Skip to content

Instantly share code, notes, and snippets.

@ivan4th
Last active April 21, 2021 13:57
Show Gist options
  • Save ivan4th/e0130dac619f91a6bb8e7987550c2466 to your computer and use it in GitHub Desktop.
Save ivan4th/e0130dac619f91a6bb8e7987550c2466 to your computer and use it in GitHub Desktop.
TRex ASTF+VPP memif issue
Frame 47: 3068 bytes on wire (24544 bits), 3068 bytes captured (24544 bits)
Encapsulation type: Vector Packet Processing graph dispatch trace (205)
Arrival Time: Jan 1, 1970 03:04:52.767839000 MSK
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 292.767839000 seconds
[Time delta from previous captured frame: 0.366594000 seconds]
[Time delta from previous displayed frame: 0.366594000 seconds]
[Time since reference or first frame: 0.710989000 seconds]
Frame Number: 47
Frame Length: 3068 bytes (24544 bits)
Capture Length: 3068 bytes (24544 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: vpp:vpp-metadata:vpp-opaque:vpp-opaque2:eth:ethertype:ip:tcp:data]
[Coloring Rule Name: Checksum Errors]
[Coloring Rule String [truncated]: eth.fcs.status=="Bad" || ip.checksum.status=="Bad" || tcp.checksum.status=="Bad" || udp.checksum.status=="Bad" || sctp.checksum.status=="Bad" || mstp.checksum.status=="Bad" || cdp.checksum.status=="Bad" |]
VPP Dispatch Trace
BufferIndex: 0x00097f9f
NodeName: ethernet-input
VPP Buffer Metadata
Metadata: flags:
Metadata: current_data: 0, current_length: 666
Metadata: current_config_index/punt_reason: 0, flow_id: 0, next_buffer: 0
Metadata: error: 0, ref_count: 1, buffer_pool_index: 0
Metadata: trace_handle: 0x0, len_not_first_buf: 0
Metadata:
VPP Buffer Opaque
Opaque: raw: 00000002 ffffffff 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Opaque: sw_if_index[VLIB_RX]: 2, sw_if_index[VLIB_TX]: -1
Opaque: L2 offset 0, L3 offset 0, L4 offset 0, feature arc index 0
Opaque: ip.adj_index[VLIB_RX]: 0, ip.adj_index[VLIB_TX]: 0
Opaque: ip.flow_hash: 0x0, ip.save_protocol: 0x0, ip.fib_index: 0
Opaque: ip.save_rewrite_length: 0, ip.rpf_id: 0
Opaque: ip.icmp.type: 0 ip.icmp.code: 0, ip.icmp.data: 0x0
Opaque: ip.reass.next_index: 0, ip.reass.estimated_mtu: 0
Opaque: ip.reass.error_next_index: 0, ip.reass.owner_thread_index: 0
Opaque: ip.reass.ip_proto: 0, ip.reass.l4_src_port: 0
Opaque: ip.reass.l4_dst_port: 0
Opaque: ip.reass.fragment_first: 0 ip.reass.fragment_last: 0
Opaque: ip.reass.range_first: 0 ip.reass.range_last: 0
Opaque: ip.reass.next_range_bi: 0x0, ip.reass.ip6_frag_hdr_offset: 0
Opaque: mpls.ttl: 0, mpls.exp: 0, mpls.first: 0, mpls.save_rewrite_length: 0, mpls.bier.n_bytes: 0
Opaque: mpls.mpls_hdr_length: 0
Opaque: l2.feature_bitmap: 00000000, l2.bd_index: 0, l2.l2fib_sn 0, l2.l2_len: 0, l2.shg: 0, l2.bd_age: 0
Opaque: l2.feature_bitmap_input: none configured, L2.feature_bitmap_output: none configured
Opaque: l2t.next_index: 0, l2t.session_index: 0
Opaque: l2_classify.table_index: 0, l2_classify.opaque_index: 0, l2_classify.hash: 0x0
Opaque: policer.index: 0
Opaque: ipsec.sad_index: 0, ipsec.protect_index
Opaque: map.mtu: 0
Opaque: map_t.map_domain_index: 0, map_t.v6.saddr: 0x0, map_t.v6.daddr: 0x0, map_t.v6.frag_offset: 0, map_t.v6.l4_offset: 0, map_t.v6.l4_protocol: 0, map.t.checksum_offset: 0
Opaque: map_t.v6.l4_protocol: 0, map_t.checksum_offset: 0, map_t.mtu: 0
Opaque: ip_frag.mtu: 0, ip_frag.next_index: 0, ip_frag.flags: 0x0
Opaque: cop.current_config_index: 0
Opaque: lisp.overlay_afi: 0
Opaque: tcp.connection_index: 0, tcp.seq_number: 0, tcp.next_node_opaque: 0 tcp.seq_end: 0, tcp.ack_number: 0, tcp.hdr_offset: 0, tcp.data_offset: 0
Opaque: tcp.data_len: 0, tcp.flags: 0x0
Opaque: snat.flags: 0x0
Opaque:
VPP Buffer Opaque2
Opaque2: raw: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Opaque2: qos.bits: 0, qos.source: 0
Opaque2: loop_counter: 0
Opaque2: gbp.flags: 0, gbp.sclass: 0
Opaque2: gso_size: 0, gso_l4_hdr_sz: 0
Opaque2: pg_replay_timestamp: 0
Opaque2: gtpu.teid: 0x00000000, gtpu.session_index: 0x0, gtpu.ext_hdr_len: 0, gtpu.data_offset: 0, gtpu.flags: 0x00, gtpu.is_reverse: 0, gtpu.pdr_idx: 0x0, gtpu.flow_id: 0x0
Opaque2:
Ethernet II, Src: 02:fe:a0:3b:32:55 (02:fe:a0:3b:32:55), Dst: 02:fe:ac:27:5b:60 (02:fe:ac:27:5b:60)
Destination: 02:fe:ac:27:5b:60 (02:fe:ac:27:5b:60)
Source: 02:fe:a0:3b:32:55 (02:fe:a0:3b:32:55)
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 48.1.0.6, Dst: 16.0.0.6
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 1500
[Expert Info (Error/Protocol): IPv4 total length exceeds packet length (652 bytes)]
Identification: 0x0000 (0)
Flags: 0x4000, Don't fragment
...0 0000 0000 0000 = Fragment offset: 0
Time to live: 127
Protocol: TCP (6)
Header checksum: 0xb60f [correct]
[Header checksum status: Good]
[Calculated Checksum: 0xb60f]
Source: 48.1.0.6
Destination: 16.0.0.6
Transmission Control Protocol, Src Port: 1024, Dst Port: 63157, Seq: 1, Ack: 1, Len: 600
Source Port: 1024
Destination Port: 63157
[Stream index: 2]
[TCP Segment Len: 600]
Sequence number: 1 (relative sequence number)
[Next sequence number: 601 (relative sequence number)]
Acknowledgment number: 1 (relative ack number)
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window size value: 32768
[Calculated window size: 32768]
[Window size scaling factor: -1 (unknown)]
Checksum: 0xa1cc incorrect, should be 0x7af2(maybe caused by "TCP checksum offload"?)
