Hi Scott, How are you configuring vpp? Through binary API or with commands?
Anyway, when you have only 1 thread (without workers) - it's responsible for API, CLI and packet processing. But with workers - they do the packet processing. So, simultaneously you can send commands and vpp will be processing incoming packets (in case of mt-safe API call). With just one thread vpp is probably busy with API requests. Another option that you have is to configure IP settings and only then set state up. On Wed, 26 Jan 2022 at 14:21, Scott McMillan <scott.s.mcmil...@oracle.com> wrote: > Hi Stanislav, > > > > Thanks very much for your answer. It was helpful. > > > > My issue remains, but I was on the wrong path in where the problem > resided. I'll lay out what I'm seeing and please let me know if you have > any other suggestions on debugging it > > > > After your email, I realize now that I was getting ip4 packets after > adding the interface but before the interface got enabled/configured. I > had the one connected node pinging it continuously. I assumed that the > interface continued with ip4 disablement always "on", but I can see with > your suggestions and in GDB that the interface did eventually get enabled > properly. Just not until after it received a few of the ICMP requests. > > > > I was stuck on the ip4-not-enabled because I didn’t see those ip4 not > enabled calls in the cases it works without worker threads. I think > that’s simply because the timing is different on how quickly the interface > gets enabled after the threads get started up. Traces are below for both > cases. > > > > As I mentioned, I'm still having issues with getting my setup working with > worker threads (main symptom is that once things startup and are configured > I no longer receive packets). Here is some of what I'm seeing with worker > threads enabled: > > · When pinging the vpp node from a node on the tn-eth2 interface > I get no ICMP reply from the vpp node. > > · When pinging from vpp node (in vppctl), I can see the ICMP > requests from the vpp node in tcpdump on the tn-eth2 non-vpp node, and I > can see the non-vpp nodes ICMP reply, but the vpp node does not see this > reply (don't see it in the dpdk-input trace shown later). > > > > When I run the trace at startup in the case with 1 worker thread enabled > (corelist-workers 2): > > clear trace > > trace add dpdk-input 10 > > > > I get the trace below (I'm pinging from a node on tn-eth2 continuously). > This “show trace” command was executed well after starting up and well > after getting dozens of pings. And I only see the two pings in the trace > on tn-eth2 and they properly gets thrown out because ip4 is disabled (not > configured/enabled yet). But, after everything starts up, and ip4 is > enabled, I no longer see the packets in dpdk-input. Here is the trace (I > only get 4 out of the 10 max packets in the trace even though I'm > continuously pinging). > > > > (I show the working case after this trace where I have the exact same > setup, but I don't use worker threads) > > > > > ------------------------------------------------------------------------------------------------------------------------- > > > > vpp# show trace > > ------------------- Start of thread 0 vpp_main ------------------- > > No packets in trace buffer > > ------------------- Start of thread 1 vpp_wk_0 ------------------- > > Packet 1 > > > > 00:00:02:094182: dpdk-input > > tn-eth2 rx queue 0 > > buffer 0x9fb1b: current data 0, length 98, buffer-pool 0, ref-count 1, > totlen-nifb 0, trace handle 0x1000000 > > ext-hdr-valid > > l4-cksum-computed l4-cksum-correct > > PKT MBUF: port 2, nb_segs 1, pkt_len 98 > > buf_len 2176, data_len 98, ol_flags 0x0, data_off 128, phys_addr > 0xc23ec740 > > packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 > > rss 0x0 fdir.hi 0x0 fdir.lo 0x0 > > IP4: 02:00:17:05:b7:59 -> 02:00:17:05:9f:bd > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x11fd dscp CS0 ecn NON_ECN > > fragment id 0xdf41, flags DONT_FRAGMENT > > ICMP echo_request checksum 0xa4d1 id 21172 > > 00:00:02:094233: ethernet-input > > frame: flags 0x1, hw-if-index 3, sw-if-index 3 > > IP4: 02:00:17:05:b7:59 -> 02:00:17:05:9f:bd > > 00:00:02:094260: ip4-input > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x11fd dscp CS0 ecn NON_ECN > > fragment id 0xdf41, flags DONT_FRAGMENT > > ICMP echo_request checksum 0xa4d1 id 21172 > > 00:00:02:094268: ip4-not-enabled > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x11fd dscp CS0 ecn NON_ECN > > fragment id 0xdf41, flags DONT_FRAGMENT > > ICMP echo_request checksum 0xa4d1 id 21172 > > 00:00:02:094275: error-drop > > rx:tn-eth2 > > 00:00:02:094277: drop > > dpdk-input: no error > > > > Packet 2 > > > > 00:00:02:094182: dpdk-input > > tn-eth2 rx queue 0 > > buffer 0x96357: current data 0, length 98, buffer-pool 0, ref-count 1, > totlen-nifb 0, trace handle 0x1000001 > > ext-hdr-valid > > l4-cksum-computed l4-cksum-correct > > PKT MBUF: port 2, nb_segs 1, pkt_len 98 > > buf_len 2176, data_len 98, ol_flags 0x0, data_off 128, phys_addr > 0x6598d640 > > packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 > > rss 0x0 fdir.hi 0x0 fdir.lo 0x0 > > IP4: 02:00:17:05:b7:59 -> 02:00:17:05:9f:bd > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x110c dscp CS0 ecn NON_ECN > > fragment id 0xe032, flags DONT_FRAGMENT > > ICMP echo_request checksum 0xf972 id 21172 > > 00:00:02:094233: ethernet-input > > frame: flags 0x1, hw-if-index 3, sw-if-index 3 > > IP4: 02:00:17:05:b7:59 -> 02:00:17:05:9f:bd > > 00:00:02:094260: ip4-input > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x110c dscp CS0 ecn NON_ECN > > fragment id 0xe032, flags DONT_FRAGMENT > > ICMP echo_request checksum 0xf972 id 21172 > > 00:00:02:094268: ip4-not-enabled > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x110c dscp CS0 ecn NON_ECN > > fragment id 0xe032, flags DONT_FRAGMENT > > ICMP echo_request checksum 0xf972 id 21172 > > 00:00:02:094275: error-drop > > rx:tn-eth2 > > 00:00:02:094277: drop > > dpdk-input: no error > > > > Packet 3 > > > > 00:00:02:094718: dpdk-input > > tn-eth0 rx queue 0 > > buffer 0x9b1d4: current data 0, length 56, buffer-pool 0, ref-count 1, > totlen-nifb 0, trace handle 0x1000002 > > ext-hdr-valid > > l4-cksum-computed l4-cksum-correct > > PKT MBUF: port 0, nb_segs 1, pkt_len 56 > > buf_len 2176, data_len 56, ol_flags 0x0, data_off 128, phys_addr > 0xc22c7580 > > packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 > > rss 0x0 fdir.hi 0x0 fdir.lo 0x0 > > ARP: 00:00:17:bc:5c:fd -> 00:00:17:02:78:4a > > reply, type ethernet/IP4, address size 6/4 > > 00:00:17:bc:5c:fd/192.168.1.1 -> 00:00:17:02:78:4a/192.168.1.6 > > 00:00:02:094721: ethernet-input > > frame: flags 0x1, hw-if-index 1, sw-if-index 1 > > ARP: 00:00:17:bc:5c:fd -> 00:00:17:02:78:4a > > 00:00:02:094723: arp-input > > reply, type ethernet/IP4, address size 6/4 > > 00:00:17:bc:5c:fd/192.168.1.1 -> 00:00:17:02:78:4a/192.168.1.6 > > 00:00:02:094724: arp-reply > > reply, type ethernet/IP4, address size 6/4 > > 00:00:17:bc:5c:fd/192.168.1.1 -> 00:00:17:02:78:4a/192.168.1.6 > > 00:00:02:094751: error-drop > > rx:tn-eth0 > > 00:00:02:094752: drop > > dpdk-input: no error > > > > Packet 4 > > > > 00:00:02:094754: dpdk-input > > tn-eth1 rx queue 0 > > buffer 0x9d41b: current data 0, length 56, buffer-pool 0, ref-count 1, > totlen-nifb 0, trace handle 0x1000003 > > ext-hdr-valid > > l4-cksum-computed l4-cksum-correct > > PKT MBUF: port 1, nb_segs 1, pkt_len 56 > > buf_len 2176, data_len 56, ol_flags 0x0, data_off 128, phys_addr > 0xc2350740 > > packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 > > rss 0x0 fdir.hi 0x0 fdir.lo 0x0 > > ARP: 00:00:17:bc:5c:fd -> 02:00:17:0b:6f:9c > > reply, type ethernet/IP4, address size 6/4 > > 00:00:17:bc:5c:fd/192.168.10.1 -> 02:00:17:0b:6f:9c/192.168.10.6 > > 00:00:02:094755: ethernet-input > > frame: flags 0x1, hw-if-index 2, sw-if-index 2 > > ARP: 00:00:17:bc:5c:fd -> 02:00:17:0b:6f:9c > > 00:00:02:094756: arp-input > > reply, type ethernet/IP4, address size 6/4 > > 00:00:17:bc:5c:fd/192.168.10.1 -> 02:00:17:0b:6f:9c/192.168.10.6 > > 00:00:02:094756: arp-reply > > reply, type ethernet/IP4, address size 6/4 > > 00:00:17:bc:5c:fd/192.168.10.1 -> 02:00:17:0b:6f:9c/192.168.10.6 > > 00:00:02:094757: error-drop > > rx:tn-eth1 > > 00:00:02:094757: drop > > dpdk-input: no error > > > > > > > --------------------------------------------------------------------------------------------------------------------------- > > > > Without Worker Threads (Working case) > > > > When I disable worker threads (comment out #corelist-workers 2 in startup > config) in an otherwise exact configuration and setup, I get the following > *full* trace during startup. Things work properly here. I don't see the > ip4-not-enabled node here at all, but I'm assuming that’s a timing issue > with starting up the worker threads… > > > > > > vpp# show trace > > ------------------- Start of thread 0 vpp_main ------------------- > > Packet 1 > > > > 00:00:02:221565: dpdk-input > > tn-eth2 rx queue 0 > > buffer 0x9fb1b: current data 0, length 98, buffer-pool 0, ref-count 1, > totlen-nifb 0, trace handle 0x0 > > ext-hdr-valid > > l4-cksum-computed l4-cksum-correct > > PKT MBUF: port 2, nb_segs 1, pkt_len 98 > > buf_len 2176, data_len 98, ol_flags 0x0, data_off 128, phys_addr > 0xe7dec740 > > packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 > > rss 0x0 fdir.hi 0x0 fdir.lo 0x0 > > IP4: 02:00:17:05:b7:59 -> 02:00:17:05:9f:bd > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9fbc dscp CS0 ecn NON_ECN > > fragment id 0x5182, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x6ef2 id 21172 > > 00:00:02:221596: ethernet-input > > frame: flags 0x1, hw-if-index 3, sw-if-index 3 > > IP4: 02:00:17:05:b7:59 -> 02:00:17:05:9f:bd > > 00:00:02:221634: ip4-input > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9fbc dscp CS0 ecn NON_ECN > > fragment id 0x5182, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x6ef2 id 21172 > > 00:00:02:221643: ip4-lookup > > fib 0 dpo-idx 9 flow hash: 0x00000000 > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9fbc dscp CS0 ecn NON_ECN > > fragment id 0x5182, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x6ef2 id 21172 > > 00:00:02:221647: ip4-local > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9fbc dscp CS0 ecn NON_ECN > > fragment id 0x5182, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x6ef2 id 21172 > > 00:00:02:221649: ip4-icmp-input > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9fbc dscp CS0 ecn NON_ECN > > fragment id 0x5182, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x6ef2 id 21172 > > 00:00:02:221650: ip4-icmp-echo-request > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9fbc dscp CS0 ecn NON_ECN > > fragment id 0x5182, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x6ef2 id 21172 > > 00:00:02:221659: ip4-load-balance > > fib 0 dpo-idx 7 flow hash: 0x00000000 > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0x1f2e dscp CS0 ecn NON_ECN > > fragment id 0xd210, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0x76f2 id 21172 > > 00:00:02:221661: ip4-glean > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0x1f2e dscp CS0 ecn NON_ECN > > fragment id 0xd210, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0x76f2 id 21172 > > 00:00:02:221663: ip4-drop > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0x1f2e dscp CS0 ecn NON_ECN > > fragment id 0xd210, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0x76f2 id 21172 > > 00:00:02:221676: error-drop > > rx:local0 > > 00:00:02:221677: drop > > ip4-glean: ARP requests sent > > > > Packet 2 > > > > 00:00:02:221565: dpdk-input > > tn-eth2 rx queue 0 > > buffer 0x96357: current data 0, length 98, buffer-pool 0, ref-count 1, > totlen-nifb 0, trace handle 0x1 > > ext-hdr-valid > > l4-cksum-computed l4-cksum-correct > > PKT MBUF: port 2, nb_segs 1, pkt_len 98 > > buf_len 2176, data_len 98, ol_flags 0x0, data_off 128, phys_addr > 0x64f8d640 > > packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 > > rss 0x0 fdir.hi 0x0 fdir.lo 0x0 > > IP4: 02:00:17:05:b7:59 -> 02:00:17:05:9f:bd > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9c1b dscp CS0 ecn NON_ECN > > fragment id 0x5523, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x8193 id 21172 > > 00:00:02:221596: ethernet-input > > frame: flags 0x1, hw-if-index 3, sw-if-index 3 > > IP4: 02:00:17:05:b7:59 -> 02:00:17:05:9f:bd > > 00:00:02:221634: ip4-input > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9c1b dscp CS0 ecn NON_ECN > > fragment id 0x5523, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x8193 id 21172 > > 00:00:02:221643: ip4-lookup > > fib 0 dpo-idx 9 flow hash: 0x00000000 > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9c1b dscp CS0 ecn NON_ECN > > fragment id 0x5523, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x8193 id 21172 > > 00:00:02:221647: ip4-local > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9c1b dscp CS0 ecn NON_ECN > > fragment id 0x5523, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x8193 id 21172 > > 00:00:02:221649: ip4-icmp-input > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9c1b dscp CS0 ecn NON_ECN > > fragment id 0x5523, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x8193 id 21172 > > 00:00:02:221650: ip4-icmp-echo-request > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9c1b dscp CS0 ecn NON_ECN > > fragment id 0x5523, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x8193 id 21172 > > 00:00:02:221659: ip4-load-balance > > fib 0 dpo-idx 7 flow hash: 0x00000000 > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0xcbd5 dscp CS0 ecn NON_ECN > > fragment id 0x2569, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0x8993 id 21172 > > 00:00:02:221661: ip4-glean > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0xcbd5 dscp CS0 ecn NON_ECN > > fragment id 0x2569, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0x8993 id 21172 > > 00:00:02:221663: ip4-drop > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0xcbd5 dscp CS0 ecn NON_ECN > > fragment id 0x2569, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0x8993 id 21172 > > 00:00:02:221676: error-drop > > rx:local0 > > 00:00:02:221677: drop > > ip4-glean: ARP requests throttled > > > > Packet 3 > > > > 00:00:02:221712: dpdk-input > > tn-eth0 rx queue 0 > > buffer 0x9b1d4: current data 0, length 56, buffer-pool 0, ref-count 1, > totlen-nifb 0, trace handle 0x2 > > ext-hdr-valid > > l4-cksum-computed l4-cksum-correct > > PKT MBUF: port 0, nb_segs 1, pkt_len 56 > > buf_len 2176, data_len 56, ol_flags 0x0, data_off 128, phys_addr > 0xe7cc7580 > > packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 > > rss 0x0 fdir.hi 0x0 fdir.lo 0x0 > > ARP: 00:00:17:bc:5c:fd -> 00:00:17:02:78:4a > > reply, type ethernet/IP4, address size 6/4 > > 00:00:17:bc:5c:fd/192.168.1.1 -> 00:00:17:02:78:4a/192.168.1.6 > > 00:00:02:221716: ethernet-input > > frame: flags 0x1, hw-if-index 1, sw-if-index 1 > > ARP: 00:00:17:bc:5c:fd -> 00:00:17:02:78:4a > > 00:00:02:221719: arp-input > > reply, type ethernet/IP4, address size 6/4 > > 00:00:17:bc:5c:fd/192.168.1.1 -> 00:00:17:02:78:4a/192.168.1.6 > > 00:00:02:221721: arp-reply > > reply, type ethernet/IP4, address size 6/4 > > 00:00:17:bc:5c:fd/192.168.1.1 -> 00:00:17:02:78:4a/192.168.1.6 > > 00:00:02:221918: error-drop > > rx:tn-eth0 > > 00:00:02:221919: drop > > dpdk-input: no error > > > > Packet 4 > > > > 00:00:02:221712: dpdk-input > > tn-eth1 rx queue 0 > > buffer 0x9d41b: current data 0, length 56, buffer-pool 0, ref-count 1, > totlen-nifb 0, trace handle 0x3 > > ext-hdr-valid > > l4-cksum-computed l4-cksum-correct > > PKT MBUF: port 1, nb_segs 1, pkt_len 56 > > buf_len 2176, data_len 56, ol_flags 0x0, data_off 128, phys_addr > 0xe7d50740 > > packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 > > rss 0x0 fdir.hi 0x0 fdir.lo 0x0 > > ARP: 00:00:17:bc:5c:fd -> 02:00:17:0b:6f:9c > > reply, type ethernet/IP4, address size 6/4 > > 00:00:17:bc:5c:fd/192.168.10.1 -> 02:00:17:0b:6f:9c/192.168.10.6 > > 00:00:02:221719: arp-input > > reply, type ethernet/IP4, address size 6/4 > > 00:00:17:bc:5c:fd/192.168.10.1 -> 02:00:17:0b:6f:9c/192.168.10.6 > > 00:00:02:221721: arp-reply > > reply, type ethernet/IP4, address size 6/4 > > 00:00:17:bc:5c:fd/192.168.10.1 -> 02:00:17:0b:6f:9c/192.168.10.6 > > 00:00:02:221918: error-drop > > rx:tn-eth1 > > 00:00:02:221919: drop > > dpdk-input: no error > > > > Packet 5 > > > > 00:00:02:221712: dpdk-input > > tn-eth2 rx queue 0 > > buffer 0x963cc: current data 0, length 56, buffer-pool 0, ref-count 1, > totlen-nifb 0, trace handle 0x4 > > ext-hdr-valid > > l4-cksum-computed l4-cksum-correct > > PKT MBUF: port 2, nb_segs 1, pkt_len 56 > > buf_len 2176, data_len 56, ol_flags 0x0, data_off 128, phys_addr > 0x64f8f380 > > packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 > > rss 0x0 fdir.hi 0x0 fdir.lo 0x0 > > ARP: 02:00:17:05:b7:59 -> 02:00:17:05:9f:bd > > reply, type ethernet/IP4, address size 6/4 > > 02:00:17:05:b7:59/192.168.100.20 -> 02:00:17:05:9f:bd/192.168.100.5 > > 00:00:02:221719: arp-input > > reply, type ethernet/IP4, address size 6/4 > > 02:00:17:05:b7:59/192.168.100.20 -> 02:00:17:05:9f:bd/192.168.100.5 > > 00:00:02:221721: arp-reply > > reply, type ethernet/IP4, address size 6/4 > > 02:00:17:05:b7:59/192.168.100.20 -> 02:00:17:05:9f:bd/192.168.100.5 > > 00:00:02:221918: error-drop > > rx:tn-eth2 > > 00:00:02:221919: drop > > dpdk-input: no error > > > > Packet 6 > > > > 00:00:03:181408: dpdk-input > > tn-eth2 rx queue 0 > > buffer 0x963a5: current data 0, length 98, buffer-pool 0, ref-count 1, > totlen-nifb 0, trace handle 0x5 > > ext-hdr-valid > > l4-cksum-computed l4-cksum-correct > > PKT MBUF: port 2, nb_segs 1, pkt_len 98 > > buf_len 2176, data_len 98, ol_flags 0x0, data_off 128, phys_addr > 0x64f8e9c0 > > packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 > > rss 0x0 fdir.hi 0x0 fdir.lo 0x0 > > IP4: 02:00:17:05:b7:59 -> 02:00:17:05:9f:bd > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9bc0 dscp CS0 ecn NON_ECN > > fragment id 0x557e, flags DONT_FRAGMENT > > ICMP echo_request checksum 0xec34 id 21172 > > 00:00:03:181420: ethernet-input > > frame: flags 0x1, hw-if-index 3, sw-if-index 3 > > IP4: 02:00:17:05:b7:59 -> 02:00:17:05:9f:bd > > 00:00:03:181427: ip4-input > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9bc0 dscp CS0 ecn NON_ECN > > fragment id 0x557e, flags DONT_FRAGMENT > > ICMP echo_request checksum 0xec34 id 21172 > > 00:00:03:181430: ip4-lookup > > fib 0 dpo-idx 9 flow hash: 0x00000000 > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9bc0 dscp CS0 ecn NON_ECN > > fragment id 0x557e, flags DONT_FRAGMENT > > ICMP echo_request checksum 0xec34 id 21172 > > 00:00:03:181432: ip4-local > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9bc0 dscp CS0 ecn NON_ECN > > fragment id 0x557e, flags DONT_FRAGMENT > > ICMP echo_request checksum 0xec34 id 21172 > > 00:00:03:181434: ip4-icmp-input > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9bc0 dscp CS0 ecn NON_ECN > > fragment id 0x557e, flags DONT_FRAGMENT > > ICMP echo_request checksum 0xec34 id 21172 > > 00:00:03:181435: ip4-icmp-echo-request > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9bc0 dscp CS0 ecn NON_ECN > > fragment id 0x557e, flags DONT_FRAGMENT > > ICMP echo_request checksum 0xec34 id 21172 > > 00:00:03:181437: ip4-load-balance > > fib 0 dpo-idx 8 flow hash: 0x00000000 > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0x1a0e dscp CS0 ecn NON_ECN > > fragment id 0xd730, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0xf434 id 21172 > > 00:00:03:181440: ip4-rewrite > > tx_sw_if_index 3 dpo-idx 8 : ipv4 via 192.168.100.20 tn-eth2: mtu:9000 > next:5 flags:[] 02001705b759020017059fbd0800 flow hash: 0x00000000 > > 00000000: > 02001705b759020017059fbd080045000054d730400040011a0ec0a86405c0a8 > > 00000020: 64140000f43452b409b10a45f16100000000f0eb0400000000001011 > > 00:00:03:181442: tn-eth2-output > > tn-eth2 > > IP4: 02:00:17:05:9f:bd -> 02:00:17:05:b7:59 > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0x1a0e dscp CS0 ecn NON_ECN > > fragment id 0xd730, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0xf434 id 21172 > > 00:00:03:181443: tn-eth2-tx > > tn-eth2 tx queue 0 > > buffer 0x963a5: current data 0, length 98, buffer-pool 0, ref-count 1, > totlen-nifb 0, trace handle 0x5 > > ext-hdr-valid > > l4-cksum-computed l4-cksum-correct local l2-hdr-offset 0 > l3-hdr-offset 14 > > PKT MBUF: port 2, nb_segs 1, pkt_len 98 > > buf_len 2176, data_len 98, ol_flags 0x0, data_off 128, phys_addr > 0x64f8e9c0 > > packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 > > rss 0x0 fdir.hi 0x0 fdir.lo 0x0 > > IP4: 02:00:17:05:9f:bd -> 02:00:17:05:b7:59 > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0x1a0e dscp CS0 ecn NON_ECN > > fragment id 0xd730, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0xf434 id 21172 > > > > Packet 7 > > > > 00:00:04:205421: dpdk-input > > tn-eth2 rx queue 0 > > buffer 0x9637e: current data 0, length 98, buffer-pool 0, ref-count 1, > totlen-nifb 0, trace handle 0x6 > > ext-hdr-valid > > l4-cksum-computed l4-cksum-correct > > PKT MBUF: port 2, nb_segs 1, pkt_len 98 > > buf_len 2176, data_len 98, ol_flags 0x0, data_off 128, phys_addr > 0x64f8e000 > > packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 > > rss 0x0 fdir.hi 0x0 fdir.lo 0x0 > > IP4: 02:00:17:05:b7:59 -> 02:00:17:05:9f:bd > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x984d dscp CS0 ecn NON_ECN > > fragment id 0x58f1, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x29d6 id 21172 > > 00:00:04:205434: ethernet-input > > frame: flags 0x1, hw-if-index 3, sw-if-index 3 > > IP4: 02:00:17:05:b7:59 -> 02:00:17:05:9f:bd > > 00:00:04:205441: ip4-input > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x984d dscp CS0 ecn NON_ECN > > fragment id 0x58f1, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x29d6 id 21172 > > 00:00:04:205444: ip4-lookup > > fib 0 dpo-idx 9 flow hash: 0x00000000 > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x984d dscp CS0 ecn NON_ECN > > fragment id 0x58f1, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x29d6 id 21172 > > 00:00:04:205446: ip4-local > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x984d dscp CS0 ecn NON_ECN > > fragment id 0x58f1, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x29d6 id 21172 > > 00:00:04:205448: ip4-icmp-input > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x984d dscp CS0 ecn NON_ECN > > fragment id 0x58f1, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x29d6 id 21172 > > 00:00:04:205449: ip4-icmp-echo-request > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x984d dscp CS0 ecn NON_ECN > > fragment id 0x58f1, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x29d6 id 21172 > > 00:00:04:205452: ip4-load-balance > > fib 0 dpo-idx 8 flow hash: 0x00000000 > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0xcbd5 dscp CS0 ecn NON_ECN > > fragment id 0x2569, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0x31d6 id 21172 > > 00:00:04:205454: ip4-rewrite > > tx_sw_if_index 3 dpo-idx 8 : ipv4 via 192.168.100.20 tn-eth2: mtu:9000 > next:5 flags:[] 02001705b759020017059fbd0800 flow hash: 0x00000000 > > 00000000: > 02001705b759020017059fbd080045000054256940004001cbd5c0a86405c0a8 > > 00000020: 