Guest

Preview Tool

Cisco Bug: CSCus01410 - SPP should log errored packets

Last Modified

Jan 06, 2017

Products (1)

  • Cisco IOS XRv Router

Known Affected Releases

5.4.0.BASE

Description (partial)

Symptom:
SPP disconnected the socket because it received an incorrect, or corrupted packet.

[uvf:/var/log]$ grep ERROR dpa.log*
dpa.log.2:Dec  4 00:27:11.7039: DPA_ERROR: Error Receiving: nb_recv() r: -1 errno: 21
dpa.log.2:Dec  4 00:27:11.7039: DPA_ERROR: dpa_input: punt/inject socket error. No longer connected to host.
dpa.log.2:Dec  4 00:27:11.7039: DPA_ERROR: DPA intentionally exiting due to error with punt/inject socket


RP/0/RP0/CPU0:ott02-sim-09-uut#sh log | i spp
RP/0/RP0/CPU0:Dec  3 22:31:12.685 : spp[111]: Failed reading 20 bytes from Punt/Inject socket (Connection reset by peer)
RP/0/RP0/CPU0:Dec  3 22:31:12.685 : spp[111]: Unregistered Punt/Inject socket event handler
RP/0/RP0/CPU0:Dec  3 22:31:12.685 : spp[111]: Closed Punt/Inject socket
RP/0/RP0/CPU0:Dec  3 22:31:12.765 : spp[111]: Accepted Punt/Inject connection from 172.0.16.115
RP/0/RP0/CPU0:Dec  3 22:31:12.766 : spp[111]: Registered Punt/Inject socket event handler
RP/0/RP0/CPU0:Dec  4 00:17:41.371 : spp[111]: Failed to send packet (Connection reset by peer)
RP/0/RP0/CPU0:Dec  4 00:17:41.371 : spp[111]: Unregistered Punt/Inject socket event handler
RP/0/RP0/CPU0:Dec  4 00:17:41.372 : spp[111]: Closed Punt/Inject socket
RP/0/RP0/CPU0:Dec  4 00:17:41.568 : spp[111]: Accepted Punt/Inject connection from 172.0.16.115
RP/0/RP0/CPU0:Dec  4 00:17:41.569 : spp[111]: Registered Punt/Inject socket event handler
RP/0/RP0/CPU0:Dec  4 00:27:11.666 : spp[111]: Expected DPA message of type 34 (DPA_PUNT); got type 0
RP/0/RP0/CPU0:Dec  4 00:27:11.666 : spp[111]: Unregistered Punt/Inject socket event handler
RP/0/RP0/CPU0:Dec  4 00:27:11.666 : spp[111]: Closed Punt/Inject socket
RP/0/RP0/CPU0:Dec  4 00:27:11.862 : spp[111]: Accepted Punt/Inject connection from 172.0.16.115
RP/0/RP0/CPU0:Dec  4 00:27:11.862 : spp[111]: Registered Punt/Inject socket event handler

Type 0 is DPA_REQ_HELLO, and sure enough, its in the log, and for some reason we transmitted a hello request on the p/i socket.

[uvf:/var/log]$ grep DPA_REQ_HELLO *
dpa.log.2:Dec  4 00:27:11.6659: DPA_MSG: TX_MSG: type: DPA_REQ_HELLO        tag: 0x00000000 len: 9084

I think you should raise a bug, and we should make sure that we only send DPA_PUNT on the P/I socket, (and only received DPA_INJECT) and try to figure out how we could have sent this bogus packet.

Also, spp should probably dump the offending packet in the log.

Conditions:
Image:
EFR: flex-xr   EFR-00000291888   Project
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.