[Expert Info (Error/Checksum): Bad checksum [should be 0x7af2]]
[Checksum Status: Bad]
[Calculated Checksum: 0x7af2]
Urgent pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[SEQ/ACK analysis]
[Timestamps]
TCP payload (600 bytes)
Data (600 bytes)
Data: 2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a…
[Length: 600]
# This profile is using multiple pcaps in order to reach 1M active flows. We are using s_delay tunable in order to enlarge
# each flow and increment total active flows. In order to avoid keepalive errors we're setting keepalive to 1.5 times the s_delay.
# example start -f astf/emix2.py -m 30 -l 1000 -t traffic_per=0.9,s_delay=10000000
# will generate 30gbps with 90% of the traffic with no delay and 10% with delay of 10 sec betwean the packets
#
from trex.astf.api import *
import random
import argparse
MIN_CPS = 0.5
class Prof1():
def __init__(self):
self.p = 1024 # starting port
self.ka = None
self.all_cap_info = []
def sep_cap(self, file, cps, ip_gen=None):
if self.traffic_per is None or self.traffic_per == 1.0:
self.all_cap_info.append(ASTFCapInfo(file=file, cps=cps, ip_gen=ip_gen, port=self.p, s_delay=self.s_delay))
self.p += 1
else:
normal_cps = cps * self.traffic_per
delay_cps = max(cps * (1 - self.traffic_per), MIN_CPS)
normal_cap = ASTFCapInfo(file=file, cps=normal_cps, ip_gen=ip_gen, port=self.p)
delay_cap = ASTFCapInfo(file=file, cps=delay_cps, ip_gen=ip_gen, port=self.p + 1, s_delay=self.s_delay)
self.all_cap_info.extend([normal_cap, delay_cap])
self.p += 2
def create_profile(self):
# ip generator
ip_gen_c = ASTFIPGenDist(ip_range=["16.0.0.1", "16.0.1.255"], distribution="seq")
ip_gen_s = ASTFIPGenDist(ip_range=["48.0.0.1", "48.0.255.255"], distribution="seq")
ip_gen = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"),
dist_client=ip_gen_c,
dist_server=ip_gen_s)
ip_gen_s_delay_10_http_get_0 = ASTFIPGenDist(ip_range=["48.1.0.1", "48.1.2.44"], distribution="seq")
ip_gen_delay_10_http_get_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"),
dist_client=ip_gen_c,
dist_server=ip_gen_s_delay_10_http_get_0)
ip_gen_s_delay_10_http_post_0 = ASTFIPGenDist(ip_range=["48.2.0.1", "48.2.2.44"], distribution="seq")
ip_gen_delay_10_http_post_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"),
dist_client=ip_gen_c,
dist_server=ip_gen_s_delay_10_http_post_0)
ip_gen_s_delay_10_https_0 = ASTFIPGenDist(ip_range=["48.3.0.1", "48.3.0.180"], distribution="seq")
ip_gen_delay_10_https_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"),
dist_client=ip_gen_c,
dist_server=ip_gen_s_delay_10_https_0)
ip_gen_s_delay_10_http_browsing_0 = ASTFIPGenDist(ip_range=["48.4.0.1", "48.4.3.209"], distribution="seq")
ip_gen_delay_10_http_browsing_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"),
dist_client=ip_gen_c,
dist_server=ip_gen_s_delay_10_http_browsing_0)
ip_gen_s_delay_10_exchange_0 = ASTFIPGenDist(ip_range=["48.5.0.1", "48.5.1.93"], distribution="seq")
ip_gen_delay_10_exchange_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"),
dist_client=ip_gen_c,
dist_server=ip_gen_s_delay_10_exchange_0)
ip_gen_s_delay_10_mail_pop_0 = ASTFIPGenDist(ip_range=["48.6.0.1", "48.6.0.40"], distribution="seq")
ip_gen_delay_10_mail_pop_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"),
dist_client=ip_gen_c,
dist_server=ip_gen_s_delay_10_mail_pop_0)
ip_gen_s_delay_10_mail_pop_1 = ASTFIPGenDist(ip_range=["48.7.0.1", "48.7.0.40"], distribution="seq")
ip_gen_delay_10_mail_pop_1 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"),
dist_client=ip_gen_c,
dist_server=ip_gen_s_delay_10_mail_pop_1)
ip_gen_s_delay_10_mail_pop_2 = ASTFIPGenDist(ip_range=["48.8.0.1", "48.8.0.40"], distribution="seq")
ip_gen_delay_10_mail_pop_2 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"),
dist_client=ip_gen_c,
dist_server=ip_gen_s_delay_10_mail_pop_2)
ip_gen_s_delay_10_oracle_0 = ASTFIPGenDist(ip_range=["48.9.0.1", "48.9.0.109"], distribution="seq")
ip_gen_delay_10_oracle_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"),
dist_client=ip_gen_c,
dist_server=ip_gen_s_delay_10_oracle_0)
ip_gen_c_rtsp_rtp = ASTFIPGenDist(ip_range=["16.10.0.1", "16.10.1.255"], distribution="seq")
ip_gen_s_rtsp_rtp = ASTFIPGenDist(ip_range=["48.10.0.1", "48.10.1.255"], distribution="seq")
ip_gen_rtsp_rtp = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"),
dist_client=ip_gen_c_rtsp_rtp,
dist_server=ip_gen_s_rtsp_rtp)
ip_gen_s_delay_10_smtp_0 = ASTFIPGenDist(ip_range=["48.12.0.1", "48.12.0.40"], distribution="seq")
ip_gen_delay_10_smtp_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"),
dist_client=ip_gen_c,
dist_server=ip_gen_s_delay_10_smtp_0)
ip_gen_s_delay_10_smtp_1 = ASTFIPGenDist(ip_range=["48.13.0.1", "48.13.0.40"], distribution="seq")
ip_gen_delay_10_smtp_1 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"),
dist_client=ip_gen_c,
dist_server=ip_gen_s_delay_10_smtp_1)
ip_gen_s_delay_10_smtp_2 = ASTFIPGenDist(ip_range=["48.14.0.1", "48.14.0.40"], distribution="seq")
ip_gen_delay_10_smtp_2 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"),
dist_client=ip_gen_c,
dist_server=ip_gen_s_delay_10_smtp_2)
ip_gen_c_sip_rtp = ASTFIPGenDist(ip_range=["16.16.0.1", "16.16.1.255"], distribution="seq")
ip_gen_s_sip_rtp = ASTFIPGenDist(ip_range=["48.16.0.1", "48.16.1.255"], distribution="seq")
ip_gen_sip_rtp = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"),
dist_client=ip_gen_c_sip_rtp,
dist_server=ip_gen_s_sip_rtp)
ip_gen_s_delay_10_citrix_0 = ASTFIPGenDist(ip_range=["48.17.0.1", "48.17.0.60"], distribution="seq")
ip_gen_delay_10_citrix_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"),
dist_client=ip_gen_c,
dist_server=ip_gen_s_delay_10_citrix_0)
ip_gen_s_delay_10_dns_0 = ASTFIPGenDist(ip_range=["48.18.0.1", "48.18.10.158"], distribution="seq")
ip_gen_delay_10_dns_0 = ASTFIPGen(glob=ASTFIPGenGlobal(ip_offset="1.0.0.0"),
dist_client=ip_gen_c,
dist_server=ip_gen_s_delay_10_dns_0)
c_glob_info = ASTFGlobalInfo()
# c_glob_info.tcp.mss = 1000
s_glob_info = ASTFGlobalInfo()
# s_glob_info.tcp.mss = 1000
if self.ka is not None:
c_glob_info.tcp.keepinit = self.ka
c_glob_info.tcp.keepidle = self.ka
c_glob_info.tcp.keepintvl = self.ka
s_glob_info.tcp.keepinit = self.ka
s_glob_info.tcp.keepidle = self.ka
s_glob_info.tcp.keepintvl = self.ka
self.sep_cap(file="/trex/avl/http_manual_01.pcap_c.pcap", cps=1, ip_gen=ip_gen_delay_10_http_get_0),
# self.sep_cap(file="/trex/avl/http_manual_01.pcap_c.pcap", cps=120.5, ip_gen=ip_gen_delay_10_http_get_0),
# self.sep_cap(file="/trex/avl/delay_10_http_post_0.pcap", cps=120.5, ip_gen=ip_gen_delay_10_http_post_0),
# self.sep_cap(file="/trex/avl/delay_10_https_0.pcap", cps=535.55, ip_gen=ip_gen_delay_10_https_0),
# self.sep_cap(file="/trex/avl/http_manual_02.pcap_c.pcap", cps=62.48, ip_gen=ip_gen_delay_10_http_browsing_0),
# self.sep_cap(file="/trex/avl/delay_10_exchange_0.pcap", cps=624.81, ip_gen=ip_gen_delay_10_exchange_0),
# self.sep_cap(file="/trex/avl/delay_10_mail_pop_1.pcap", cps=24.1, ip_gen=ip_gen_delay_10_mail_pop_1),
# self.sep_cap(file="/trex/avl/delay_10_rtp_160k_0.pcap", cps=1.34, ip_gen=ip_gen_rtsp_rtp),
# self.sep_cap(file="/trex/avl/delay_10_rtp_160k_1.pcap", cps=1.34, ip_gen=ip_gen_rtsp_rtp),
# self.sep_cap(file="/trex/avl/delay_10_rtp_250k_0_0.pcap", cps=2.68, ip_gen=ip_gen_rtsp_rtp),
# self.sep_cap(file="/trex/avl/delay_10_rtp_250k_1_0.pcap", cps=2.68, ip_gen=ip_gen_rtsp_rtp),
# self.sep_cap(file="/trex/avl/delay_10_smtp_2.pcap", cps=25, ip_gen=ip_gen_delay_10_smtp_2),
# self.sep_cap(file="/trex/avl/delay_10_video_call_0.pcap", cps=5.36, ip_gen=ip_gen_rtsp_rtp),
# self.sep_cap(file="/trex/avl/delay_10_video_call_rtp_0.pcap", cps=59.8, ip_gen=ip_gen_sip_rtp),
# self.sep_cap(file="/trex/avl/delay_10_citrix_0.pcap", cps=66.94, ip_gen=ip_gen_delay_10_citrix_0),
# self.sep_cap(file="/trex/avl/delay_10_dns_0.pcap", cps=285.63, ip_gen=ip_gen_delay_10_dns_0),
# self.sep_cap(file="/trex/avl/delay_10_sip_0.pcap", cps=59.8, ip_gen=ip_gen_sip_rtp),
# self.sep_cap(file="/trex/avl/delay_10_rtsp_0.pcap", cps=4.02, ip_gen=ip_gen_rtsp_rtp),
profile = ASTFProfile(default_ip_gen=ip_gen,
default_c_glob_info=c_glob_info,
default_s_glob_info=s_glob_info,
cap_list = self.all_cap_info,
)
return profile
def get_profile(self, tunables, **kwargs):
parser = argparse.ArgumentParser(description='Argparser for {}'.format(os.path.basename(__file__)),
formatter_class=argparse.RawTextHelpFormatter)
parser.add_argument('--tcp_ka',
type=int,
default=None,
help="The tcp keepalive in msec.\n"
"The highest value is 65533")
parser.add_argument('--s_delay',
type=int,
default=None,
help='delay for server, in usec')
parser.add_argument('--traffic_per',
type=float,
default=None,
help='how much of the traffic will have no delay, should be in range: [0, 1]')
parser.add_argument('--port',
type=int,
default=1024,
help='starting port, inc by 1 for each capinfo')
args = parser.parse_args(tunables)
ka = args.tcp_ka
s_delay = args.s_delay
traffic_per = args.traffic_per
port = args.port
if s_delay is not None:
assert s_delay > 0, 's_delay must be positive'
s_delay = int(s_delay)
d = random.randint(s_delay // 10, s_delay)
s_delay = ASTFCmdDelay(d)
new_ka = int((d / 1000) * 1.5)
self.ka = min(new_ka, 65533) # 65533 is max keepalive val
if ka is not None:
self.ka = int(ka)
if traffic_per is not None:
assert 0.0 <= traffic_per <= 1.0, 'traffic_per must be in range [0,1]'
traffic_per = float(traffic_per)
if port is not None:
self.p = port
self.s_delay = s_delay
self.traffic_per = traffic_per
return self.create_profile()