6414000031d652b409b20b45f16100000000b1490500000000001011 > > 00:00:04:205455: tn-eth2-output > > tn-eth2 > > IP4: 02:00:17:05:9f:bd -> 02:00:17:05:b7:59 > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0xcbd5 dscp CS0 ecn NON_ECN > > fragment id 0x2569, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0x31d6 id 21172 > > 00:00:04:205458: tn-eth2-tx > > tn-eth2 tx queue 0 > > buffer 0x9637e: current data 0, length 98, buffer-pool 0, ref-count 1, > totlen-nifb 0, trace handle 0x6 > > ext-hdr-valid > > l4-cksum-computed l4-cksum-correct local l2-hdr-offset 0 > l3-hdr-offset 14 > > PKT MBUF: port 2, nb_segs 1, pkt_len 98 > > buf_len 2176, data_len 98, ol_flags 0x0, data_off 128, phys_addr > 0x64f8e000 > > packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 > > rss 0x0 fdir.hi 0x0 fdir.lo 0x0 > > IP4: 02:00:17:05:9f:bd -> 02:00:17:05:b7:59 > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0xcbd5 dscp CS0 ecn NON_ECN > > fragment id 0x2569, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0x31d6 id 21172 > > > > Packet 8 > > > > 00:00:05:229414: dpdk-input > > tn-eth2 rx queue 0 > > buffer 0x96837: current data 0, length 98, buffer-pool 0, ref-count 1, > totlen-nifb 0, trace handle 0x7 > > ext-hdr-valid > > l4-cksum-computed l4-cksum-correct > > PKT MBUF: port 2, nb_segs 1, pkt_len 98 > > buf_len 2176, data_len 98, ol_flags 0x0, data_off 128, phys_addr > 0x64fa0e40 > > packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 > > rss 0x0 fdir.hi 0x0 fdir.lo 0x0 > > IP4: 02:00:17:05:b7:59 -> 02:00:17:05:9f:bd > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9663 dscp CS0 ecn NON_ECN > > fragment id 0x5adb, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x6777 id 21172 > > 00:00:05:229425: ethernet-input > > frame: flags 0x1, hw-if-index 3, sw-if-index 3 > > IP4: 02:00:17:05:b7:59 -> 02:00:17:05:9f:bd > > 00:00:05:229432: ip4-input > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9663 dscp CS0 ecn NON_ECN > > fragment id 0x5adb, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x6777 id 21172 > > 00:00:05:229435: ip4-lookup > > fib 0 dpo-idx 9 flow hash: 0x00000000 > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9663 dscp CS0 ecn NON_ECN > > fragment id 0x5adb, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x6777 id 21172 > > 00:00:05:229438: ip4-local > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9663 dscp CS0 ecn NON_ECN > > fragment id 0x5adb, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x6777 id 21172 > > 00:00:05:229440: ip4-icmp-input > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9663 dscp CS0 ecn NON_ECN > > fragment id 0x5adb, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x6777 id 21172 > > 00:00:05:229441: ip4-icmp-echo-request > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x9663 dscp CS0 ecn NON_ECN > > fragment id 0x5adb, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x6777 id 21172 > > 00:00:05:229444: ip4-load-balance > > fib 0 dpo-idx 8 flow hash: 0x00000000 > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0xd1fe dscp CS0 ecn NON_ECN > > fragment id 0x1f40, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0x6f77 id 21172 > > 00:00:05:229445: ip4-rewrite > > tx_sw_if_index 3 dpo-idx 8 : ipv4 via 192.168.100.20 tn-eth2: mtu:9000 > next:5 flags:[] 02001705b759020017059fbd0800 flow hash: 0x00000000 > > 00000000: > 02001705b759020017059fbd0800450000541f4040004001d1fec0a86405c0a8 > > 00000020: 641400006f7752b409b30c45f1610000000072a70500000000001011 > > 00:00:05:229447: tn-eth2-output > > tn-eth2 > > IP4: 02:00:17:05:9f:bd -> 02:00:17:05:b7:59 > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0xd1fe dscp CS0 ecn NON_ECN > > fragment id 0x1f40, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0x6f77 id 21172 > > 00:00:05:229448: tn-eth2-tx > > tn-eth2 tx queue 0 > > buffer 0x96837: current data 0, length 98, buffer-pool 0, ref-count 1, > totlen-nifb 0, trace handle 0x7 > > ext-hdr-valid > > l4-cksum-computed l4-cksum-correct local l2-hdr-offset 0 > l3-hdr-offset 14 > > PKT MBUF: port 2, nb_segs 1, pkt_len 98 > > buf_len 2176, data_len 98, ol_flags 0x0, data_off 128, phys_addr > 0x64fa0e40 > > packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 > > rss 0x0 fdir.hi 0x0 fdir.lo 0x0 > > IP4: 02:00:17:05:9f:bd -> 02:00:17:05:b7:59 > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0xd1fe dscp CS0 ecn NON_ECN > > fragment id 0x1f40, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0x6f77 id 21172 > > > > Packet 9 > > > > 00:00:06:253485: dpdk-input > > tn-eth2 rx queue 0 > > buffer 0x96810: current data 0, length 98, buffer-pool 0, ref-count 1, > totlen-nifb 0, trace handle 0x8 > > ext-hdr-valid > > l4-cksum-computed l4-cksum-correct > > PKT MBUF: port 2, nb_segs 1, pkt_len 98 > > buf_len 2176, data_len 98, ol_flags 0x0, data_off 128, phys_addr > 0x64fa0480 > > packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 > > rss 0x0 fdir.hi 0x0 fdir.lo 0x0 > > IP4: 02:00:17:05:b7:59 -> 02:00:17:05:9f:bd > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x959f dscp CS0 ecn NON_ECN > > fragment id 0x5b9f, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x8918 id 21172 > > 00:00:06:253494: ethernet-input > > frame: flags 0x1, hw-if-index 3, sw-if-index 3 > > IP4: 02:00:17:05:b7:59 -> 02:00:17:05:9f:bd > > 00:00:06:253501: ip4-input > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x959f dscp CS0 ecn NON_ECN > > fragment id 0x5b9f, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x8918 id 21172 > > 00:00:06:253503: ip4-lookup > > fib 0 dpo-idx 9 flow hash: 0x00000000 > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x959f dscp CS0 ecn NON_ECN > > fragment id 0x5b9f, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x8918 id 21172 > > 00:00:06:253506: ip4-local > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x959f dscp CS0 ecn NON_ECN > > fragment id 0x5b9f, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x8918 id 21172 > > 00:00:06:253508: ip4-icmp-input > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x959f dscp CS0 ecn NON_ECN > > fragment id 0x5b9f, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x8918 id 21172 > > 00:00:06:253509: ip4-icmp-echo-request > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x959f dscp CS0 ecn NON_ECN > > fragment id 0x5b9f, flags DONT_FRAGMENT > > ICMP echo_request checksum 0x8918 id 21172 > > 00:00:06:253511: ip4-load-balance > > fib 0 dpo-idx 8 flow hash: 0x00000000 > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0x38c5 dscp CS0 ecn NON_ECN > > fragment id 0xb879, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0x9118 id 21172 > > 00:00:06:253513: ip4-rewrite > > tx_sw_if_index 3 dpo-idx 8 : ipv4 via 192.168.100.20 tn-eth2: mtu:9000 > next:5 flags:[] 02001705b759020017059fbd0800 flow hash: 0x00000000 > > 00000000: > 02001705b759020017059fbd080045000054b8794000400138c5c0a86405c0a8 > > 00000020: 64140000911852b409b40d45f161000000004f050600000000001011 > > 00:00:06:253514: tn-eth2-output > > tn-eth2 > > IP4: 02:00:17:05:9f:bd -> 02:00:17:05:b7:59 > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0x38c5 dscp CS0 ecn NON_ECN > > fragment id 0xb879, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0x9118 id 21172 > > 00:00:06:253516: tn-eth2-tx > > tn-eth2 tx queue 0 > > buffer 0x96810: current data 0, length 98, buffer-pool 0, ref-count 1, > totlen-nifb 0, trace handle 0x8 > > ext-hdr-valid > > l4-cksum-computed l4-cksum-correct local l2-hdr-offset 0 > l3-hdr-offset 14 > > PKT MBUF: port 2, nb_segs 1, pkt_len 98 > > buf_len 2176, data_len 98, ol_flags 0x0, data_off 128, phys_addr > 0x64fa0480 > > packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 > > rss 0x0 fdir.hi 0x0 fdir.lo 0x0 > > IP4: 02:00:17:05:9f:bd -> 02:00:17:05:b7:59 > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0x38c5 dscp CS0 ecn NON_ECN > > fragment id 0xb879, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0x9118 id 21172 > > > > Packet 10 > > > > 00:00:07:277392: dpdk-input > > tn-eth2 rx queue 0 > > buffer 0x967e9: current data 0, length 98, buffer-pool 0, ref-count 1, > totlen-nifb 0, trace handle 0x9 > > ext-hdr-valid > > l4-cksum-computed l4-cksum-correct > > PKT MBUF: port 2, nb_segs 1, pkt_len 98 > > buf_len 2176, data_len 98, ol_flags 0x0, data_off 128, phys_addr > 0x64f9fac0 > > packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 > > rss 0x0 fdir.hi 0x0 fdir.lo 0x0 > > IP4: 02:00:17:05:b7:59 -> 02:00:17:05:9f:bd > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x92d5 dscp CS0 ecn NON_ECN > > fragment id 0x5e69, flags DONT_FRAGMENT > > ICMP echo_request checksum 0xdcb9 id 21172 > > 00:00:07:277403: ethernet-input > > frame: flags 0x1, hw-if-index 3, sw-if-index 3 > > IP4: 02:00:17:05:b7:59 -> 02:00:17:05:9f:bd > > 00:00:07:277409: ip4-input > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x92d5 dscp CS0 ecn NON_ECN > > fragment id 0x5e69, flags DONT_FRAGMENT > > ICMP echo_request checksum 0xdcb9 id 21172 > > 00:00:07:277412: ip4-lookup > > fib 0 dpo-idx 9 flow hash: 0x00000000 > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x92d5 dscp CS0 ecn NON_ECN > > fragment id 0x5e69, flags DONT_FRAGMENT > > ICMP echo_request checksum 0xdcb9 id 21172 > > 00:00:07:277414: ip4-local > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x92d5 dscp CS0 ecn NON_ECN > > fragment id 0x5e69, flags DONT_FRAGMENT > > ICMP echo_request checksum 0xdcb9 id 21172 > > 00:00:07:277416: ip4-icmp-input > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x92d5 dscp CS0 ecn NON_ECN > > fragment id 0x5e69, flags DONT_FRAGMENT > > ICMP echo_request checksum 0xdcb9 id 21172 > > 00:00:07:277417: ip4-icmp-echo-request > > ICMP: 192.168.100.20 -> 192.168.100.5 > > tos 0x00, ttl 64, length 84, checksum 0x92d5 dscp CS0 ecn NON_ECN > > fragment id 0x5e69, flags DONT_FRAGMENT > > ICMP echo_request checksum 0xdcb9 id 21172 > > 00:00:07:277419: ip4-load-balance > > fib 0 dpo-idx 8 flow hash: 0x00000000 > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0x1c7f dscp CS0 ecn NON_ECN > > fragment id 0xd4bf, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0xe4b9 id 21172 > > 00:00:07:277421: ip4-rewrite > > tx_sw_if_index 3 dpo-idx 8 : ipv4 via 192.168.100.20 tn-eth2: mtu:9000 > next:5 flags:[] 02001705b759020017059fbd0800 flow hash: 0x00000000 > > 00000000: > 02001705b759020017059fbd080045000054d4bf400040011c7fc0a86405c0a8 > > 00000020: 64140000e4b952b409b50e45f16100000000fa620600000000001011 > > 00:00:07:277423: tn-eth2-output > > tn-eth2 > > IP4: 02:00:17:05:9f:bd -> 02:00:17:05:b7:59 > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0x1c7f dscp CS0 ecn NON_ECN > > fragment id 0xd4bf, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0xe4b9 id 21172 > > 00:00:07:277424: tn-eth2-tx > > tn-eth2 tx queue 0 > > buffer 0x967e9: current data 0, length 98, buffer-pool 0, ref-count 1, > totlen-nifb 0, trace handle 0x9 > > ext-hdr-valid > > l4-cksum-computed l4-cksum-correct local l2-hdr-offset 0 > l3-hdr-offset 14 > > PKT MBUF: port 2, nb_segs 1, pkt_len 98 > > buf_len 2176, data_len 98, ol_flags 0x0, data_off 128, phys_addr > 0x64f9fac0 > > packet_type 0x0 l2_len 0 l3_len 0 outer_l2_len 0 outer_l3_len 0 > > rss 0x0 fdir.hi 0x0 fdir.lo 0x0 > > IP4: 02:00:17:05:9f:bd -> 02:00:17:05:b7:59 > > ICMP: 192.168.100.5 -> 192.168.100.20 > > tos 0x00, ttl 64, length 84, checksum 0x1c7f dscp CS0 ecn NON_ECN > > fragment id 0xd4bf, flags DONT_FRAGMENT > > ICMP echo_reply checksum 0xe4b9 id 21172 > > > > > > > > *From:* Stanislav Zaikin <zsta...@gmail.com> > *Sent:* Wednesday, January 26, 2022 2:06 AM > *To:* Scott McMillan <scott.s.mcmil...@oracle.com> > *Cc:* vpp-dev@lists.fd.io > *Subject:* [External] : Re: [vpp-dev] ip4 getting disabled when using > worker threads > > > > Hi Scott, > > > > That means that you got 2 ipv4 packets on the interface without an IP > address > > If you want to see what happens exactly you can execute: > > trace filter include ip4-not-enabled 10 > > trace add virtio-input 10 > > and then see the trace. It will show on what interface without an IP > you're getting those packets. > > > > On Tue, 25 Jan 2022 at 23:16, Scott McMillan <scott.s.mcmil...@oracle.com> > wrote: > > Hi all, > > > > I’m having an issue with virtio devices in a VM on OCI when setting up > multiple workers with VPP (21.06). I’m looking for some suggestions on > where to start the debugging. Here is what I’m seeing: > > > > - With the startup configuration commenting out “corelist-workers 2” > (so that there are no workers), everything works correctly. > - Same setup with one change, uncomment “corelist-workers 2”, ip4 gets > disabled. I get the following dispatch traces in the event-logger: > > 000:00:00:002:662 workers 1 dpdk-input-return: 2 > > 000:00:00:002:667 workers 1 ethernet-input-call: 2 > > 000:00:00:002:690 workers 1 ethernet-input-return: 2 > > 000:00:00:002:692 workers 1 ip4-input-call: 2 > > 000:00:00:002:698 workers 1 ip4-input-return: 2 > > 000:00:00:002:699 workers 1 ip4-not-enabled-call: 2 > > 000:00:00:002:705 workers 1 ip4-not-enabled-return: 2 > > 000:00:00:002:705 workers 1 error-drop-call: 2 > > 000:00:00:002:707 workers 1 error-drop-return: 2 > > > > When using a VM on openstack, I don’t have this problem. Something > specific about the OCI setup seems to be causing issues. > > > > I also don’t have issues on OCI when using the Broadcom and Mellanox > virtual functions with multiple workers. Only with virtio > (PARAVIRTUALIZED). > > > > Any suggestions on what is resulting in the ip4 disablement? Any > suggestions on where to start the debug? I can get GDB out and step > through it, but was hoping for someone to zero me on something if possible. > > > > Thanks, > > Scott McMillan > > > > > > > > > > > -- > > Best regards > Stanislav Zaikin > -- Best regards Stanislav Zaikin
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#20791): https://lists.fd.io/g/vpp-dev/message/20791 Mute This Topic: https://lists.fd.io/mt/88695988/21656 Group Owner: vpp-dev+ow...@lists.fd.io Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-