Hi Florin, My application code has not changed b/w 20.05 and 21.06. The below is the code snippet of my application that binds the TCP listen IP/Port The option that you mentioned "*APP_OPTIONS_ADD_SEGMENT_SIZE*" is not set in my application code but "*APP_OPTIONS_SEGMENT_SIZE*" is set.
My application code pasted below worked fine in VPP 20.05 but not in 21.06 Is the missing option "*APP_OPTIONS_ADD_SEGMENT_SIZ*E" important to be set in 21.06 VPP? static int nas_server_attach (u32 *nasAppIndex) { an_ppe_nas_main_t *pm = &an_ppe_nas_main; u64 options[APP_OPTIONS_N_OPTIONS]; vnet_app_attach_args_t _a, *a = &_a; u32 segment_size = 512 << 20; clib_memset (a, 0, sizeof (*a)); clib_memset (options, 0, sizeof (options)); if (pm->private_segment_size) segment_size = pm->private_segment_size; a->name = format (0, "nas-tcp-server"); a->api_client_index = APP_INVALID_INDEX; a->session_cb_vft = &nas_server_session_cb_vft; a->options = options; a->options[APP_OPTIONS_SEGMENT_SIZE] = segment_size; a->options[APP_OPTIONS_RX_FIFO_SIZE] = pm->fifo_size; a->options[APP_OPTIONS_TX_FIFO_SIZE] = pm->fifo_size; a->options[APP_OPTIONS_PRIVATE_SEGMENT_COUNT] = pm->private_segment_count; a->options[APP_OPTIONS_PREALLOC_FIFO_PAIRS] = pm->prealloc_fifos ? pm->prealloc_fifos : 0; a->options[APP_OPTIONS_FLAGS] = APP_OPTIONS_FLAGS_IS_BUILTIN; if (vnet_application_attach (a)) { NAS_DBG("Failed to attach "); return -1; } *nasAppIndex = a->app_index; pm->app_index = a->app_index; vec_free (a->name); return 0; } Regards, Vijay On Wed, Mar 16, 2022 at 10:19 PM Florin Coras <fcoras.li...@gmail.com> wrote: > Hi Vijay, > > That’s a sign that either fifo allocations failed (not enough memory in > the fifo segment) or that the app refused the session > (app_worker_accept_notify returns non zero). > > Here’s a guess, your app does not set APP_OPTIONS_ADD_SEGMENT_SIZE in the > attach options passed to vnet_application_attach. Some vpp versions ago we > switched to using the first fifo segment as connects segment and all > listeners allocate their first segments based on size provided with this > option. If not provided, listeners fail to allocate segments. > > Regards, > Florin > > On Mar 16, 2022, at 3:49 AM, Vijay Kumar <vjkumar2...@gmail.com> wrote: > > Hi Florin, > > The patch helped me to find the exact point of failure in > tcp46_listen_inline() graph node. > When I tested again, I get the below error and it maps to this error code " > TCP_ERROR_CREATE_SESSION_FAIL" > This counter is incremented when the call to function > session_stream_accept() returns failure. > > Is there any potential reason why allocation fails at this place? > > > show errors output > =============== > 4 arp-reply ARP > replies sent error > 14 ip4-udp-lookup No > error error > 5 tcp4-listen Sessions > couldn't be allocated error > 5 esp4-decrypt-tun ESP pkts > received error > 5 ipsec4-tun-input good packets > received error > 1 ip4-input ip4 ttl > <= 1 error > 1 ip4-icmp-error hop limit > exceeded response sent error > 3346 ethernet-input unknown > vlan error > > > On Wed, Mar 16, 2022 at 1:31 PM Vijay Kumar <vjkumar2...@gmail.com> wrote: > >> Hi Florin, >> >> Thanks for the clarification about the TCP changes b/w the 2 releases >> >> I will use your patch, hopefully I will catch the issue about where the >> drops are. I will try to debug further. >> I will revert back if required. >> >> >> Regards. >> >> On Wed, Mar 16, 2022 at 11:12 AM Florin Coras <fcoras.li...@gmail.com> >> wrote: >> >>> Hi Vijay, >>> >>> On Mar 15, 2022, at 9:58 PM, Vijay Kumar <vjkumar2...@gmail.com> wrote: >>> >>> Hi florin, >>> >>> Thanks a lot for helping me out. I will try your patch and update you >>> with the result. >>> >>> >>> Thanks! >>> >>> >>> >>> A general observation >>> ====================== >>> In my setup, I think the SYN pkt is dropped much before the SYNS_RCVD >>> counter is incremented. >>> >>> >>> That’s what I’d expect as well. >>> >>> >>> I have seen a lot of changes b/w 20.05 and 21.06 code, like in the graph >>> node tcp46_listen_inline() of VPP 20.05 the SYN pkt trace function is >>> called towards the end i.e. after calling tcp_send_synack() but in 21.06 >>> code, the tcp46_listen_trace_frame() is called at the very beginning >>> of tcp46_listen_inline() graph node. >>> >>> I think moving the pkt trace macro to the end of the function is good >>> (placing it close to the line that calls tcp_send_synack), otherwise it can >>> mislead us and will not help debugging. >>> >>> >>> Most of the changes were code refactoring/cleanup and buffer handling >>> optimizations, not protocol related. TCP tracing, at least as it is now, >>> doesn’t provide info about the errors hit, instead it reports the >>> connections hit and the reporting of errors is done through node and >>> session counters (see show session verbose 2). Obviously that didn’t work >>> properly for the listen node. >>> >>> Regards, >>> Florin >>> >>> >>> >>> On Wed, Mar 16, 2022 at 10:22 AM Florin Coras <fcoras.li...@gmail.com> >>> wrote: >>> >>>> Hi Vijay, >>>> >>>> That’s probably because packets are hitting an actual error and it >>>> seems the listen node is not reporting anything but syns received. Here’s a >>>> patch that might help [1]. It might not cherry-pick cleanly on 21.06. >>>> >>>> Regards, >>>> Florin >>>> >>>> [1] https://gerrit.fd.io/r/c/vpp/+/35654 >>>> >>>> On Mar 15, 2022, at 7:54 PM, Vijay Kumar <vjkumar2...@gmail.com> wrote: >>>> >>>> Hi Florin, >>>> >>>> I have the output of show node counters (show errors) taken on both >>>> 20.05 and 21.06 vpp. In 21.06 I don't see any counters in tcp4-listen or >>>> tcp4-output etc. >>>> >>>> Please let me know why SYN rcvd counter itself is not incremented but >>>> in the earlier reply I already pasted the show trace ouput where we saw the >>>> SYN pkt was landed on tcp4-litsen node. >>>> >>>> VPP 20.05 >>>> =========== >>>> pp# show node counters >>>> Count Node Reason >>>> 3 memif-input not ip packet >>>> 10259 an_ppe_wfectrl wfectrl packets >>>> received >>>> 10259 an_ppe_wfectrl wfectrl replies sent >>>> 1 an_ppe_wfectrl wfectrl packet >>>> processing failed >>>> 8123 an_ppe_wfectrl session stat