def register():
return Prof1()
------------------- Start of thread 0 vpp_main -------------------
Packet 1
00:06:38:444708: memif-input
memif: hw_if_index 2 next-index 4
slot: ring 0
00:06:38:444750: ethernet-input
frame: flags 0x1, hw-if-index 2, sw-if-index 2
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60
00:06:38:444771: ip4-input
TCP: 48.1.0.142 -> 16.0.0.142
tos 0x00, ttl 127, length 1500, checksum 0xb4ff dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 5405
seq. 0x6736141c ack 0x337deac0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x0eca
00:06:38:444787: error-drop
rx:memif0/1
00:06:38:444811: drop
ip4-input: ip4 length > l2 length
Packet 2
00:06:38:444708: memif-input
memif: hw_if_index 2 next-index 4
slot: ring 0
00:06:38:444750: ethernet-input
frame: flags 0x1, hw-if-index 2, sw-if-index 2
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60
00:06:38:444771: ip4-input
TCP: 48.1.0.142 -> 16.0.0.142
tos 0x00, ttl 127, length 64, checksum 0xba9b dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 5405
seq. 0x673619c4 ack 0x337deac0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x5100
00:06:38:444798: ip4-lookup
fib 0 dpo-idx 17 flow hash: 0x00000000
TCP: 48.1.0.142 -> 16.0.0.142
tos 0x00, ttl 127, length 64, checksum 0xba9b dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 5405
seq. 0x673619c4 ack 0x337deac0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x5100
00:06:38:444816: ip4-load-balance
fib 0 dpo-idx 4 flow hash: 0x00000000
TCP: 48.1.0.142 -> 16.0.0.142
tos 0x00, ttl 127, length 64, checksum 0xba9b dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 5405
seq. 0x673619c4 ack 0x337deac0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x5100
00:06:38:444820: ip4-rewrite
tx_sw_if_index 1 dpo-idx 4 : ipv4 via 10.0.0.2 memif0/0: mtu:9000 next:3 02fea03b315402fe68ed7efc0800 flow hash: 0x00000000
00000000: 02fea03b315402fe68ed7efc080045000040000040007e06bb9b3001008e1000
00000020: 008e0400151d673619c4337deac080108000510000000101080a643c
00:06:38:444827: memif0/0-output
memif0/0
IP4: 02:fe:68:ed:7e:fc -> 02:fe:a0:3b:31:54
TCP: 48.1.0.142 -> 16.0.0.142
tos 0x00, ttl 126, length 64, checksum 0xbb9b dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 5405
seq. 0x673619c4 ack 0x337deac0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x5100
Packet 3
00:06:38:445734: memif-input
memif: hw_if_index 1 next-index 4
slot: ring 0
00:06:38:445741: ethernet-input
frame: flags 0x1, hw-if-index 1, sw-if-index 1
IP4: 8e:55:15:1a:49:90 -> 00:00:00:01:00:00
00:06:38:445745: ip4-input
TCP: 16.0.0.142 -> 48.1.0.142
tos 0x00, ttl 127, length 52, checksum 0xbaa7 dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 5405 -> 1024
seq. 0x337deac0 ack 0x6736141c
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x53b1
00:06:38:445748: ip4-lookup
fib 0 dpo-idx 18 flow hash: 0x00000000
TCP: 16.0.0.142 -> 48.1.0.142
tos 0x00, ttl 127, length 52, checksum 0xbaa7 dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 5405 -> 1024
seq. 0x337deac0 ack 0x6736141c
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x53b1
00:06:38:445752: ip4-load-balance
fib 0 dpo-idx 5 flow hash: 0x00000000
TCP: 16.0.0.142 -> 48.1.0.142
tos 0x00, ttl 127, length 52, checksum 0xbaa7 dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 5405 -> 1024
seq. 0x337deac0 ack 0x6736141c
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x53b1
00:06:38:445754: ip4-rewrite
tx_sw_if_index 2 dpo-idx 5 : ipv4 via 10.0.1.2 memif0/1: mtu:9000 next:4 02fea03b325502feac275b600800 flow hash: 0x00000000
00000000: 02fea03b325502feac275b60080045000034000040007e06bba71000008e3001
00000020: 008e151d0400337deac06736141c8010800053b100000101080a6b8b
00:06:38:445756: memif0/1-output
memif0/1
IP4: 02:fe:ac:27:5b:60 -> 02:fe:a0:3b:32:55
TCP: 16.0.0.142 -> 48.1.0.142
tos 0x00, ttl 126, length 52, checksum 0xbba7 dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 5405 -> 1024
seq. 0x337deac0 ack 0x6736141c
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x53b1
Packet 4
00:06:38:472704: memif-input
memif: hw_if_index 1 next-index 4
slot: ring 0
00:06:38:472716: ethernet-input
frame: flags 0x1, hw-if-index 1, sw-if-index 1
IP4: 8e:55:15:1a:49:90 -> 00:00:00:01:00:00
00:06:38:472723: ip4-input
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 127, length 60, checksum 0xba7f dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b75c6 ack 0x00000000
flags 0x02 SYN, tcp header: 40 bytes
window 32768, checksum 0xd5a9
00:06:38:472727: ip4-lookup
fib 0 dpo-idx 18 flow hash: 0x00000000
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 127, length 60, checksum 0xba7f dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b75c6 ack 0x00000000
flags 0x02 SYN, tcp header: 40 bytes
window 32768, checksum 0xd5a9
00:06:38:472732: ip4-load-balance
fib 0 dpo-idx 5 flow hash: 0x00000000
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 127, length 60, checksum 0xba7f dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b75c6 ack 0x00000000
flags 0x02 SYN, tcp header: 40 bytes
window 32768, checksum 0xd5a9
00:06:38:472735: ip4-rewrite
tx_sw_if_index 2 dpo-idx 5 : ipv4 via 10.0.1.2 memif0/1: mtu:9000 next:4 02fea03b325502feac275b600800 flow hash: 0x00000000
00000000: 02fea03b325502feac275b6008004500003c000040007e06bb7f1000009e3001
00000020: 009e54ed0400339b75c600000000a0028000d5a90000020405b40103
00:06:38:472737: memif0/1-output
memif0/1
IP4: 02:fe:ac:27:5b:60 -> 02:fe:a0:3b:32:55
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 126, length 60, checksum 0xbb7f dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b75c6 ack 0x00000000
flags 0x02 SYN, tcp header: 40 bytes
window 32768, checksum 0xd5a9
Packet 5
00:06:38:473693: memif-input
memif: hw_if_index 2 next-index 4
slot: ring 0
00:06:38:473699: ethernet-input
frame: flags 0x1, hw-if-index 2, sw-if-index 2
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60
00:06:38:473703: ip4-input
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 60, checksum 0xba7f dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x67539a73 ack 0x339b75c7
flags 0x12 SYN ACK, tcp header: 40 bytes
window 32768, checksum 0xd64b
00:06:38:473706: ip4-lookup
fib 0 dpo-idx 17 flow hash: 0x00000000
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 60, checksum 0xba7f dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x67539a73 ack 0x339b75c7
flags 0x12 SYN ACK, tcp header: 40 bytes
window 32768, checksum 0xd64b
00:06:38:473709: ip4-load-balance
fib 0 dpo-idx 4 flow hash: 0x00000000
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 60, checksum 0xba7f dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x67539a73 ack 0x339b75c7
flags 0x12 SYN ACK, tcp header: 40 bytes
window 32768, checksum 0xd64b
00:06:38:473711: ip4-rewrite
tx_sw_if_index 1 dpo-idx 4 : ipv4 via 10.0.0.2 memif0/0: mtu:9000 next:3 02fea03b315402fe68ed7efc0800 flow hash: 0x00000000
00000000: 02fea03b315402fe68ed7efc08004500003c000040007e06bb7f3001009e1000
00000020: 009e040054ed67539a73339b75c7a0128000d64b0000020405b40103
00:06:38:473713: memif0/0-output
memif0/0
IP4: 02:fe:68:ed:7e:fc -> 02:fe:a0:3b:31:54
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 126, length 60, checksum 0xbb7f dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x67539a73 ack 0x339b75c7
flags 0x12 SYN ACK, tcp header: 40 bytes
window 32768, checksum 0xd64b
Packet 6
00:06:38:474713: memif-input
memif: hw_if_index 1 next-index 4
slot: ring 0
00:06:38:474721: ethernet-input
frame: flags 0x1, hw-if-index 1, sw-if-index 1
IP4: 8e:55:15:1a:49:90 -> 00:00:00:01:00:00
00:06:38:474724: ip4-input
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 127, length 301, checksum 0xb98e dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b75c7 ack 0x67539a74
flags 0x18 PSH ACK, tcp header: 32 bytes
window 32768, checksum 0x5499
00:06:38:474727: ip4-lookup
fib 0 dpo-idx 18 flow hash: 0x00000000
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 127, length 301, checksum 0xb98e dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b75c7 ack 0x67539a74
flags 0x18 PSH ACK, tcp header: 32 bytes
window 32768, checksum 0x5499
00:06:38:474730: ip4-load-balance
fib 0 dpo-idx 5 flow hash: 0x00000000
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 127, length 301, checksum 0xb98e dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b75c7 ack 0x67539a74
flags 0x18 PSH ACK, tcp header: 32 bytes
window 32768, checksum 0x5499
00:06:38:474732: ip4-rewrite
tx_sw_if_index 2 dpo-idx 5 : ipv4 via 10.0.1.2 memif0/1: mtu:9000 next:4 02fea03b325502feac275b600800 flow hash: 0x00000000
00000000: 02fea03b325502feac275b6008004500012d000040007e06ba8e1000009e3001
00000020: 009e54ed0400339b75c767539a7480188000549900000101080a6b8b
00:06:38:474734: memif0/1-output
memif0/1
IP4: 02:fe:ac:27:5b:60 -> 02:fe:a0:3b:32:55
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 126, length 301, checksum 0xba8e dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b75c7 ack 0x67539a74
flags 0x18 PSH ACK, tcp header: 32 bytes
window 32768, checksum 0x5499
Packet 7
00:06:38:475725: memif-input
memif: hw_if_index 2 next-index 4
slot: ring 0
00:06:38:475763: ethernet-input
frame: flags 0x1, hw-if-index 2, sw-if-index 2
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60
00:06:38:475778: ip4-input
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x67539a74 ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xc4c2
00:06:38:475795: ip4-lookup
fib 0 dpo-idx 17 flow hash: 0x00000000
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x67539a74 ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xc4c2
00:06:38:475814: ip4-load-balance
fib 0 dpo-idx 4 flow hash: 0x00000000
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x67539a74 ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xc4c2
00:06:38:475828: ip4-rewrite
tx_sw_if_index 1 dpo-idx 4 : ipv4 via 10.0.0.2 memif0/0: mtu:9000 next:3 02fea03b315402fe68ed7efc0800 flow hash: 0x00000000
00000000: 02fea03b315402fe68ed7efc0800450005dc000040007e06b5df3001009e1000
00000020: 009e040054ed67539a74339b76c080108000c4c200000101080a643c
00:06:38:475832: memif0/0-output
memif0/0
IP4: 02:fe:68:ed:7e:fc -> 02:fe:a0:3b:31:54
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 126, length 1500, checksum 0xb5df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x67539a74 ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xc4c2
Packet 8
00:06:38:475725: memif-input
memif: hw_if_index 2 next-index 4
slot: ring 0
00:06:38:475763: ethernet-input
frame: flags 0x1, hw-if-index 2, sw-if-index 2
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60
00:06:38:475778: ip4-input
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x6753a01c ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xb687
00:06:38:475803: error-drop
rx:memif0/1
00:06:38:475821: drop
ip4-input: ip4 length > l2 length
Packet 9
00:06:38:475725: memif-input
memif: hw_if_index 2 next-index 4
slot: ring 0
00:06:38:475763: ethernet-input
frame: flags 0x1, hw-if-index 2, sw-if-index 2
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60
00:06:38:475778: ip4-input
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x6753a5c4 ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xb0df
00:06:38:475803: error-drop
rx:memif0/1
00:06:38:475821: drop
ip4-input: ip4 length > l2 length
Packet 10
00:06:38:475725: memif-input
memif: hw_if_index 2 next-index 4
slot: ring 0
00:06:38:475763: ethernet-input
frame: flags 0x1, hw-if-index 2, sw-if-index 2
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60
00:06:38:475778: ip4-input
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x6753ab6c ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xab37
00:06:38:475795: ip4-lookup
fib 0 dpo-idx 17 flow hash: 0x00000000
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x6753ab6c ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xab37
00:06:38:475814: ip4-load-balance
fib 0 dpo-idx 4 flow hash: 0x00000000
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x6753ab6c ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xab37
00:06:38:475828: ip4-rewrite
tx_sw_if_index 1 dpo-idx 4 : ipv4 via 10.0.0.2 memif0/0: mtu:9000 next:3 02fea03b315402fe68ed7efc0800 flow hash: 0x00000000
00000000: 02fea03b315402fe68ed7efc0800450005dc000040007e06b5df3001009e1000
00000020: 009e040054ed6753ab6c339b76c080108000ab3700000101080a643c
00:06:38:475832: memif0/0-output
memif0/0
IP4: 02:fe:68:ed:7e:fc -> 02:fe:a0:3b:31:54
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 126, length 1500, checksum 0xb5df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x6753ab6c ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xab37
Packet 11
00:06:38:475725: memif-input
memif: hw_if_index 2 next-index 4
slot: ring 0
00:06:38:475763: ethernet-input
frame: flags 0x1, hw-if-index 2, sw-if-index 2
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60
00:06:38:475778: ip4-input
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x6753b114 ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xa58f
00:06:38:475803: error-drop
rx:memif0/1
00:06:38:475821: drop
ip4-input: ip4 length > l2 length
Packet 12
00:06:38:475725: memif-input
memif: hw_if_index 2 next-index 4
slot: ring 0
00:06:38:475763: ethernet-input
frame: flags 0x1, hw-if-index 2, sw-if-index 2
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60
00:06:38:475778: ip4-input
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x6753b6bc ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x9fe7
00:06:38:475803: error-drop
rx:memif0/1
00:06:38:475821: drop
ip4-input: ip4 length > l2 length
Packet 13
00:06:38:475725: memif-input
memif: hw_if_index 2 next-index 4
slot: ring 0
00:06:38:475763: ethernet-input
frame: flags 0x1, hw-if-index 2, sw-if-index 2
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60
00:06:38:475778: ip4-input
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x6753bc64 ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x9a3f
00:06:38:475795: ip4-lookup
fib 0 dpo-idx 17 flow hash: 0x00000000
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x6753bc64 ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x9a3f
00:06:38:475814: ip4-load-balance
fib 0 dpo-idx 4 flow hash: 0x00000000
