d0 ack 0x00000000 >>>>>> flags 0x02 SYN, tcp header: 40 bytes >>>>>> window 64240, checksum 0xd6be >>>>>> 00:03:26:875826: tcp4-listen >>>>>> 1234 -> 45723 (LISTEN) >>>>>> >>>>>> >>>>>> Interface details >>>>>> ==================== >>>>>> vpp# show interface >>>>>> Name Idx State MTU (L3/IP4/IP6/MPLS) >>>>>> Counter Count >>>>>> VirtualFuncEthernet0/7/0 3 up 1500/0/0/0 rx >>>>>> packets 3922 >>>>>> rx >>>>>> bytes 239610 >>>>>> tx >>>>>> packets 17 >>>>>> tx >>>>>> bytes 6704 >>>>>> >>>>>> drops 3914 >>>>>> VirtualFuncEthernet0/7/0.1557 13 up 1500/0/0/0 >>>>>> VirtualFuncEthernet0/7/0.1556 14 up 1500/0/0/0 rx >>>>>> packets 22 >>>>>> rx >>>>>> bytes 5130 >>>>>> tx >>>>>> packets 17 >>>>>> tx >>>>>> bytes 6704 >>>>>> >>>>>> drops 14 >>>>>> ip4 >>>>>> 19 >>>>>> VirtualFuncEthernet0/8/0 4 down 9000/0/0/0 >>>>>> gre1 2 up 9000/0/0/0 >>>>>> ipip0 1 up 9000/0/0/0 rx >>>>>> packets 5 >>>>>> rx >>>>>> bytes 500 >>>>>> ip4 >>>>>> 5 >>>>>> local0 0 down 0/0/0/0 >>>>>> loop2 8 up 9000/0/0/0 >>>>>> loop3 9 up 9000/0/0/0 >>>>>> loop4 10 up 9000/0/0/0 >>>>>> loop5 11 up 9000/0/0/0 >>>>>> loop6 12 up 9000/0/0/0 >>>>>> memif0/0 5 up 0/65535/0/0 rx >>>>>> packets 1036 >>>>>> rx >>>>>> bytes 67766832 >>>>>> tx >>>>>> packets 1049 >>>>>> tx >>>>>> bytes 67822842 >>>>>> >>>>>> drops 2 >>>>>> ip4 >>>>>> 1036 >>>>>> memif128/0 6 up 0/65535/0/0 >>>>>> memif192/0 7 up 0/65535/0/0 >>>>>> memif210/0 15 up 0/65535/0/0 >>>>>> memif210/1 16 up 0/65535/0/0 >>>>>> vpp# >>>>>> vpp# >>>>>> >>>>>> On Tue, Mar 15, 2022 at 2:32 PM Vijay Kumar via lists.fd.io >>>>>> <http://lists.fd.io/> <vjkumar2003=gmail....@lists.fd.io >>>>>> <mailto:gmail....@lists.fd.io>> wrote: >>>>>> Hi experts, >>>>>> >>>>>> I recently integrated vpp stack 21.06 and am running my NAS TCP protocol >>>>>> test cases. The pcap dispatch trace that I captured shows the TCP SYN >>>>>> packets are coming to tcp-input() and then to tcp-listen() but from here >>>>>> pkts are dropped instead of going to tcp-output() graph nodes for >>>>>> sending the SYN-ACK >>>>>> >>>>>> NOTE >>>>>> ========= >>>>>> The session layer is enabled and the TCP listen IP/port is also showing >>>>>> in the session verbose command. >>>>>> >>>>>> The same test case used to work fine in the VPP 20.05. Am I missing >>>>>> anything? >>>>>> Let me know if there is anything I need to look at. >>>>>> >>>>>> vpp# show session verbose >>>>>> Connection State >>>>>> Rx-f Tx-f >>>>>> [0:0][T] 30.30.30.30:1234->0.0.0.0:0 <http://0.0.0.0:0/> >>>>>> LISTEN 0 0 >>>>>> Thread 0: active sessions 1 >>>>>> Thread 1: no sessions >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>> >>>> >>> >> >
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#21043): https://lists.fd.io/g/vpp-dev/message/21043 Mute This Topic: https://lists.fd.io/mt/89793823/21656 Group Owner: vpp-dev+ow...@lists.fd.io Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-