request >>>> received >>>> 1 an_ppe_wfectrl service construct >>>> config request received >>>> 1 an_ppe_wfectrl service construct >>>> config request success >>>> 1 an_ppe_wfectrl service config >>>> request received >>>> 1 an_ppe_wfectrl service config >>>> request success >>>> 1686 an_ppe_wfectrl dpi stats request >>>> received >>>> 1686 an_ppe_wfectrl dpi stats request >>>> success >>>> 70 an_ppe_wfectrl nat stats request >>>> received >>>> 70 an_ppe_wfectrl nat stats request >>>> success >>>> 70 an_ppe_wfectrl vpp stats request >>>> received >>>> 70 an_ppe_wfectrl vpp stats request >>>> success >>>> 1 an_ppe_wfectrl udp tunnel resource >>>> block add request received >>>> 1 an_ppe_wfectrl udp tunnel resource >>>> block add request success >>>> 1 an_ppe_wfectrl l3rm resource block >>>> update request received >>>> 1 an_ppe_wfectrl l3rm resource block >>>> update request success >>>> 1 an_ppe_wfectrl ue registration >>>> request received >>>> 17 an_ppe_wfectrl ike msg received from >>>> ikemgr >>>> 17 an_ppe_wfectrl ike msg send to >>>> network success >>>> 3 an_ppe_wfectrl ipsec sa install msg >>>> received from ikemgr >>>> 3 an_ppe_wfectrl ipsec sa install msg >>>> processed successfully >>>> 1 an_ppe_vppctrl_input Success in insert in >>>> ueidentifier >>>> 1 an_ppe_vppctrl_input Success in insert in >>>> uecontext >>>> 2 an_ppe_vppctrl_input Downlink message sent >>>> to UE successfully >>>> 1 an_ppe_vppctrl_input TCP ESTABLISHMENT >>>> message received >>>> 1 an_ppe_vppctrl_input UPLINK NAS message >>>> received >>>> 1 an_ppe_vppctrl_input NAS TCP CLOSE message >>>> received >>>> 7 an_ppe_router_input packets received in >>>> rtr >>>> 7 an_ppe_router_input packets dropped to >>>> host. no tacptcp session found >>>> 17 an-ppe-isakmp4-output Total IKEV4 packets >>>> dispatched to network >>>> 17 an-ppe-isakmpmgr-input packets processed by >>>> isakmpmgr input plugin >>>> 17 an-ppe-isakmpmgr-input Received IKE packets >>>> 17 an-ppe-isakmpmgr-input Successfully sent ike >>>> message to Session Manager >>>> 5 an-ppe-isakmpmgr-input Received ike exchange >>>> AUTH packet >>>> 4 an-ppe-isakmpmgr-input Received ike exchange >>>> CREATE CHILD SA packet >>>> 1 an-ppe-isakmpmgr-input Received ike exchange >>>> SA INIT packet >>>> 7 an-ppe-isakmpmgr-input Received ike exchange >>>> INFORMATIONAL packet >>>> 5 arp-reply ARP replies sent >>>> 4 session-queue Packets transmitted >>>> 17 ip4-udp-lookup No error >>>> 1 tcp4-listen SYNs received >>>> 2 tcp4-rcv-process Pure ACKs received >>>> 1 tcp4-established Packets pushed into >>>> rx fifo >>>> 2 tcp4-established Pure ACKs received >>>> 1 tcp4-established FINs received >>>> 5 tcp4-output Packets sent >>>> 7 esp4-decrypt-tun ESP pkts received >>>> 5 esp4-encrypt-tun ESP pkts received >>>> 5 esp4-encrypt-tun total control pkts >>>> received >>>> 7 ipsec4-tun-input good packets received >>>> 2 ip4-local unknown ip protocol >>>> 5 ethernet-input unknown vlan >>>> vpp# >>>> vpp# >>>> >>>> >>>> >>>> >>>> >>>> VPP 21.06 output >>>> =============== >>>> vpp# >>>> vpp# show version >>>> vpp v21.06.0-3~g2a4af2b5d-dirty built by an-vijay_kumar on 500aaad2d090 >>>> at 2022-03-15T01:16:27 >>>> vpp# >>>> vpp# >>>> vpp# show node counters >>>> Count Node >>>> Reason Severity >>>> 1 null-node >>>> blackholed packets error >>>> 6690 an_ppe_wfectrl wfectrl >>>> packets received error >>>> 6690 an_ppe_wfectrl wfectrl >>>> replies sent error >>>> 1 an_ppe_wfectrl wfectrl packet >>>> processing failed error >>>> 5329 an_ppe_wfectrl session stat >>>> request received error >>>> 1 an_ppe_wfectrl service construct >>>> config request received error >>>> 1 an_ppe_wfectrl service construct >>>> config request success error >>>> 1 an_ppe_wfectrl service config >>>> request received error >>>> 1 an_ppe_wfectrl service >>>> config request success error >>>> 1068 an_ppe_wfectrl dpi stats >>>> request received error >>>> 1068 an_ppe_wfectrl dpi stats >>>> request success error >>>> 44 an_ppe_wfectrl nat stats >>>> request received error >>>> 44 an_ppe_wfectrl nat stats >>>> request success error >>>> 44 an_ppe_wfectrl vpp stats >>>> request received error >>>> 44 an_ppe_wfectrl vpp stats >>>> request success error >>>> 1 an_ppe_wfectrl udp tunnel resource >>>> block add request received error >>>> 1 an_ppe_wfectrl udp tunnel resource >>>> block add request success error >>>> 1 an_ppe_wfectrl l3rm resource block >>>> update request received error >>>> 1 an_ppe_wfectrl l3rm resource block >>>> update request success error >>>> 1 an_ppe_wfectrl ue >>>> registration request received error >>>> 1 an_ppe_wfectrl ue >>>> deregistration request received error >>>> 14 an_ppe_wfectrl ike msg >>>> received from ikemgr error >>>> 14 an_ppe_wfectrl ike msg send >>>> to network success error >>>> 3 an_ppe_wfectrl ipsec sa install >>>> msg received from ikemgr error >>>> 3 an_ppe_wfectrl ipsec sa delete >>>> msg received from ikemgr error >>>> 3 an_ppe_wfectrl ipsec sa install msg >>>> processed successfully error >>>> 3 an_ppe_wfectrl ipsec sa delete msg >>>> processed successfully error >>>> 1 an_ppe_vppctrl_input Success in >>>> delete in ueidentifier error >>>> 1 an_ppe_vppctrl_input Success in >>>> insert in ueidentifier error >>>> 1 an_ppe_vppctrl_input Success in >>>> insert in uecontext error >>>> 1 an_ppe_vppctrl_input Success in >>>> delete in uecontext error >>>> 5 an_ppe_router_input packets >>>> received in rtr error >>>> 5 an_ppe_router_input packets dropped to >>>> host. no tacptcp session found error >>>> 14 an-ppe-isakmp4-output Total IKEV4 packets >>>> dispatched to network error >>>> 14 an-ppe-isakmpmgr-input packets processed by >>>> isakmpmgr input plugin error >>>> 14 an-ppe-isakmpmgr-input Received >>>> IKE packets error >>>> 14 an-ppe-isakmpmgr-input Successfully sent ike >>>> message to Session Manager error >>>> 5 an-ppe-isakmpmgr-input Received ike >>>> exchange AUTH packet error >>>> 4 an-ppe-isakmpmgr-input Received ike >>>> exchange CREATE CHILD SA packet error >>>> 1 an-ppe-isakmpmgr-input Received ike >>>> exchange SA INIT packet error >>>> 4 an-ppe-isakmpmgr-input Received ike >>>> exchange INFORMATIONAL packet error >>>> 3 arp-reply ARP >>>> replies sent error >>>> 14 ip4-udp-lookup No >>>> error error >>>> 5 esp4-decrypt-tun ESP >>>> pkts received error >>>> 5 ipsec4-tun-input good >>>> packets received error >>>> 1 ip4-input ip4 >>>> ttl <= 1 error >>>> 1 ip4-icmp-error hop limit >>>> exceeded response sent error >>>> 27628 ethernet-input >>>> unknown vlan error >>>> vpp# >>>> vpp# >>>> >>>> >>>> >>>> >>>> On Wed, Mar 16, 2022 at 6:52 AM Florin Coras <fcoras.li...@gmail.com> >>>> wrote: >>>> >>>>> Hi Vijay, >>>>> >>>>> You won’t see the syn/syn-acks in traces because of the way they are >>>>> generated. Nonetheless, you can verify that the syns were received with >>>>> “show error” and check that the syn-acks were actually generated with a >>>>> pcap trace rxtx <output interface> >>>>> >>>>> Previously tracing worked because buffers were re-used and incoming >>>>> packets were directly sent to output. More recently we’ve started >>>>> dispatching syn-acks through the session layer in order to minimize size >>>>> of >>>>> tx bursts per dispatch. >>>>> >>>>> Regards, >>>>> Florin >>>>> >>>>> On Mar 15, 2022, at 6:08 PM, Vijay Kumar <vjkumar2...@gmail.com> >>>>> wrote: >>>>> >>>>> Hi Florin, >>>>> >>>>> Thanks for the quick response. >>>>> >>>>> It means it is expected to see the SYN pkts getting dropped after it >>>>> is terminated but I was not able to see any SYN-ACK going out of VPP. >>>>> >>>>> In both, "show trace" cmd output and also the pcap taken at dspatch >>>>> graph node level, I was not able to see the SYN-ACK going out. The route >>>>> to the SYN-ACK destination (which is the original source that started SYN) >>>>> is also present in the ip fib output. The configuration is the same that >>>>> was working fine for me in vp 20.05. >>>>> >>>>> Is there anything that I can look at for the SYN-ACK not sending issue? >>>>> >>>>> >>>>> >>>>> On Wed, 16 Mar 2022, 00:40 Florin Coras, <fcoras.li...@gmail.com> >>>>> wrote: >>>>> >>>>>> Hi Vijay, >>>>>> >>>>>> I see an_ppe_router_input forwards syns to tcp-input and those >>>>>> packets are delivered to tcp-listen, i.e., you’ve created a listener >>>>>> that’s >>>>>> matched by the incoming traffic. >>>>>> >>>>>> The thing to keep in mind is that tcp terminates incoming flows and >>>>>> it does not reuse buffers. That is, the syn hits the listen node and a >>>>>> syn-ack is programmed for this new connection that still needs to >>>>>> complete >>>>>> the handshake. The original syn packet is discarded and therefore you see >>>>>> it as a drop. >>>>>> >>>>>> Regards, >>>>>> Florin >>>>>> >>>>>> On Mar 15, 2022, at 3:50 AM, Vijay Kumar <vjkumar2...@gmail.com> >>>>>> wrote: >>>>>> >>>>>> The is the output of show trace and show interface >>>>>> ============================================ >>>>>> >>>>>> Packet 36 >>>>>> >>>>>> 00:03:26:875694: dpdk-input >>>>>> VirtualFuncEthernet0/7/0 rx queue 0 >>>>>> buffer 0x4c1b21: current data 0, length 138, buffer-pool 0, >>>>>> ref-count 1, totlen-nifb 0, trace handle 0x1000023 >>>>>> ext-hdr-valid >>>>>> l4-cksum-computed l4-cksum-correct >>>>>> PKT MBUF: port 0, nb_segs 1, pkt_len 138 >>>>>> buf_len 2176, data_len 138, ol_flags 0x182, data_off 128, >>>>>> phys_addr 0xc266c8c0 >>>>>> packet_type 0x691 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 >>>>>> rss 0xde0c21da fdir.hi 0x0 fdir.lo 0xde0c21da >>>>>> Packet Offload Flags >>>>>> PKT_RX_RSS_HASH (0x0002) RX packet with RSS hash result >>>>>> PKT_RX_IP_CKSUM_GOOD (0x0080) IP cksum of RX pkt. is valid >>>>>> PKT_RX_L4_CKSUM_GOOD (0x0100) L4 cksum of RX pkt. is valid >>>>>> Packet Types >>>>>> RTE_PTYPE_L2_ETHER (0x0001) Ethernet packet >>>>>> RTE_PTYPE_L3_IPV4_EXT_UNKNOWN (0x0090) IPv4 packet with or >>>>>> without extension headers >>>>>> RTE_PTYPE_L4_NONFRAG (0x0600) Non-fragmented IP packet >>>>>> IP4: fa:16:3e:4b:6b:42 -> fa:16:3e:97:04:19 802.1q vlan 1556 >>>>>> IPSEC_ESP: 20.20.99.215 -> 80.80.80.80 >>>>>> tos 0x00, ttl 64, length 120, checksum 0x21c9 dscp CS0 ecn NON_ECN >>>>>> fragment id 0x0000, flags DONT_FRAGMENT >>>>>> 00:03:26:875702: ethernet-input >>>>>> frame: flags 0x3, hw-if-index 3, sw-if-index 3 >>>>>> IP4: fa:16:3e:4b:6b:42 -> fa:16:3e:97:04:19 802.1q vlan 1556 >>>>>> 00:03:26:875708: ip4-input >>>>>> IPSEC_ESP: 20.20.99.215 -> 80.80.80.80 >>>>>> tos 0x00, ttl 64, length 120, checksum 0x21c9 dscp CS0 ecn NON_ECN >>>>>> fragment id 0x0000, flags DONT_FRAGMENT >>>>>> 00:03:26:875714: ip4-lookup >>>>>> fib 2 dpo-idx 27 flow hash: 0x00000000 >>>>>> IPSEC_ESP: 20.20.99.215 -> 80.80.80.80 >>>>>> tos 0x00, ttl 64, length 120, checksum 0x21c9 dscp CS0 ecn NON_ECN >>>>>> fragment id 0x0000, flags DONT_FRAGMENT >>>>>> 00:03:26:875715: ip4-local >>>>>> IPSEC_ESP: 20.20.99.215 -> 80.80.80.80 >>>>>> tos 0x00, ttl 64, length 120, checksum 0x21c9 dscp CS0 ecn >>>>>> NON_ECN >>>>>> fragment id 0x0000, flags DONT_FRAGMENT >>>>>> 00:03:26:875717: ipsec4-tun-input >>>>>> IPSec: remote:20.20.99.215 spi:4213 (0x00001075) sa:1 tun:0 seq 1 >>>>>> sa -2029505104 >>>>>> 00:03:26:875719: esp4-decrypt-tun >>>>>> esp: crypto aes-cbc-256 integrity sha1-96 pkt-seq 1 sa-seq 1 >>>>>> sa-seq-hi 0 >>>>>> 00:03:26:875801: ip4-input-no-checksum >>>>>> TCP: 44.44.44.44 -> 30.30.30.30 >>>>>> tos 0x00, ttl 64, length 60, checksum 0x3cfa dscp CS0 ecn NON_ECN >>>>>> fragment id 0x692e, flags DONT_FRAGMENT >>>>>> TCP: 45723 -> 1234 >>>>>> seq. 0x119d35d0 ack 0x00000000 >>>>>> flags 0x02 SYN, tcp header: 40 bytes >>>>>> window 64240, checksum 0xd6be >>>>>> 00:03:26:875803: ip4-lookup >>>>>> fib 2 dpo-idx 25 flow hash: 0x00000000 >>>>>> TCP: 44.44.44.44 -> 30.30.30.30 >>>>>> tos 0x00, ttl 64, length 60, checksum 0x3cfa dscp CS0 ecn NON_ECN >>>>>> fragment id 0x692e, flags DONT_FRAGMENT >>>>>> TCP: 45723 -> 1234 >>>>>> seq. 0x119d35d0 ack 0x00000000 >>>>>> flags 0x02 SYN, tcp header: 40 bytes >>>>>> window 64240, checksum 0xd6be >>>>>> 00:03:26:875803: ip4-local >>>>>> TCP: 44.44.44.44 -> 30.30.30.30 >>>>>> tos 0x00, ttl 64, length 60, checksum 0x3cfa dscp CS0 ecn >>>>>> NON_ECN >>>>>> fragment id 0x692e, flags DONT_FRAGMENT >>>>>> TCP: 45723 -> 1234 >>>>>> seq. 0x119d35d0 ack 0x00000000 >>>>>> flags 0x02 SYN, tcp header: 40 bytes >>>>>> window 