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x6753bc64 ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x9a3f
00:06:38:475828: ip4-rewrite
tx_sw_if_index 1 dpo-idx 4 : ipv4 via 10.0.0.2 memif0/0: mtu:9000 next:3 02fea03b315402fe68ed7efc0800 flow hash: 0x00000000
00000000: 02fea03b315402fe68ed7efc0800450005dc000040007e06b5df3001009e1000
00000020: 009e040054ed6753bc64339b76c0801080009a3f00000101080a643c
00:06:38:475832: memif0/0-output
memif0/0
IP4: 02:fe:68:ed:7e:fc -> 02:fe:a0:3b:31:54
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 126, length 1500, checksum 0xb5df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x6753bc64 ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x9a3f
Packet 14
00:06:38:475725: memif-input
memif: hw_if_index 2 next-index 4
slot: ring 0
00:06:38:475763: ethernet-input
frame: flags 0x1, hw-if-index 2, sw-if-index 2
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60
00:06:38:475778: ip4-input
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x6753c20c ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x9497
00:06:38:475803: error-drop
rx:memif0/1
00:06:38:475821: drop
ip4-input: ip4 length > l2 length
Packet 15
00:06:38:475725: memif-input
memif: hw_if_index 2 next-index 4
slot: ring 0
00:06:38:475763: ethernet-input
frame: flags 0x1, hw-if-index 2, sw-if-index 2
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60
00:06:38:475778: ip4-input
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x6753c7b4 ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x8eef
00:06:38:475803: error-drop
rx:memif0/1
00:06:38:475821: drop
ip4-input: ip4 length > l2 length
Packet 16
00:06:38:475725: memif-input
memif: hw_if_index 2 next-index 4
slot: ring 0
00:06:38:475763: ethernet-input
frame: flags 0x1, hw-if-index 2, sw-if-index 2
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60
00:06:38:475778: ip4-input
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x6753cd5c ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x8947
00:06:38:475803: error-drop
rx:memif0/1
00:06:38:475821: drop
ip4-input: ip4 length > l2 length
Packet 17
00:06:38:475725: memif-input
memif: hw_if_index 2 next-index 4
slot: ring 0
00:06:38:475763: ethernet-input
frame: flags 0x1, hw-if-index 2, sw-if-index 2
IP4: 02:fe:a0:3b:32:55 -> 02:fe:ac:27:5b:60
00:06:38:475778: ip4-input
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x6753d304 ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x839f
00:06:38:475795: ip4-lookup
fib 0 dpo-idx 17 flow hash: 0x00000000
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x6753d304 ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x839f
00:06:38:475814: ip4-load-balance
fib 0 dpo-idx 4 flow hash: 0x00000000
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 127, length 1500, checksum 0xb4df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x6753d304 ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x839f
00:06:38:475828: ip4-rewrite
tx_sw_if_index 1 dpo-idx 4 : ipv4 via 10.0.0.2 memif0/0: mtu:9000 next:3 02fea03b315402fe68ed7efc0800 flow hash: 0x00000000
00000000: 02fea03b315402fe68ed7efc0800450005dc000040007e06b5df3001009e1000
00000020: 009e040054ed6753d304339b76c080108000839f00000101080a643c
00:06:38:475832: memif0/0-output
memif0/0
IP4: 02:fe:68:ed:7e:fc -> 02:fe:a0:3b:31:54
TCP: 48.1.0.158 -> 16.0.0.158
tos 0x00, ttl 126, length 1500, checksum 0xb5df dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 1024 -> 21741
seq. 0x6753d304 ack 0x339b76c0
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0x839f
Packet 18
00:06:38:476702: memif-input
memif: hw_if_index 1 next-index 4
slot: ring 0
00:06:38:476718: ethernet-input
frame: flags 0x1, hw-if-index 1, sw-if-index 1
IP4: 8e:55:15:1a:49:90 -> 00:00:00:01:00:00
00:06:38:476729: ip4-input
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 127, length 52, checksum 0xba87 dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b76c0 ack 0x6753a01c
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xfb6e
00:06:38:476738: ip4-lookup
fib 0 dpo-idx 18 flow hash: 0x00000000
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 127, length 52, checksum 0xba87 dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b76c0 ack 0x6753a01c
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xfb6e
00:06:38:476748: ip4-load-balance
fib 0 dpo-idx 5 flow hash: 0x00000000
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 127, length 52, checksum 0xba87 dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b76c0 ack 0x6753a01c
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xfb6e
00:06:38:476754: ip4-rewrite
tx_sw_if_index 2 dpo-idx 5 : ipv4 via 10.0.1.2 memif0/1: mtu:9000 next:4 02fea03b325502feac275b600800 flow hash: 0x00000000
00000000: 02fea03b325502feac275b60080045000034000040007e06bb871000009e3001
00000020: 009e54ed0400339b76c06753a01c80108000fb6e00000101080a6b8b
00:06:38:476757: memif0/1-output
memif0/1
IP4: 02:fe:ac:27:5b:60 -> 02:fe:a0:3b:32:55
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 126, length 52, checksum 0xbb87 dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b76c0 ack 0x6753a01c
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xfb6e
Packet 19
00:06:38:476702: memif-input
memif: hw_if_index 1 next-index 4
slot: ring 0
00:06:38:476718: ethernet-input
frame: flags 0x1, hw-if-index 1, sw-if-index 1
IP4: 8e:55:15:1a:49:90 -> 00:00:00:01:00:00
00:06:38:476729: ip4-input
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 127, length 52, checksum 0xba87 dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b76c0 ack 0x6753a01c
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xfb6e
00:06:38:476738: ip4-lookup
fib 0 dpo-idx 18 flow hash: 0x00000000
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 127, length 52, checksum 0xba87 dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b76c0 ack 0x6753a01c
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xfb6e
00:06:38:476748: ip4-load-balance
fib 0 dpo-idx 5 flow hash: 0x00000000
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 127, length 52, checksum 0xba87 dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b76c0 ack 0x6753a01c
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xfb6e
00:06:38:476754: ip4-rewrite
tx_sw_if_index 2 dpo-idx 5 : ipv4 via 10.0.1.2 memif0/1: mtu:9000 next:4 02fea03b325502feac275b600800 flow hash: 0x00000000
00000000: 02fea03b325502feac275b60080045000034000040007e06bb871000009e3001
00000020: 009e54ed0400339b76c06753a01c80108000fb6e00000101080a6b8b
00:06:38:476757: memif0/1-output
memif0/1
IP4: 02:fe:ac:27:5b:60 -> 02:fe:a0:3b:32:55
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 126, length 52, checksum 0xbb87 dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b76c0 ack 0x6753a01c
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xfb6e
Packet 20
00:06:38:476702: memif-input
memif: hw_if_index 1 next-index 4
slot: ring 0
00:06:38:476718: ethernet-input
frame: flags 0x1, hw-if-index 1, sw-if-index 1
IP4: 8e:55:15:1a:49:90 -> 00:00:00:01:00:00
00:06:38:476729: ip4-input
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 127, length 52, checksum 0xba87 dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b76c0 ack 0x6753a01c
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xfb6e
00:06:38:476738: ip4-lookup
fib 0 dpo-idx 18 flow hash: 0x00000000
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 127, length 52, checksum 0xba87 dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b76c0 ack 0x6753a01c
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xfb6e
00:06:38:476748: ip4-load-balance
fib 0 dpo-idx 5 flow hash: 0x00000000
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 127, length 52, checksum 0xba87 dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b76c0 ack 0x6753a01c
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xfb6e
00:06:38:476754: ip4-rewrite
tx_sw_if_index 2 dpo-idx 5 : ipv4 via 10.0.1.2 memif0/1: mtu:9000 next:4 02fea03b325502feac275b600800 flow hash: 0x00000000
00000000: 02fea03b325502feac275b60080045000034000040007e06bb871000009e3001
00000020: 009e54ed0400339b76c06753a01c80108000fb6e00000101080a6b8b
00:06:38:476757: memif0/1-output
memif0/1
IP4: 02:fe:ac:27:5b:60 -> 02:fe:a0:3b:32:55
TCP: 16.0.0.158 -> 48.1.0.158
tos 0x00, ttl 126, length 52, checksum 0xbb87 dscp CS0 ecn NON_ECN
fragment id 0x0000, flags DONT_FRAGMENT
TCP: 21741 -> 1024
seq. 0x339b76c0 ack 0x6753a01c
flags 0x10 ACK, tcp header: 32 bytes
window 32768, checksum 0xfb6e
./t-rex-64 --cfg /root/trex_cfg_memif_vpp.yaml --astf -f /root/emix2.py -m 1 -t traffic_per=0.9,s_delay=1000000000 --tso-disable --lro-disable --checksum-offload-disable
- port_limit: 2
version: 2
low_end: true
interfaces: ["--vdev=net_memif0,socket=/run/vpp/memif.sock,role=slave,id=0,socket-abstract=no",
"--vdev=net_memif1,socket=/run/vpp/memif.sock,role=slave,id=1,socket-abstract=no"]
create interface memif id 0 master
set interface ip address memif0/0 10.0.0.1/24
set interface state memif0/0 up
create interface memif id 1 master
set interface ip address memif0/1 10.0.1.1/24
set interface state memif0/1 up
ip neighbor memif0/0 10.0.0.2 02:fe:a0:3b:31:54
ip neighbor memif0/1 10.0.1.2 02:fe:a0:3b:32:55
ip route add 16.0.0.0/8 via 10.0.0.2
ip route add 48.0.0.0/8 via 10.0.1.2
/usr/bin/vpp \
unix { nodaemon cli-listen /run/vpp/cli.sock } \
api-segment { prefix vpp1 } \
cpu { workers 0 } \
udp { mtu 12000 } \
heapsize 6G
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment