-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
seawreck does not work with DPDK with smp #30
Comments
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
with 8ca0f21
this works on the same server with posix stack (--network-stack posix)
I get at times
[shlomi@dpdk1 ~]$ sudo tshark -i enp129s0
Running as user "root" and group "root". This could be dangerous.
Capturing on 'enp129s0'
1 0.000000 IntelCor_2d:3a:00 -> Broadcast ARP 60 Who has 192.168.20.101? Tell 192.168.20.185
2 0.000343 IntelCor_2d:3a:00 -> Broadcast ARP 60 Who has 192.168.20.101? Tell 192.168.20.185
3 1.000410 IntelCor_2d:3a:00 -> Broadcast ARP 60 Who has 192.168.20.101? Tell 192.168.20.185
4 1.000416 IntelCor_27:d3:ea -> IntelCor_2d:3a:00 ARP 42 192.168.20.101 is at 68:05:ca:27:d3:ea
5 1.000471 IntelCor_2d:3a:00 -> Broadcast ARP 60 Who has 192.168.20.101? Tell 192.168.20.185
6 1.000475 IntelCor_27:d3:ea -> IntelCor_2d:3a:00 ARP 42 192.168.20.101 is at 68:05:ca:27:d3:ea
and at times (after 4,5 restarts)
29 56.363824 192.168.20.185 -> 192.168.20.101 TCP 62 47476→10000 [SYN] Seq=0 Win=29200 Len=0 MSS=1460 WS=128
30 56.363829 192.168.20.185 -> 192.168.20.101 TCP 62 46368→10000 [SYN] Seq=0 Win=29200 Len=0 MSS=1460 WS=128
31 56.363858 192.168.20.101 -> 192.168.20.185 TCP 62 10000→47476 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 WS=128
32 56.363864 192.168.20.185 -> 192.168.20.101 TCP 62 46786→10000 [SYN] Seq=0 Win=29200 Len=0 MSS=1460 WS=128
33 56.363871 192.168.20.101 -> 192.168.20.185 TCP 62 10000→46368 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 WS=128
34 56.363873 192.168.20.101 -> 192.168.20.185 TCP 62 10000→46786 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 WS=128
35 56.363878 192.168.20.185 -> 192.168.20.101 TCP 62 54821→10000 [SYN] Seq=0 Win=29200 Len=0 MSS=1460 WS=128
36 56.363887 192.168.20.101 -> 192.168.20.185 TCP 62 10000→54821 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 WS=128
37 56.363891 192.168.20.185 -> 192.168.20.101 TCP 60 47476→10000 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
38 56.363898 192.168.20.185 -> 192.168.20.101 TCP 60 46368→10000 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
39 56.363916 192.168.20.185 -> 192.168.20.101 TCP 60 46786→10000 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
40 56.363921 192.168.20.185 -> 192.168.20.101 TCP 60 54821→10000 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
41 57.374729 192.168.20.185 -> 192.168.20.101 TCP 62 [TCP Spurious Retransmission] 46786→10000 [SYN] Seq=0 Win=29200 Len=0 MSS=1460 WS=128
42 57.374750 192.168.20.101 -> 192.168.20.185 TCP 62 [TCP Previous segment not captured] 10000→46786 [SYN, ACK] Seq=15794908 Ack=1 Win=29200 Len=0 MSS=1460 WS=128
43 57.374753 192.168.20.185 -> 192.168.20.101 TCP 62 [TCP Spurious Retransmission] 46368→10000 [SYN] Seq=0 Win=29200 Len=0 MSS=1460 WS=128
44 57.374763 192.168.20.101 -> 192.168.20.185 TCP 62 [TCP Previous segment not captured] 10000→46368 [SYN, ACK] Seq=15795290 Ack=1 Win=29200 Len=0 MSS=1460 WS=128
45 57.374767 192.168.20.185 -> 192.168.20.101 TCP 62 [TCP Spurious Retransmission] 54821→10000 [SYN] Seq=0 Win=29200 Len=0 MSS=1460 WS=128
46 57.374774 192.168.20.101 -> 192.168.20.185 TCP 62 [TCP Previous segment not captured] 10000→54821 [SYN, ACK] Seq=15795110 Ack=1 Win=29200 Len=0 MSS=1460 WS=128
47 57.374776 192.168.20.185 -> 192.168.20.101 TCP 62 [TCP Spurious Retransmission] 47476→10000 [SYN] Seq=0 Win=29200 Len=0 MSS=1460 WS=128
48 57.374783 192.168.20.101 -> 192.168.20.185 TCP 62 [TCP Previous segment not captured] 10000→47476 [SYN, ACK] Seq=15795830 Ack=1 Win=29200 Len=0 MSS=1460 WS=128
49 57.374784 192.168.20.185 -> 192.168.20.101 TCP 60 [TCP ACKed unseen segment] 46786→10000 [RST, ACK] Seq=1 Ack=15794909 Win=0 Len=0
50 57.374788 192.168.20.185 -> 192.168.20.101 TCP 60 [TCP ACKed unseen segment] 46368→10000 [RST, ACK] Seq=1 Ack=15795291 Win=0 Len=0
51 57.374791 192.168.20.185 -> 192.168.20.101 TCP 60 [TCP ACKed unseen segment] 54821→10000 [RST, ACK] Seq=1 Ack=15795111 Win=0 Len=0
52 57.374820 192.168.20.185 -> 192.168.20.101 TCP 60 [TCP ACKed unseen segment] 47476→10000 [RST, ACK] Seq=1 Ack=15795831 Win=0 Len=0
this is simlar to the issue reported for tcp_client with dpdk (#23)
The text was updated successfully, but these errors were encountered: