Last active
April 21, 2021 13:57
-
-
Save ivan4th/e0130dac619f91a6bb8e7987550c2466 to your computer and use it in GitHub Desktop.
TRex ASTF+VPP memif issue
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Frame 47: 3068 bytes on wire (24544 bits), 3068 bytes captured (24544 bits) | |
Encapsulation type: Vector Packet Processing graph dispatch trace (205) | |
Arrival Time: Jan 1, 1970 03:04:52.767839000 MSK | |
[Time shift for this packet: 0.000000000 seconds] | |
Epoch Time: 292.767839000 seconds | |
[Time delta from previous captured frame: 0.366594000 seconds] | |
[Time delta from previous displayed frame: 0.366594000 seconds] | |
[Time since reference or first frame: 0.710989000 seconds] | |
Frame Number: 47 | |
Frame Length: 3068 bytes (24544 bits) | |
Capture Length: 3068 bytes (24544 bits) | |
[Frame is marked: False] | |
[Frame is ignored: False] | |
[Protocols in frame: vpp:vpp-metadata:vpp-opaque:vpp-opaque2:eth:ethertype:ip:tcp:data] | |
[Coloring Rule Name: Checksum Errors] | |
[Coloring Rule String [truncated]: eth.fcs.status=="Bad" || ip.checksum.status=="Bad" || tcp.checksum.status=="Bad" || udp.checksum.status=="Bad" || sctp.checksum.status=="Bad" || mstp.checksum.status=="Bad" || cdp.checksum.status=="Bad" |] | |
VPP Dispatch Trace | |
BufferIndex: 0x00097f9f | |
NodeName: ethernet-input | |
VPP Buffer Metadata | |
Metadata: flags: | |
Metadata: current_data: 0, current_length: 666 | |
Metadata: current_config_index/punt_reason: 0, flow_id: 0, next_buffer: 0 | |
Metadata: error: 0, ref_count: 1, buffer_pool_index: 0 | |
Metadata: trace_handle: 0x0, len_not_first_buf: 0 | |
Metadata: | |
VPP Buffer Opaque | |
Opaque: raw: 00000002 ffffffff 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 | |
Opaque: sw_if_index[VLIB_RX]: 2, sw_if_index[VLIB_TX]: -1 | |
Opaque: L2 offset 0, L3 offset 0, L4 offset 0, feature arc index 0 | |
Opaque: ip.adj_index[VLIB_RX]: 0, ip.adj_index[VLIB_TX]: 0 | |
Opaque: ip.flow_hash: 0x0, ip.save_protocol: 0x0, ip.fib_index: 0 | |
Opaque: ip.save_rewrite_length: 0, ip.rpf_id: 0 | |
Opaque: ip.icmp.type: 0 ip.icmp.code: 0, ip.icmp.data: 0x0 | |
Opaque: ip.reass.next_index: 0, ip.reass.estimated_mtu: 0 | |
Opaque: ip.reass.error_next_index: 0, ip.reass.owner_thread_index: 0 | |
Opaque: ip.reass.ip_proto: 0, ip.reass.l4_src_port: 0 | |
Opaque: ip.reass.l4_dst_port: 0 | |
Opaque: ip.reass.fragment_first: 0 ip.reass.fragment_last: 0 | |
Opaque: ip.reass.range_first: 0 ip.reass.range_last: 0 | |
Opaque: ip.reass.next_range_bi: 0x0, ip.reass.ip6_frag_hdr_offset: 0 | |
Opaque: mpls.ttl: 0, mpls.exp: 0, mpls.first: 0, mpls.save_rewrite_length: 0, mpls.bier.n_bytes: 0 | |
Opaque: mpls.mpls_hdr_length: 0 | |
Opaque: l2.feature_bitmap: 00000000, l2.bd_index: 0, l2.l2fib_sn 0, l2.l2_len: 0, l2.shg: 0, l2.bd_age: 0 | |
Opaque: l2.feature_bitmap_input: none configured, L2.feature_bitmap_output: none configured | |
Opaque: l2t.next_index: 0, l2t.session_index: 0 | |
Opaque: l2_classify.table_index: 0, l2_classify.opaque_index: 0, l2_classify.hash: 0x0 | |
Opaque: policer.index: 0 | |
Opaque: ipsec.sad_index: 0, ipsec.protect_index | |
Opaque: map.mtu: 0 | |
Opaque: map_t.map_domain_index: 0, map_t.v6.saddr: 0x0, map_t.v6.daddr: 0x0, map_t.v6.frag_offset: 0, map_t.v6.l4_offset: 0, map_t.v6.l4_protocol: 0, map.t.checksum_offset: 0 | |
Opaque: map_t.v6.l4_protocol: 0, map_t.checksum_offset: 0, map_t.mtu: 0 | |
Opaque: ip_frag.mtu: 0, ip_frag.next_index: 0, ip_frag.flags: 0x0 | |
Opaque: cop.current_config_index: 0 | |
Opaque: lisp.overlay_afi: 0 | |
Opaque: tcp.connection_index: 0, tcp.seq_number: 0, tcp.next_node_opaque: 0 tcp.seq_end: 0, tcp.ack_number: 0, tcp.hdr_offset: 0, tcp.data_offset: 0 | |
Opaque: tcp.data_len: 0, tcp.flags: 0x0 | |
Opaque: snat.flags: 0x0 | |
Opaque: | |
VPP Buffer Opaque2 | |
Opaque2: raw: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 | |
Opaque2: qos.bits: 0, qos.source: 0 | |
Opaque2: loop_counter: 0 | |
Opaque2: gbp.flags: 0, gbp.sclass: 0 | |
Opaque2: gso_size: 0, gso_l4_hdr_sz: 0 | |
Opaque2: pg_replay_timestamp: 0 | |
Opaque2: gtpu.teid: 0x00000000, gtpu.session_index: 0x0, gtpu.ext_hdr_len: 0, gtpu.data_offset: 0, gtpu.flags: 0x00, gtpu.is_reverse: 0, gtpu.pdr_idx: 0x0, gtpu.flow_id: 0x0 | |
Opaque2: | |
Ethernet II, Src: 02:fe:a0:3b:32:55 (02:fe:a0:3b:32:55), Dst: 02:fe:ac:27:5b:60 (02:fe:ac:27:5b:60) | |
Destination: 02:fe:ac:27:5b:60 (02:fe:ac:27:5b:60) | |
Source: 02:fe:a0:3b:32:55 (02:fe:a0:3b:32:55) | |
Type: IPv4 (0x0800) | |
Internet Protocol Version 4, Src: 48.1.0.6, Dst: 16.0.0.6 | |
0100 .... = Version: 4 | |
.... 0101 = Header Length: 20 bytes (5) | |
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) | |
Total Length: 1500 | |
[Expert Info (Error/Protocol): IPv4 total length exceeds packet length (652 bytes)] | |
Identification: 0x0000 (0) | |
Flags: 0x4000, Don't fragment | |
...0 0000 0000 0000 = Fragment offset: 0 | |
Time to live: 127 | |
Protocol: TCP (6) | |
Header checksum: 0xb60f [correct] | |
[Header checksum status: Good] | |
[Calculated Checksum: 0xb60f] | |
Source: 48.1.0.6 | |
Destination: 16.0.0.6 | |
Transmission Control Protocol, Src Port: 1024, Dst Port: 63157, Seq: 1, Ack: 1, Len: 600 | |
Source Port: 1024 | |
Destination Port: 63157 | |
[Stream index: 2] | |
[TCP Segment Len: 600] | |
Sequence number: 1 (relative sequence number) | |
[Next sequence number: 601 (relative sequence number)] | |
Acknowledgment number: 1 (relative ack number) | |
1000 .... = Header Length: 32 bytes (8) | |
Flags: 0x010 (ACK) | |
Window size value: 32768 | |
[Calculated window size: 32768] | |
[Window size scaling factor: -1 (unknown)] | |
Checksum: 0xa1cc incorrect, should be 0x7af2(maybe caused by "TCP checksum offload"?) | |
[Expert Info (Error/Checksum): Bad checksum [should be 0x7af2]] | |
[Checksum Status: Bad] | |
[Calculated Checksum: 0x7af2] | |
Urgent pointer: 0 | |
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps | |
[SEQ/ACK analysis] | |
[Timestamps] | |
TCP payload (600 bytes) | |
Data (600 bytes) | |
Data: 2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a… | |
[Length: 600] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# This profile is using multiple pcaps in order to reach 1M active flows. We are using s_delay tunable in order to enlarge | |
# each flow and increment total active flows. In order to avoid keepalive errors we're setting keepalive to 1.5 times the s_delay. | |
# example start -f astf/emix2.py -m 30 -l 1000 -t traffic_per=0.9,s_delay=10000000 | |
# will generate 30gbps with 90% of the traffic with no delay and 10% with delay of 10 sec betwean the packets | |
# | |
from trex.astf.api import * | |
import random | |
import argparse | |
MIN_CPS = 0.5 | |
class Prof1(): | |
def __init__(self): | |
self.p = 1024 # starting port | |
self.ka = None | |
self.all_cap_info = [] | |
def sep_cap(self, file, cps, ip_gen=None): | |
if self.traffic_per is None or self.traffic_per == 1.0: | |
self.all_cap_info.append(ASTFCapInfo(file=file, cps=cps, ip_gen=ip_gen, port=self.p, s_delay=self.s_delay)) | |
self.p += 1 | |
else: | |
normal_cps = cps * self.traffic_per | |
delay_cps = max(cps * (1 - self.traffic_per), MIN_CPS) | |
normal_cap = ASTFCapInfo(file=file, cps=normal_cps, ip_gen=ip_gen, port=self.p) | |
delay_cap = ASTFCapInfo(file=file, cps=delay_cps, ip_gen=ip_gen, port=self.p + 1, s_delay=self.s_delay) | |
self.all_cap_info.extend([normal_cap, delay_cap]) | |
self.p += 2 | |
def create_profile(self): | |
# ip generator | |
ip_gen_c = ASTFIPGenDist(ip_range=["16.0.0.1", "16.0.1.255"], distribution="seq") | |
ip_gen_s = ASTFIPGenDist(ip_range=["48.0.0.1", "48.0.255.255"], distribution="seq") | |
ip_gen = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"), | |
dist_client=ip_gen_c, | |
dist_server=ip_gen_s) | |
ip_gen_s_delay_10_http_get_0 = ASTFIPGenDist(ip_range=["48.1.0.1", "48.1.2.44"], distribution="seq") | |
ip_gen_delay_10_http_get_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"), | |
dist_client=ip_gen_c, | |
dist_server=ip_gen_s_delay_10_http_get_0) | |
ip_gen_s_delay_10_http_post_0 = ASTFIPGenDist(ip_range=["48.2.0.1", "48.2.2.44"], distribution="seq") | |
ip_gen_delay_10_http_post_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"), | |
dist_client=ip_gen_c, | |
dist_server=ip_gen_s_delay_10_http_post_0) | |
ip_gen_s_delay_10_https_0 = ASTFIPGenDist(ip_range=["48.3.0.1", "48.3.0.180"], distribution="seq") | |
ip_gen_delay_10_https_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"), | |
dist_client=ip_gen_c, | |
dist_server=ip_gen_s_delay_10_https_0) | |
ip_gen_s_delay_10_http_browsing_0 = ASTFIPGenDist(ip_range=["48.4.0.1", "48.4.3.209"], distribution="seq") | |
ip_gen_delay_10_http_browsing_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"), | |
dist_client=ip_gen_c, | |
dist_server=ip_gen_s_delay_10_http_browsing_0) | |
ip_gen_s_delay_10_exchange_0 = ASTFIPGenDist(ip_range=["48.5.0.1", "48.5.1.93"], distribution="seq") | |
ip_gen_delay_10_exchange_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"), | |
dist_client=ip_gen_c, | |
dist_server=ip_gen_s_delay_10_exchange_0) | |
ip_gen_s_delay_10_mail_pop_0 = ASTFIPGenDist(ip_range=["48.6.0.1", "48.6.0.40"], distribution="seq") | |
ip_gen_delay_10_mail_pop_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"), | |
dist_client=ip_gen_c, | |
dist_server=ip_gen_s_delay_10_mail_pop_0) | |
ip_gen_s_delay_10_mail_pop_1 = ASTFIPGenDist(ip_range=["48.7.0.1", "48.7.0.40"], distribution="seq") | |
ip_gen_delay_10_mail_pop_1 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"), | |
dist_client=ip_gen_c, | |
dist_server=ip_gen_s_delay_10_mail_pop_1) | |
ip_gen_s_delay_10_mail_pop_2 = ASTFIPGenDist(ip_range=["48.8.0.1", "48.8.0.40"], distribution="seq") | |
ip_gen_delay_10_mail_pop_2 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"), | |
dist_client=ip_gen_c, | |
dist_server=ip_gen_s_delay_10_mail_pop_2) | |
ip_gen_s_delay_10_oracle_0 = ASTFIPGenDist(ip_range=["48.9.0.1", "48.9.0.109"], distribution="seq") | |
ip_gen_delay_10_oracle_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"), | |
dist_client=ip_gen_c, | |
dist_server=ip_gen_s_delay_10_oracle_0) | |
ip_gen_c_rtsp_rtp = ASTFIPGenDist(ip_range=["16.10.0.1", "16.10.1.255"], distribution="seq") | |
ip_gen_s_rtsp_rtp = ASTFIPGenDist(ip_range=["48.10.0.1", "48.10.1.255"], distribution="seq") | |
ip_gen_rtsp_rtp = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"), | |
dist_client=ip_gen_c_rtsp_rtp, | |
dist_server=ip_gen_s_rtsp_rtp) | |
ip_gen_s_delay_10_smtp_0 = ASTFIPGenDist(ip_range=["48.12.0.1", "48.12.0.40"], distribution="seq") | |
ip_gen_delay_10_smtp_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"), | |
dist_client=ip_gen_c, | |
dist_server=ip_gen_s_delay_10_smtp_0) | |
ip_gen_s_delay_10_smtp_1 = ASTFIPGenDist(ip_range=["48.13.0.1", "48.13.0.40"], distribution="seq") | |
ip_gen_delay_10_smtp_1 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"), | |
dist_client=ip_gen_c, | |
dist_server=ip_gen_s_delay_10_smtp_1) | |
ip_gen_s_delay_10_smtp_2 = ASTFIPGenDist(ip_range=["48.14.0.1", "48.14.0.40"], distribution="seq") | |
ip_gen_delay_10_smtp_2 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"), | |
dist_client=ip_gen_c, | |
dist_server=ip_gen_s_delay_10_smtp_2) | |
ip_gen_c_sip_rtp = ASTFIPGenDist(ip_range=["16.16.0.1", "16.16.1.255"], distribution="seq") | |
ip_gen_s_sip_rtp = ASTFIPGenDist(ip_range=["48.16.0.1", "48.16.1.255"], distribution="seq") | |
ip_gen_sip_rtp = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"), | |
dist_client=ip_gen_c_sip_rtp, | |
dist_server=ip_gen_s_sip_rtp) | |
ip_gen_s_delay_10_citrix_0 = ASTFIPGenDist(ip_range=["48.17.0.1", "48.17.0.60"], distribution="seq") | |
ip_gen_delay_10_citrix_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"), | |
dist_client=ip_gen_c, | |
dist_server=ip_gen_s_delay_10_citrix_0) | |
ip_gen_s_delay_10_dns_0 = ASTFIPGenDist(ip_range=["48.18.0.1", "48.18.10.158"], distribution="seq") | |
ip_gen_delay_10_dns_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"), | |
dist_client=ip_gen_c, | |
dist_server=ip_gen_s_delay_10_dns_0) | |
c_glob_info = ASTFGlobalInfo() | |
# c_glob_info.tcp.mss = 1000 | |
s_glob_info = ASTFGlobalInfo() | |
# s_glob_info.tcp.mss = 1000 | |
if self.ka is not None: | |
c_glob_info.tcp.keepinit = self.ka | |
c_glob_info.tcp.keepidle = self.ka | |
c_glob_info.tcp.keepintvl = self.ka | |
s_glob_info.tcp.keepinit = self.ka | |
s_glob_info.tcp.keepidle = self.ka | |
s_glob_info.tcp.keepintvl = self.ka | |
self.sep_cap(file="/trex/avl/http_manual_01.pcap_c.pcap", cps=1, ip_gen=ip_gen_delay_10_http_get_0), | |
# self.sep_cap(file="/trex/avl/http_manual_01.pcap_c.pcap", cps=120.5, ip_gen=ip_gen_delay_10_http_get_0), | |
# self.sep_cap(file="/trex/avl/delay_10_http_post_0.pcap", cps=120.5, ip_gen=ip_gen_delay_10_http_post_0), | |
# self.sep_cap(file="/trex/avl/delay_10_https_0.pcap", cps=535.55, ip_gen=ip_gen_delay_10_https_0), | |
# self.sep_cap(file="/trex/avl/http_manual_02.pcap_c.pcap", cps=62.48, ip_gen=ip_gen_delay_10_http_browsing_0), | |
# self.sep_cap(file="/trex/avl/delay_10_exchange_0.pcap", cps=624.81, ip_gen=ip_gen_delay_10_exchange_0), | |
# self.sep_cap(file="/trex/avl/delay_10_mail_pop_1.pcap", cps=24.1, ip_gen=ip_gen_delay_10_mail_pop_1), | |
# self.sep_cap(file="/trex/avl/delay_10_rtp_160k_0.pcap", cps=1.34, ip_gen=ip_gen_rtsp_rtp), | |
# self.sep_cap(file="/trex/avl/delay_10_rtp_160k_1.pcap", cps=1.34, ip_gen=ip_gen_rtsp_rtp), | |
# self.sep_cap(file="/trex/avl/delay_10_rtp_250k_0_0.pcap", cps=2.68, ip_gen=ip_gen_rtsp_rtp), | |
# self.sep_cap(file="/trex/avl/delay_10_rtp_250k_1_0.pcap", cps=2.68, ip_gen=ip_gen_rtsp_rtp), | |
# self.sep_cap(file="/trex/avl/delay_10_smtp_2.pcap", cps=25, ip_gen=ip_gen_delay_10_smtp_2), | |
# self.sep_cap(file="/trex/avl/delay_10_video_call_0.pcap", cps=5.36, ip_gen=ip_gen_rtsp_rtp), | |
# self.sep_cap(file="/trex/avl/delay_10_video_call_rtp_0.pcap", cps=59.8, ip_gen=ip_gen_sip_rtp), | |
# self.sep_cap(file="/trex/avl/delay_10_citrix_0.pcap", cps=66.94, ip_gen=ip_gen_delay_10_citrix_0), | |
# self.sep_cap(file="/trex/avl/delay_10_dns_0.pcap", cps=285.63, ip_gen=ip_gen_delay_10_dns_0), | |
# self.sep_cap(file="/trex/avl/delay_10_sip_0.pcap", cps=59.8, ip_gen=ip_gen_sip_rtp), | |
# self.sep_cap(file="/trex/avl/delay_10_rtsp_0.pcap", cps=4.02, ip_gen=ip_gen_rtsp_rtp), | |
profile = ASTFProfile(default_ip_gen=ip_gen, | |
default_c_glob_info=c_glob_info, | |
default_s_glob_info=s_glob_info, | |
cap_list = self.all_cap_info, | |
) | |
return profile | |
def get_profile(self, tunables, **kwargs): | |
parser = argparse.ArgumentParser(description='Argparser for {}'.format(os.path.basename(__file__)), | |
formatter_class=argparse.RawTextHelpFormatter) | |
parser.add_argument('--tcp_ka', | |
type=int, | |
default=None, | |
help="The tcp keepalive in msec.\n" | |
"The highest value is 65533") | |
parser.add_argument('--s_delay', | |
type=int, | |
default=None, | |
help='delay for server, in usec') | |
parser.add_argument('--traffic_per', | |
type=float, | |
default=None, | |
help='how much of the traffic will have no delay, should be in range: [0, 1]') | |
parser.add_argument('--port', | |
type=int, | |
default=1024, | |
help='starting port, inc by 1 for each capinfo') | |
args = parser.parse_args(tunables) | |
ka = args.tcp_ka | |
s_delay = args.s_delay | |
traffic_per = args.traffic_per | |
port = args.port | |
if s_delay is not None: | |
assert s_delay > 0, 's_delay must be positive' | |
s_delay = int(s_delay) | |
d = random.randint(s_delay // 10, s_delay) | |
s_delay = ASTFCmdDelay(d) | |