64240, checksum 0xd6be >>>>>> 00:03:26:875805: an_ppe_router_input >>>>>> AN_PPE_ROUTER_INPUT: sw_if_index 1, next index 3 >>>>>> >>>>>> 00:03:26:875819: tcp4-input >>>>>> [0:0][T] :::0->:::0 state CLOSED >>>>>> TCP: 45723 -> 1234 >>>>>> seq. 0x119d35d0 ack 0x00000000 >>>>>> flags 0x02 SYN, tcp header: 40 bytes >>>>>> window 64240, checksum 0xd6be >>>>>> 00:03:26:875826: tcp4-listen >>>>>> 1234 -> 45723 (LISTEN) >>>>>> >>>>>> >>>>>> Interface details >>>>>> ==================== >>>>>> vpp# show interface >>>>>> Name Idx State MTU (L3/IP4/IP6/MPLS) >>>>>> Counter Count >>>>>> VirtualFuncEthernet0/7/0 3 up 1500/0/0/0 >>>>>> rx packets 3922 >>>>>> >>>>>> rx bytes 239610 >>>>>> >>>>>> tx packets 17 >>>>>> >>>>>> tx bytes 6704 >>>>>> >>>>>> drops 3914 >>>>>> VirtualFuncEthernet0/7/0.1557 13 up 1500/0/0/0 >>>>>> VirtualFuncEthernet0/7/0.1556 14 up 1500/0/0/0 >>>>>> rx packets 22 >>>>>> >>>>>> rx bytes 5130 >>>>>> >>>>>> tx packets 17 >>>>>> >>>>>> tx bytes 6704 >>>>>> >>>>>> drops 14 >>>>>> >>>>>> ip4 19 >>>>>> VirtualFuncEthernet0/8/0 4 down 9000/0/0/0 >>>>>> gre1 2 up 9000/0/0/0 >>>>>> ipip0 1 up 9000/0/0/0 >>>>>> rx packets 5 >>>>>> >>>>>> rx bytes 500 >>>>>> >>>>>> ip4 5 >>>>>> local0 0 down 0/0/0/0 >>>>>> loop2 8 up 9000/0/0/0 >>>>>> loop3 9 up 9000/0/0/0 >>>>>> loop4 10 up 9000/0/0/0 >>>>>> loop5 11 up 9000/0/0/0 >>>>>> loop6 12 up 9000/0/0/0 >>>>>> memif0/0 5 up 0/65535/0/0 >>>>>> rx packets 1036 >>>>>> >>>>>> rx bytes 67766832 >>>>>> >>>>>> tx packets 1049 >>>>>> >>>>>> tx bytes 67822842 >>>>>> >>>>>> drops 2 >>>>>> >>>>>> ip4 1036 >>>>>> memif128/0 6 up 0/65535/0/0 >>>>>> memif192/0 7 up 0/65535/0/0 >>>>>> memif210/0 15 up 0/65535/0/0 >>>>>> memif210/1 16 up 0/65535/0/0 >>>>>> vpp# >>>>>> vpp# >>>>>> >>>>>> On Tue, Mar 15, 2022 at 2:32 PM Vijay Kumar via lists.fd.io >>>>>> <vjkumar2003=gmail....@lists.fd.io> wrote: >>>>>> >>>>>>> Hi experts, >>>>>>> >>>>>>> I recently integrated vpp stack 21.06 and am running my NAS TCP >>>>>>> protocol test cases. The pcap dispatch trace that I captured shows the >>>>>>> TCP >>>>>>> SYN packets are coming to tcp-input() and then to tcp-listen() but from >>>>>>> here pkts are dropped instead of going to tcp-output() graph nodes for >>>>>>> sending the SYN-ACK >>>>>>> >>>>>>> NOTE >>>>>>> ========= >>>>>>> The session layer is enabled and the TCP listen IP/port is also >>>>>>> showing in the session verbose command. >>>>>>> >>>>>>> The same test case used to work fine in the VPP 20.05. Am I missing >>>>>>> anything? >>>>>>> Let me know if there is anything I need to look at. >>>>>>> >>>>>>> vpp# show session verbose >>>>>>> Connection State >>>>>>> Rx-f Tx-f >>>>>>> [0:0][T] 30.30.30.30:1234->0.0.0.0:0 LISTEN >>>>>>> 0 0 >>>>>>> Thread 0: active sessions 1 >>>>>>> Thread 1: no sessions >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>> >>>> >>> >
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#21042): https://lists.fd.io/g/vpp-dev/message/21042 Mute This Topic: https://lists.fd.io/mt/89793823/21656 Group Owner: vpp-dev+ow...@lists.fd.io Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-