From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-ob0-x234.google.com (mail-ob0-x234.google.com [IPv6:2607:f8b0:4003:c01::234]) by dpdk.org (Postfix) with ESMTP id 3EC84DE4 for ; Fri, 1 Nov 2013 14:42:21 +0100 (CET) Received: by mail-ob0-f180.google.com with SMTP id wo20so4443316obc.25 for ; Fri, 01 Nov 2013 06:43:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=fA+YAXJubIlPjciaIF0jETLOEZfvkKGh12/YNzKQiCc=; b=Xrpr56QeBD++kHDt+OpMe1ZDAvCTGB4fuwjuYr/HhyVLFZIfugXJs3V9WWzLpchhCA 3cQ+B0L5+CmYenB6U4JxX0dde6RFZPLfQGc9N9mFtrGPblQSZ454K55MMTeGmP75/FIo R1MKE1nwpd3+RGnDHb9am7V2Na5bl20UID+as7H48A7l5F7+UuIpJYx85KqyyV1YvlHh QI+uJ9BFOFZgn/ew4FT2m4D2P01mQNxOd+9nZ+w21aeb/M13sLKoAKEYe+/8faMl7xrW Uc/DzM1s4y8A4Y+tfEx7vhL13OY7ZcnhJ7LAqYWgJ/vz1t+m2zpDZwpHzKlKK/pDn1k4 ogQw== MIME-Version: 1.0 X-Received: by 10.182.28.134 with SMTP id b6mr2695826obh.27.1383313392399; Fri, 01 Nov 2013 06:43:12 -0700 (PDT) Received: by 10.60.45.227 with HTTP; Fri, 1 Nov 2013 06:43:12 -0700 (PDT) Date: Fri, 1 Nov 2013 17:43:12 +0400 Message-ID: From: Alexander Belyakov To: dev@dpdk.org Content-Type: text/plain; charset=UTF-8 X-Content-Filtered-By: Mailman/MimeDel 2.1.15 Subject: [dpdk-dev] Surprisingly high TCP ACK packets drop counter X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches and discussions about DPDK List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 01 Nov 2013 13:42:21 -0000 Hello, we have simple test application on top of DPDK which sole purpose is to forward as much packets as possible. Generally we easily achieve 14.5Mpps with two 82599EB (one as input and one as output). The only suprising exception is forwarding pure TCP ACK flood when performace always drops to approximately 7Mpps. For simplicity consider two different types of traffic: 1) TCP SYN flood is forwarded at 14.5Mpps rate, 2) pure TCP ACK flood is forwarded only at 7Mpps rate. Both SYN and ACK packets have exactly the same length. It is worth to mention, this forwarding application looks at Ethernet and IP headers, but never deals with L4 headers. We tracked down issue to RX circuit. To be specific, there are 4 RX queues initialized on input port and rte_eth_stats_get() shows uniform packet distribution (q_ipackets) among them, while q_errors remain zero for all queues. The only drop counter quickly increasing in the case of pure ACK flood is ierrors, while rx_nombuf remains zero. We tried different kinds of traffic generators, but always got the same result: 7Mpps (instead of expected 14Mpps) for TCP packets with ACK flag bit set while all other flag bits dropped. Source IPs and ports are selected randomly. Please let us know if anyone is aware of such strange behavior and where should we look at to narrow down the problem. Thanks in advance, Alexander Belyakov