new_ka = int((d / 1000) * 1.5) | |
self.ka = min(new_ka, 65533) # 65533 is max keepalive val | |
if ka is not None: | |
self.ka = int(ka) | |
if traffic_per is not None: | |
assert 0.0 <= traffic_per <= 1.0, 'traffic_per must be in range [0,1]' | |
traffic_per = float(traffic_per) | |
if port is not None: | |
self.p = port | |
self.s_delay = s_delay | |
self.traffic_per = traffic_per | |
return self.create_profile() | |
def register(): | |
return Prof1() | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
------------------- Start of thread 0 vpp_main ------------------- | |
Packet 1 | |
00:06:38:444708: memif-input | |
memif: hw_if_index 2 next-index 4 | |
slot: ring 0 | |
00:06:38:444750: ethernet-input | |
frame: flags 0x1, hw-if-index 2, sw-if-index 2 | |
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60 | |
00:06:38:444771: ip4-input | |
TCP: 48.1.0.142 -> 16.0.0.142 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4ff dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 5405 | |
seq. 0x6736141c ack 0x337deac0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x0eca | |
00:06:38:444787: error-drop | |
rx:memif0/1 | |
00:06:38:444811: drop | |
ip4-input: ip4 length > l2 length | |
Packet 2 | |
00:06:38:444708: memif-input | |
memif: hw_if_index 2 next-index 4 | |
slot: ring 0 | |
00:06:38:444750: ethernet-input | |
frame: flags 0x1, hw-if-index 2, sw-if-index 2 | |
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60 | |
00:06:38:444771: ip4-input | |
TCP: 48.1.0.142 -> 16.0.0.142 | |
tos 0x00, ttl 127, length 64, checksum 0xba9b dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 5405 | |
seq. 0x673619c4 ack 0x337deac0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x5100 | |
00:06:38:444798: ip4-lookup | |
fib 0 dpo-idx 17 flow hash: 0x00000000 | |
TCP: 48.1.0.142 -> 16.0.0.142 | |
tos 0x00, ttl 127, length 64, checksum 0xba9b dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 5405 | |
seq. 0x673619c4 ack 0x337deac0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x5100 | |
00:06:38:444816: ip4-load-balance | |
fib 0 dpo-idx 4 flow hash: 0x00000000 | |
TCP: 48.1.0.142 -> 16.0.0.142 | |
tos 0x00, ttl 127, length 64, checksum 0xba9b dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 5405 | |
seq. 0x673619c4 ack 0x337deac0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x5100 | |
00:06:38:444820: ip4-rewrite | |
tx_sw_if_index 1 dpo-idx 4 : ipv4 via 10.0.0.2 memif0/0: mtu:9000 next:3 02fea03b315402fe68ed7efc0800 flow hash: 0x00000000 | |
00000000: 02fea03b315402fe68ed7efc080045000040000040007e06bb9b3001008e1000 | |
00000020: 008e0400151d673619c4337deac080108000510000000101080a643c | |
00:06:38:444827: memif0/0-output | |
memif0/0 | |
IP4: 02:fe:68:ed:7e:fc -> 02:fe:a0:3b:31:54 | |
TCP: 48.1.0.142 -> 16.0.0.142 | |
tos 0x00, ttl 126, length 64, checksum 0xbb9b dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 5405 | |
seq. 0x673619c4 ack 0x337deac0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x5100 | |
Packet 3 | |
00:06:38:445734: memif-input | |
memif: hw_if_index 1 next-index 4 | |
slot: ring 0 | |
00:06:38:445741: ethernet-input | |
frame: flags 0x1, hw-if-index 1, sw-if-index 1 | |
IP4: 8e:55:15:1a:49:90 -> 00:00:00:01:00:00 | |
00:06:38:445745: ip4-input | |
TCP: 16.0.0.142 -> 48.1.0.142 | |
tos 0x00, ttl 127, length 52, checksum 0xbaa7 dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 5405 -> 1024 | |
seq. 0x337deac0 ack 0x6736141c | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x53b1 | |
00:06:38:445748: ip4-lookup | |
fib 0 dpo-idx 18 flow hash: 0x00000000 | |
TCP: 16.0.0.142 -> 48.1.0.142 | |
tos 0x00, ttl 127, length 52, checksum 0xbaa7 dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 5405 -> 1024 | |
seq. 0x337deac0 ack 0x6736141c | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x53b1 | |
00:06:38:445752: ip4-load-balance | |
fib 0 dpo-idx 5 flow hash: 0x00000000 | |
TCP: 16.0.0.142 -> 48.1.0.142 | |
tos 0x00, ttl 127, length 52, checksum 0xbaa7 dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 5405 -> 1024 | |
seq. 0x337deac0 ack 0x6736141c | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x53b1 | |
00:06:38:445754: ip4-rewrite | |
tx_sw_if_index 2 dpo-idx 5 : ipv4 via 10.0.1.2 memif0/1: mtu:9000 next:4 02fea03b325502feac275b600800 flow hash: 0x00000000 | |
00000000: 02fea03b325502feac275b60080045000034000040007e06bba71000008e3001 | |
00000020: 008e151d0400337deac06736141c8010800053b100000101080a6b8b | |
00:06:38:445756: memif0/1-output | |
memif0/1 | |
IP4: 02:fe:ac:27:5b:60 -> 02:fe:a0:3b:32:55 | |
TCP: 16.0.0.142 -> 48.1.0.142 | |
tos 0x00, ttl 126, length 52, checksum 0xbba7 dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 5405 -> 1024 | |
seq. 0x337deac0 ack 0x6736141c | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x53b1 | |
Packet 4 | |
00:06:38:472704: memif-input | |
memif: hw_if_index 1 next-index 4 | |
slot: ring 0 | |
00:06:38:472716: ethernet-input | |
frame: flags 0x1, hw-if-index 1, sw-if-index 1 | |
IP4: 8e:55:15:1a:49:90 -> 00:00:00:01:00:00 | |
00:06:38:472723: ip4-input | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 127, length 60, checksum 0xba7f dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b75c6 ack 0x00000000 | |
flags 0x02 SYN, tcp header: 40 bytes | |
window 32768, checksum 0xd5a9 | |
00:06:38:472727: ip4-lookup | |
fib 0 dpo-idx 18 flow hash: 0x00000000 | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 127, length 60, checksum 0xba7f dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b75c6 ack 0x00000000 | |
flags 0x02 SYN, tcp header: 40 bytes | |
window 32768, checksum 0xd5a9 | |
00:06:38:472732: ip4-load-balance | |
fib 0 dpo-idx 5 flow hash: 0x00000000 | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 127, length 60, checksum 0xba7f dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b75c6 ack 0x00000000 | |
flags 0x02 SYN, tcp header: 40 bytes | |
window 32768, checksum 0xd5a9 | |
00:06:38:472735: ip4-rewrite | |
tx_sw_if_index 2 dpo-idx 5 : ipv4 via 10.0.1.2 memif0/1: mtu:9000 next:4 02fea03b325502feac275b600800 flow hash: 0x00000000 | |
00000000: 02fea03b325502feac275b6008004500003c000040007e06bb7f1000009e3001 | |
00000020: 009e54ed0400339b75c600000000a0028000d5a90000020405b40103 | |
00:06:38:472737: memif0/1-output | |
memif0/1 | |
IP4: 02:fe:ac:27:5b:60 -> 02:fe:a0:3b:32:55 | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 126, length 60, checksum 0xbb7f dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b75c6 ack 0x00000000 | |
flags 0x02 SYN, tcp header: 40 bytes | |
window 32768, checksum 0xd5a9 | |
Packet 5 | |
00:06:38:473693: memif-input | |
memif: hw_if_index 2 next-index 4 | |
slot: ring 0 | |
00:06:38:473699: ethernet-input | |
frame: flags 0x1, hw-if-index 2, sw-if-index 2 | |
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60 | |
00:06:38:473703: ip4-input | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 60, checksum 0xba7f dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x67539a73 ack 0x339b75c7 | |
flags 0x12 SYN ACK, tcp header: 40 bytes | |
window 32768, checksum 0xd64b | |
00:06:38:473706: ip4-lookup | |
fib 0 dpo-idx 17 flow hash: 0x00000000 | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 60, checksum 0xba7f dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x67539a73 ack 0x339b75c7 | |
flags 0x12 SYN ACK, tcp header: 40 bytes | |
window 32768, checksum 0xd64b | |
00:06:38:473709: ip4-load-balance | |
fib 0 dpo-idx 4 flow hash: 0x00000000 | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 60, checksum 0xba7f dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x67539a73 ack 0x339b75c7 | |
flags 0x12 SYN ACK, tcp header: 40 bytes | |
window 32768, checksum 0xd64b | |
00:06:38:473711: ip4-rewrite | |
tx_sw_if_index 1 dpo-idx 4 : ipv4 via 10.0.0.2 memif0/0: mtu:9000 next:3 02fea03b315402fe68ed7efc0800 flow hash: 0x00000000 | |
00000000: 02fea03b315402fe68ed7efc08004500003c000040007e06bb7f3001009e1000 | |
00000020: 009e040054ed67539a73339b75c7a0128000d64b0000020405b40103 | |
00:06:38:473713: memif0/0-output | |
memif0/0 | |
IP4: 02:fe:68:ed:7e:fc -> 02:fe:a0:3b:31:54 | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 126, length 60, checksum 0xbb7f dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x67539a73 ack 0x339b75c7 | |
flags 0x12 SYN ACK, tcp header: 40 bytes | |
window 32768, checksum 0xd64b | |
Packet 6 | |
00:06:38:474713: memif-input | |
memif: hw_if_index 1 next-index 4 | |
slot: ring 0 | |
00:06:38:474721: ethernet-input | |
frame: flags 0x1, hw-if-index 1, sw-if-index 1 | |
IP4: 8e:55:15:1a:49:90 -> 00:00:00:01:00:00 | |
00:06:38:474724: ip4-input | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 127, length 301, checksum 0xb98e dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b75c7 ack 0x67539a74 | |
flags 0x18 PSH ACK, tcp header: 32 bytes | |
window 32768, checksum 0x5499 | |
00:06:38:474727: ip4-lookup | |
fib 0 dpo-idx 18 flow hash: 0x00000000 | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 127, length 301, checksum 0xb98e dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b75c7 ack 0x67539a74 | |
flags 0x18 PSH ACK, tcp header: 32 bytes | |
window 32768, checksum 0x5499 | |
00:06:38:474730: ip4-load-balance | |
fib 0 dpo-idx 5 flow hash: 0x00000000 | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 127, length 301, checksum 0xb98e dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b75c7 ack 0x67539a74 | |
flags 0x18 PSH ACK, tcp header: 32 bytes | |
window 32768, checksum 0x5499 | |
00:06:38:474732: ip4-rewrite | |
tx_sw_if_index 2 dpo-idx 5 : ipv4 via 10.0.1.2 memif0/1: mtu:9000 next:4 02fea03b325502feac275b600800 flow hash: 0x00000000 | |
00000000: 02fea03b325502feac275b6008004500012d000040007e06ba8e1000009e3001 | |
00000020: 009e54ed0400339b75c767539a7480188000549900000101080a6b8b | |
00:06:38:474734: memif0/1-output | |
memif0/1 | |
IP4: 02:fe:ac:27:5b:60 -> 02:fe:a0:3b:32:55 | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 126, length 301, checksum 0xba8e dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b75c7 ack 0x67539a74 | |
flags 0x18 PSH ACK, tcp header: 32 bytes | |
window 32768, checksum 0x5499 | |
Packet 7 | |
00:06:38:475725: memif-input | |
memif: hw_if_index 2 next-index 4 | |
slot: ring 0 | |
00:06:38:475763: ethernet-input | |
frame: flags 0x1, hw-if-index 2, sw-if-index 2 | |
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60 | |
00:06:38:475778: ip4-input | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x67539a74 ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xc4c2 | |
00:06:38:475795: ip4-lookup | |
fib 0 dpo-idx 17 flow hash: 0x00000000 | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x67539a74 ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xc4c2 | |
00:06:38:475814: ip4-load-balance | |
fib 0 dpo-idx 4 flow hash: 0x00000000 | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x67539a74 ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xc4c2 | |
00:06:38:475828: ip4-rewrite | |
tx_sw_if_index 1 dpo-idx 4 : ipv4 via 10.0.0.2 memif0/0: mtu:9000 next:3 02fea03b315402fe68ed7efc0800 flow hash: 0x00000000 | |
00000000: 02fea03b315402fe68ed7efc0800450005dc000040007e06b5df3001009e1000 | |
00000020: 009e040054ed67539a74339b76c080108000c4c200000101080a643c | |
00:06:38:475832: memif0/0-output | |
memif0/0 | |
IP4: 02:fe:68:ed:7e:fc -> 02:fe:a0:3b:31:54 | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 126, length 1500, checksum 0xb5df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x67539a74 ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xc4c2 | |
Packet 8 | |
00:06:38:475725: memif-input | |
memif: hw_if_index 2 next-index 4 | |
slot: ring 0 | |
00:06:38:475763: ethernet-input | |
frame: flags 0x1, hw-if-index 2, sw-if-index 2 | |
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60 | |
00:06:38:475778: ip4-input | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x6753a01c ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xb687 | |
00:06:38:475803: error-drop | |
rx:memif0/1 | |
00:06:38:475821: drop | |
ip4-input: ip4 length > l2 length | |
Packet 9 | |
00:06:38:475725: memif-input | |
memif: hw_if_index 2 next-index 4 | |
slot: ring 0 | |
00:06:38:475763: ethernet-input | |
frame: flags 0x1, hw-if-index 2, sw-if-index 2 | |
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60 | |
00:06:38:475778: ip4-input | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x6753a5c4 ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xb0df | |
00:06:38:475803: error-drop | |
rx:memif0/1 | |
00:06:38:475821: drop | |
ip4-input: ip4 length > l2 length | |
Packet 10 | |
00:06:38:475725: memif-input | |
memif: hw_if_index 2 next-index 4 | |
slot: ring 0 | |
00:06:38:475763: ethernet-input | |
frame: flags 0x1, hw-if-index 2, sw-if-index 2 | |
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60 | |
00:06:38:475778: ip4-input | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x6753ab6c ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xab37 | |
00:06:38:475795: ip4-lookup | |
fib 0 dpo-idx 17 flow hash: 0x00000000 | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x6753ab6c ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xab37 | |
00:06:38:475814: ip4-load-balance | |
fib 0 dpo-idx 4 flow hash: 0x00000000 | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x6753ab6c ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xab37 | |
00:06:38:475828: ip4-rewrite | |
tx_sw_if_index 1 dpo-idx 4 : ipv4 via 10.0.0.2 memif0/0: mtu:9000 next:3 02fea03b315402fe68ed7efc0800 flow hash: 0x00000000 | |
00000000: 02fea03b315402fe68ed7efc0800450005dc000040007e06b5df3001009e1000 | |
00000020: 009e040054ed6753ab6c339b76c080108000ab3700000101080a643c | |
00:06:38:475832: memif0/0-output | |
memif0/0 | |
IP4: 02:fe:68:ed:7e:fc -> 02:fe:a0:3b:31:54 | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 126, length 1500, checksum 0xb5df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x6753ab6c ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xab37 | |
Packet 11 | |
00:06:38:475725: memif-input | |
memif: hw_if_index 2 next-index 4 | |
slot: ring 0 | |
00:06:38:475763: ethernet-input | |
frame: flags 0x1, hw-if-index 2, sw-if-index 2 | |
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60 | |
00:06:38:475778: ip4-input | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x6753b114 ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xa58f | |
00:06:38:475803: error-drop | |
rx:memif0/1 | |
00:06:38:475821: drop | |
ip4-input: ip4 length > l2 length | |
Packet 12 | |
00:06:38:475725: memif-input | |
memif: hw_if_index 2 next-index 4 | |
slot: ring 0 | |
00:06:38:475763: ethernet-input | |
frame: flags 0x1, hw-if-index 2, sw-if-index 2 | |
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60 | |
00:06:38:475778: ip4-input | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x6753b6bc ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x9fe7 | |
00:06:38:475803: error-drop | |
rx:memif0/1 | |
00:06:38:475821: drop | |
ip4-input: ip4 length > l2 length | |
Packet 13 | |
00:06:38:475725: memif-input | |
memif: hw_if_index 2 next-index 4 | |
slot: ring 0 | |
00:06:38:475763: ethernet-input | |
frame: flags 0x1, hw-if-index 2, sw-if-index 2 | |
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60 | |
00:06:38:475778: ip4-input | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x6753bc64 ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x9a3f | |
00:06:38:475795: ip4-lookup | |
fib 0 dpo-idx 17 flow hash: 0x00000000 | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x6753bc64 ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x9a3f | |
00:06:38:475814: ip4-load-balance | |
fib 0 dpo-idx 4 flow hash: 0x00000000 | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x6753bc64 ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x9a3f | |
00:06:38:475828: ip4-rewrite | |
tx_sw_if_index 1 dpo-idx 4 : ipv4 via 10.0.0.2 memif0/0: mtu:9000 next:3 02fea03b315402fe68ed7efc0800 flow hash: 0x00000000 | |
00000000: 02fea03b315402fe68ed7efc0800450005dc000040007e06b5df3001009e1000 | |
00000020: 009e040054ed6753bc64339b76c0801080009a3f00000101080a643c | |
00:06:38:475832: memif0/0-output | |
memif0/0 | |
IP4: 02:fe:68:ed:7e:fc -> 02:fe:a0:3b:31:54 | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 126, length 1500, checksum 0xb5df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x6753bc64 ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x9a3f | |
Packet 14 | |
00:06:38:475725: memif-input | |
memif: hw_if_index 2 next-index 4 | |
slot: ring 0 | |
00:06:38:475763: ethernet-input | |
frame: flags 0x1, hw-if-index 2, sw-if-index 2 | |
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60 | |
00:06:38:475778: ip4-input | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x6753c20c ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x9497 | |
00:06:38:475803: error-drop | |
rx:memif0/1 | |
00:06:38:475821: drop | |
ip4-input: ip4 length > l2 length | |
Packet 15 | |
00:06:38:475725: memif-input | |
memif: hw_if_index 2 next-index 4 | |
slot: ring 0 | |
00:06:38:475763: ethernet-input | |
frame: flags 0x1, hw-if-index 2, sw-if-index 2 | |
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60 | |
00:06:38:475778: ip4-input | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x6753c7b4 ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x8eef | |
00:06:38:475803: error-drop | |
rx:memif0/1 | |
00:06:38:475821: drop | |
ip4-input: ip4 length > l2 length | |
Packet 16 | |
00:06:38:475725: memif-input | |
memif: hw_if_index 2 next-index 4 | |
slot: ring 0 | |
00:06:38:475763: ethernet-input | |
frame: flags 0x1, hw-if-index 2, sw-if-index 2 | |
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60 | |
00:06:38:475778: ip4-input | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x6753cd5c ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x8947 | |
00:06:38:475803: error-drop | |
rx:memif0/1 | |
00:06:38:475821: drop | |
ip4-input: ip4 length > l2 length | |
Packet 17 | |
00:06:38:475725: memif-input | |
memif: hw_if_index 2 next-index 4 | |
slot: ring 0 | |
00:06:38:475763: ethernet-input | |
frame: flags 0x1, hw-if-index 2, sw-if-index 2 | |
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60 | |
00:06:38:475778: ip4-input | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x6753d304 ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x839f | |
00:06:38:475795: ip4-lookup | |
fib 0 dpo-idx 17 flow hash: 0x00000000 | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x6753d304 ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x839f | |
00:06:38:475814: ip4-load-balance | |
fib 0 dpo-idx 4 flow hash: 0x00000000 | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x6753d304 ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x839f | |
00:06:38:475828: ip4-rewrite | |
tx_sw_if_index 1 dpo-idx 4 : ipv4 via 10.0.0.2 memif0/0: mtu:9000 next:3 02fea03b315402fe68ed7efc0800 flow hash: 0x00000000 | |
00000000: 02fea03b315402fe68ed7efc0800450005dc000040007e06b5df3001009e1000 | |
00000020: 009e040054ed6753d304339b76c080108000839f00000101080a643c | |
00:06:38:475832: memif0/0-output | |
memif0/0 | |
IP4: 02:fe:68:ed:7e:fc -> 02:fe:a0:3b:31:54 | |
TCP: 48.1.0.158 -> 16.0.0.158 | |
tos 0x00, ttl 126, length 1500, checksum 0xb5df dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 1024 -> 21741 | |
seq. 0x6753d304 ack 0x339b76c0 | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0x839f | |
Packet 18 | |
00:06:38:476702: memif-input | |
memif: hw_if_index 1 next-index 4 | |
slot: ring 0 | |
00:06:38:476718: ethernet-input | |
frame: flags 0x1, hw-if-index 1, sw-if-index 1 | |
IP4: 8e:55:15:1a:49:90 -> 00:00:00:01:00:00 | |
00:06:38:476729: ip4-input | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 127, length 52, checksum 0xba87 dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b76c0 ack 0x6753a01c | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xfb6e | |
00:06:38:476738: ip4-lookup | |
fib 0 dpo-idx 18 flow hash: 0x00000000 | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 127, length 52, checksum 0xba87 dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b76c0 ack 0x6753a01c | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xfb6e | |
00:06:38:476748: ip4-load-balance | |
fib 0 dpo-idx 5 flow hash: 0x00000000 | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 127, length 52, checksum 0xba87 dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b76c0 ack 0x6753a01c | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xfb6e | |
00:06:38:476754: ip4-rewrite | |
tx_sw_if_index 2 dpo-idx 5 : ipv4 via 10.0.1.2 memif0/1: mtu:9000 next:4 02fea03b325502feac275b600800 flow hash: 0x00000000 | |
00000000: 02fea03b325502feac275b60080045000034000040007e06bb871000009e3001 | |
00000020: 009e54ed0400339b76c06753a01c80108000fb6e00000101080a6b8b | |
00:06:38:476757: memif0/1-output | |
memif0/1 | |
IP4: 02:fe:ac:27:5b:60 -> 02:fe:a0:3b:32:55 | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 126, length 52, checksum 0xbb87 dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b76c0 ack 0x6753a01c | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xfb6e | |
Packet 19 | |
00:06:38:476702: memif-input | |
memif: hw_if_index 1 next-index 4 | |
slot: ring 0 | |
00:06:38:476718: ethernet-input | |
frame: flags 0x1, hw-if-index 1, sw-if-index 1 | |
IP4: 8e:55:15:1a:49:90 -> 00:00:00:01:00:00 | |
00:06:38:476729: ip4-input | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 127, length 52, checksum 0xba87 dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b76c0 ack 0x6753a01c | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xfb6e | |
00:06:38:476738: ip4-lookup | |
fib 0 dpo-idx 18 flow hash: 0x00000000 | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 127, length 52, checksum 0xba87 dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b76c0 ack 0x6753a01c | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xfb6e | |
00:06:38:476748: ip4-load-balance | |
fib 0 dpo-idx 5 flow hash: 0x00000000 | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 127, length 52, checksum 0xba87 dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b76c0 ack 0x6753a01c | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xfb6e | |
00:06:38:476754: ip4-rewrite | |
tx_sw_if_index 2 dpo-idx 5 : ipv4 via 10.0.1.2 memif0/1: mtu:9000 next:4 02fea03b325502feac275b600800 flow hash: 0x00000000 | |
00000000: 02fea03b325502feac275b60080045000034000040007e06bb871000009e3001 | |
00000020: 009e54ed0400339b76c06753a01c80108000fb6e00000101080a6b8b | |
00:06:38:476757: memif0/1-output | |
memif0/1 | |
IP4: 02:fe:ac:27:5b:60 -> 02:fe:a0:3b:32:55 | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 126, length 52, checksum 0xbb87 dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b76c0 ack 0x6753a01c | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xfb6e | |
Packet 20 | |
00:06:38:476702: memif-input | |
memif: hw_if_index 1 next-index 4 | |
slot: ring 0 | |
00:06:38:476718: ethernet-input | |
frame: flags 0x1, hw-if-index 1, sw-if-index 1 | |
IP4: 8e:55:15:1a:49:90 -> 00:00:00:01:00:00 | |
00:06:38:476729: ip4-input | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 127, length 52, checksum 0xba87 dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b76c0 ack 0x6753a01c | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xfb6e | |
00:06:38:476738: ip4-lookup | |
fib 0 dpo-idx 18 flow hash: 0x00000000 | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 127, length 52, checksum 0xba87 dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b76c0 ack 0x6753a01c | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xfb6e | |
00:06:38:476748: ip4-load-balance | |
fib 0 dpo-idx 5 flow hash: 0x00000000 | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 127, length 52, checksum 0xba87 dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b76c0 ack 0x6753a01c | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xfb6e | |
00:06:38:476754: ip4-rewrite | |
tx_sw_if_index 2 dpo-idx 5 : ipv4 via 10.0.1.2 memif0/1: mtu:9000 next:4 02fea03b325502feac275b600800 flow hash: 0x00000000 | |
00000000: 02fea03b325502feac275b60080045000034000040007e06bb871000009e3001 | |
00000020: 009e54ed0400339b76c06753a01c80108000fb6e00000101080a6b8b | |
00:06:38:476757: memif0/1-output | |
memif0/1 | |
IP4: 02:fe:ac:27:5b:60 -> 02:fe:a0:3b:32:55 | |
TCP: 16.0.0.158 -> 48.1.0.158 | |
tos 0x00, ttl 126, length 52, checksum 0xbb87 dscp CS0 ecn NON_ECN | |
fragment id 0x0000, flags DONT_FRAGMENT | |
TCP: 21741 -> 1024 | |
seq. 0x339b76c0 ack 0x6753a01c | |
flags 0x10 ACK, tcp header: 32 bytes | |
window 32768, checksum 0xfb6e | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
./t-rex-64 --cfg /root/trex_cfg_memif_vpp.yaml --astf -f /root/emix2.py -m 1 -t traffic_per=0.9,s_delay=1000000000 --tso-disable --lro-disable --checksum-offload-disable |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
- port_limit: 2 | |
version: 2 | |
low_end: true | |
interfaces: ["--vdev=net_memif0,socket=/run/vpp/memif.sock,role=slave,id=0,socket-abstract=no", | |
"--vdev=net_memif1,socket=/run/vpp/memif.sock,role=slave,id=1,socket-abstract=no"] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
create interface memif id 0 master | |
set interface ip address memif0/0 10.0.0.1/24 | |
set interface state memif0/0 up | |
create interface memif id 1 master | |
set interface ip address memif0/1 10.0.1.1/24 | |
set interface state memif0/1 up | |
ip neighbor memif0/0 10.0.0.2 02:fe:a0:3b:31:54 | |
ip neighbor memif0/1 10.0.1.2 02:fe:a0:3b:32:55 | |
ip route add 16.0.0.0/8 via 10.0.0.2 | |
ip route add 48.0.0.0/8 via 10.0.1.2 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/usr/bin/vpp \ | |
unix { nodaemon cli-listen /run/vpp/cli.sock } \ | |
api-segment { prefix vpp1 } \ | |
cpu { workers 0 } \ | |
udp { mtu 12000 } \ | |
heapsize 6G |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment