This repository has been archived by the owner on Apr 21, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 1
ICMP Echo Request
Akihiro TAKASE edited this page Jun 23, 2021
·
2 revisions
[vagrant@ps app]$ ./bin/pstack ping -c 4 192.0.2.1
12:41:44.210 [I] icmp packet sent: seq=0, id=25390
12:41:44.211 [E] ethernet address was not found: ARP_INCOMPLETE
12:41:44.211 [I] arp cache entry was renewed
spa: 192.0.2.1
sha: e2:20:76:2d:5d:2d
12:41:44.311 [W] icmp packet sent (dead letter): id=25390, seq=0
12:41:45.312 [I] icmp packet received: seq=0, id=25390
12:41:46.313 [I] icmp packet sent: seq=1, id=50141
12:41:46.314 [I] icmp packet received: seq=1, id=50141
12:41:47.315 [I] icmp packet sent: seq=2, id=17217
12:41:47.316 [I] icmp packet received: seq=2, id=17217
12:41:48.317 [I] icmp packet sent: seq=3, id=40519
12:41:48.319 [I] icmp packet received: seq=3, id=40519
Verbose Output:
[vagrant@ps app]$ ./bin/pstack ping -c 4 192.0.2.1
12:45:43.403 [D] -------------------------------------------------------
I N I T I A L I Z E D E V I C E S
-------------------------------------------------------
12:45:43.403 [D] device was registered
type: Loopback
name: net0 ()
addr: 00:00:00:00:00:00
12:45:43.403 [D] interface was attached
ip: 127.0.0.1
device: net0 ()
12:45:43.403 [D] route was registered
network: 127.0.0.0
netmask: 255.0.0.0
unicast: 127.0.0.1
next hop: 0.0.0.0
device: net0 ()
12:45:43.403 [D] device was registered
type: Ethernet
name: net1 (tap0)
addr: 00:00:5e:00:53:01
12:45:43.403 [D] interface was attached
ip: 192.0.2.2
device: net1 (tap0)
12:45:43.403 [D] route was registered
network: 192.0.0.0
netmask: 255.255.255.0
unicast: 192.0.2.2
next hop: 0.0.0.0
device: net1 (tap0)
12:45:43.403 [D] default gateway was registered
network: 0.0.0.0
netmask: 0.0.0.0
unicast: 192.0.2.2
next hop: 192.0.2.1
device: net1 (tap0)
12:45:43.403 [D] -------------------------------------------------------
S T A R T S E R V I C E S
-------------------------------------------------------
12:45:43.403 [D] arp service started
12:45:43.403 [D] ethernet service started
12:45:43.403 [D] icmp service started
12:45:43.403 [D] ip service started
12:45:43.403 [D] monitor service started
12:45:43.403 [D] device was opened
type: Loopback
name: net0 ()
12:45:43.403 [D] device was opened
type: Ethernet
name: net1 (tap0)
12:45:43.403 [D] tcp service started
12:45:43.409 [D] event occurred
events: 1
device: net1 (tap0)
12:45:43.507 [D] all service workers started
12:45:43.507 [D] ///////////////////////////////////////////////////////
A P P L I C A T I O N S T A R T E D
///////////////////////////////////////////////////////
12:45:43.507 [I] icmp packet sent: seq=0, id=2297
12:45:43.507 [D] outgoing icmp packet
type: Echo (8)
code: 0
checksum: 0x9adb
data: 50 79 38 8b e5 fe d5 05 ee 28 ca 7f a3 67 4c 36 62 c4 5f c0
f9 ed c3 c7 13 40 4c dc c8 9a 44 f5 c9 e7 c6 0f 4b 75 84 cd
dd dc b3 bb ed 22 ff 03
12:45:43.508 [D] outgoing ip packet
version: 4
ihl: 5
precedence: Routine (0x0)
delay: Normal (0x0)
throughput: Normal (0x0)
relibility: Normal (0x0)
total length: 84 bytes (data: 64 bytes)
id: 0
flag (df): May Fragment (0x0)
flag (mf): Last Fragment (0x0)
fragment offset: 0
ttl: 255
protocol: ICMP (1)
checksum: 0x37a5
source address: 192.0.2.2
destination address: 192.0.2.1
data: 08 00 9a db 08 f9 00 00 ed 2f 94 76 b9 59 60 fa 50 79 38 8b
e5 fe d5 05 ee 28 ca 7f a3 67 4c 36 62 c4 5f c0 f9 ed c3 c7
13 40 4c dc c8 9a 44 f5 c9 e7 c6 0f 4b 75 84 cd dd dc b3 bb
ed 22 ff 03
12:45:43.508 [D] outgoing arp packet
hardware type: Ethernet (10Mb)
protocol Type: IPv4
hardware address length: 6
protocol address length: 4
opcode: REQUEST (1)
sender hardware address: 00:00:5e:00:53:01
sender protocol address: 192.0.2.2
target hardware address: 00:00:00:00:00:00
target protocol address: 192.0.2.1
12:45:43.508 [D] outgoing ethernet frame (42 bytes)
type: ARP (0x0806)
dst: ff:ff:ff:ff:ff:ff
src: 00:00:5e:00:53:01
payload: 00 01 08 00 06 04 00 01 00 00 5e 00 53 01 c0 00 02 02 00 00
00 00 00 00 c0 00 02 01 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00
12:45:43.508 [E] ethernet address was not found: ARP_INCOMPLETE
12:45:43.508 [D] event occurred
events: 1
device: net1 (tap0)
12:45:43.508 [D] incoming ethernet frame (42 bytes)
type: ARP (0x0806)
dst: 00:00:5e:00:53:01
src: e2:20:76:2d:5d:2d
payload: 00 01 08 00 06 04 00 02 e2 20 76 2d 5d 2d c0 00 02 01 00 00
5e 00 53 01 c0 00 02 02
12:45:43.509 [D] incoming arp packet
hardware type: Ethernet (10Mb)
protocol Type: IPv4
hardware address length: 6
protocol address length: 4
opcode: REPLY (2)
sender hardware address: e2:20:76:2d:5d:2d
sender protocol address: 192.0.2.1
target hardware address: 00:00:5e:00:53:01
target protocol address: 192.0.2.2
12:45:43.509 [I] arp cache entry was renewed
spa: 192.0.2.1
sha: e2:20:76:2d:5d:2d
12:45:43.608 [W] icmp packet sent (dead letter): id=2297, seq=0
12:45:43.609 [D] outgoing icmp packet
type: Echo (8)
code: 0
checksum: 0x9adb
data: 50 79 38 8b e5 fe d5 05 ee 28 ca 7f a3 67 4c 36 62 c4 5f c0
f9 ed c3 c7 13 40 4c dc c8 9a 44 f5 c9 e7 c6 0f 4b 75 84 cd
dd dc b3 bb ed 22 ff 03
12:45:43.609 [D] outgoing ip packet
version: 4
ihl: 5
precedence: Routine (0x0)
delay: Normal (0x0)
throughput: Normal (0x0)
relibility: Normal (0x0)
total length: 84 bytes (data: 64 bytes)
id: 1
flag (df): May Fragment (0x0)
flag (mf): Last Fragment (0x0)
fragment offset: 0
ttl: 255
protocol: ICMP (1)
checksum: 0x37a4
source address: 192.0.2.2
destination address: 192.0.2.1
data: 08 00 9a db 08 f9 00 00 ed 2f 94 76 b9 59 60 fa 50 79 38 8b
e5 fe d5 05 ee 28 ca 7f a3 67 4c 36 62 c4 5f c0 f9 ed c3 c7
13 40 4c dc c8 9a 44 f5 c9 e7 c6 0f 4b 75 84 cd dd dc b3 bb
ed 22 ff 03
12:45:43.609 [D] outgoing ethernet frame (98 bytes)
type: IPv4 (0x0800)
dst: e2:20:76:2d:5d:2d
src: 00:00:5e:00:53:01
payload: 45 00 00 54 00 01 00 00 ff 01 37 a4 c0 00 02 02 c0 00 02 01
08 00 9a db 08 f9 00 00 ed 2f 94 76 b9 59 60 fa 50 79 38 8b
e5 fe d5 05 ee 28 ca 7f a3 67 4c 36 62 c4 5f c0 f9 ed c3 c7
13 40 4c dc c8 9a 44 f5 c9 e7 c6 0f 4b 75 84 cd dd dc b3 bb
ed 22 ff 03
12:45:43.610 [D] event occurred
events: 1
device: net1 (tap0)
12:45:43.610 [D] incoming ethernet frame (98 bytes)
type: IPv4 (0x0800)
dst: 00:00:5e:00:53:01
src: e2:20:76:2d:5d:2d
payload: 45 00 00 54 af 89 00 00 40 01 47 1c c0 00 02 01 c0 00 02 02
00 00 a2 db 08 f9 00 00 ed 2f 94 76 b9 59 60 fa 50 79 38 8b
e5 fe d5 05 ee 28 ca 7f a3 67 4c 36 62 c4 5f c0 f9 ed c3 c7
13 40 4c dc c8 9a 44 f5 c9 e7 c6 0f 4b 75 84 cd dd dc b3 bb
ed 22 ff 03
12:45:43.610 [D] incoming ip packet
version: 4
ihl: 5
precedence: Routine (0x0)
delay: Normal (0x0)
throughput: Normal (0x0)
relibility: Normal (0x0)
total length: 84 bytes (data: 64 bytes)
id: 44937
flag (df): May Fragment (0x0)
flag (mf): Last Fragment (0x0)
fragment offset: 0
ttl: 64
protocol: ICMP (1)
checksum: 0x471c
source address: 192.0.2.1
destination address: 192.0.2.2
data: 00 00 a2 db 08 f9 00 00 ed 2f 94 76 b9 59 60 fa 50 79 38 8b
e5 fe d5 05 ee 28 ca 7f a3 67 4c 36 62 c4 5f c0 f9 ed c3 c7
13 40 4c dc c8 9a 44 f5 c9 e7 c6 0f 4b 75 84 cd dd dc b3 bb
ed 22 ff 03
12:45:43.610 [D] incoming icmp packet
type: Echo Reply (0)
code: 0
checksum: 0xa2db
id: 2297
seq: 0
data: 50 79 38 8b e5 fe d5 05 ee 28 ca 7f a3 67 4c 36 62 c4 5f c0
f9 ed c3 c7 13 40 4c dc c8 9a 44 f5 c9 e7 c6 0f 4b 75 84 cd
dd dc b3 bb ed 22 ff 03
12:45:44.343 [D] event occurred
events: 1
device: net1 (tap0)
12:45:44.609 [I] icmp packet received: seq=0, id=2297
12:45:45.610 [I] icmp packet sent: seq=1, id=56131
12:45:45.610 [D] outgoing icmp packet
type: Echo (8)
code: 0
checksum: 0x92dc
data: d7 d8 db d6 bf f6 24 dd bd fc 37 d3 8d 6b 14 e5 6e 26 a4 d0
a1 59 73 06 2b 93 8a 38 ca da 90 c3 b3 4f 9f 0b 3c 3b 86 05
83 73 93 86 d9 71 18 fa
12:45:45.610 [D] outgoing ip packet
version: 4
ihl: 5
precedence: Routine (0x0)
delay: Normal (0x0)
throughput: Normal (0x0)
relibility: Normal (0x0)
total length: 84 bytes (data: 64 bytes)
id: 2
flag (df): May Fragment (0x0)
flag (mf): Last Fragment (0x0)
fragment offset: 0
ttl: 255
protocol: ICMP (1)
checksum: 0x37a3
source address: 192.0.2.2
destination address: 192.0.2.1
data: 08 00 92 dc db 43 00 01 0e 20 b4 a5 25 47 1a 6a d7 d8 db d6
bf f6 24 dd bd fc 37 d3 8d 6b 14 e5 6e 26 a4 d0 a1 59 73 06
2b 93 8a 38 ca da 90 c3 b3 4f 9f 0b 3c 3b 86 05 83 73 93 86
d9 71 18 fa
12:45:45.610 [D] outgoing ethernet frame (98 bytes)
type: IPv4 (0x0800)
dst: e2:20:76:2d:5d:2d
src: 00:00:5e:00:53:01
payload: 45 00 00 54 00 02 00 00 ff 01 37 a3 c0 00 02 02 c0 00 02 01
08 00 92 dc db 43 00 01 0e 20 b4 a5 25 47 1a 6a d7 d8 db d6
bf f6 24 dd bd fc 37 d3 8d 6b 14 e5 6e 26 a4 d0 a1 59 73 06
2b 93 8a 38 ca da 90 c3 b3 4f 9f 0b 3c 3b 86 05 83 73 93 86
d9 71 18 fa
12:45:45.610 [D] event occurred
events: 1
device: net1 (tap0)
12:45:45.611 [D] incoming ethernet frame (98 bytes)
type: IPv4 (0x0800)
dst: 00:00:5e:00:53:01
src: e2:20:76:2d:5d:2d
payload: 45 00 00 54 b1 9b 00 00 40 01 45 0a c0 00 02 01 c0 00 02 02
00 00 9a dc db 43 00 01 0e 20 b4 a5 25 47 1a 6a d7 d8 db d6
bf f6 24 dd bd fc 37 d3 8d 6b 14 e5 6e 26 a4 d0 a1 59 73 06
2b 93 8a 38 ca da 90 c3 b3 4f 9f 0b 3c 3b 86 05 83 73 93 86
d9 71 18 fa
12:45:45.612 [D] incoming ip packet
version: 4
ihl: 5
precedence: Routine (0x0)
delay: Normal (0x0)
throughput: Normal (0x0)
relibility: Normal (0x0)
total length: 84 bytes (data: 64 bytes)
id: 45467
flag (df): May Fragment (0x0)
flag (mf): Last Fragment (0x0)
fragment offset: 0
ttl: 64
protocol: ICMP (1)
checksum: 0x450a
source address: 192.0.2.1
destination address: 192.0.2.2
data: 00 00 9a dc db 43 00 01 0e 20 b4 a5 25 47 1a 6a d7 d8 db d6
bf f6 24 dd bd fc 37 d3 8d 6b 14 e5 6e 26 a4 d0 a1 59 73 06
2b 93 8a 38 ca da 90 c3 b3 4f 9f 0b 3c 3b 86 05 83 73 93 86
d9 71 18 fa
12:45:45.612 [D] incoming icmp packet
type: Echo Reply (0)
code: 0
checksum: 0x9adc
id: 56131
seq: 1
data: d7 d8 db d6 bf f6 24 dd bd fc 37 d3 8d 6b 14 e5 6e 26 a4 d0
a1 59 73 06 2b 93 8a 38 ca da 90 c3 b3 4f 9f 0b 3c 3b 86 05
83 73 93 86 d9 71 18 fa
12:45:45.612 [I] icmp packet received: seq=1, id=56131
12:45:46.613 [I] icmp packet sent: seq=2, id=45956
12:45:46.614 [D] outgoing icmp packet
type: Echo (8)
code: 0
checksum: 0xc153
data: 15 ad 39 fd 8b 0a f5 86 1d f3 e0 45 e2 33 53 3d ee 4c e8 34
23 18 e6 1e e1 e4 99 13 00 22 c0 00 cc ca 3a 77 5e a9 b5 ca
73 f2 7c 5e 0f 74 38 97
12:45:46.614 [D] outgoing ip packet
version: 4
ihl: 5
precedence: Routine (0x0)
delay: Normal (0x0)
throughput: Normal (0x0)
relibility: Normal (0x0)
total length: 84 bytes (data: 64 bytes)
id: 3
flag (df): May Fragment (0x0)
flag (mf): Last Fragment (0x0)
fragment offset: 0
ttl: 255
protocol: ICMP (1)
checksum: 0x37a2
source address: 192.0.2.2
destination address: 192.0.2.1
data: 08 00 c1 53 b3 84 00 02 4b 15 a4 6a 69 5a b7 7e 15 ad 39 fd
8b 0a f5 86 1d f3 e0 45 e2 33 53 3d ee 4c e8 34 23 18 e6 1e
e1 e4 99 13 00 22 c0 00 cc ca 3a 77 5e a9 b5 ca 73 f2 7c 5e
0f 74 38 97
12:45:46.614 [D] outgoing ethernet frame (98 bytes)
type: IPv4 (0x0800)
dst: e2:20:76:2d:5d:2d
src: 00:00:5e:00:53:01
payload: 45 00 00 54 00 03 00 00 ff 01 37 a2 c0 00 02 02 c0 00 02 01
08 00 c1 53 b3 84 00 02 4b 15 a4 6a 69 5a b7 7e 15 ad 39 fd
8b 0a f5 86 1d f3 e0 45 e2 33 53 3d ee 4c e8 34 23 18 e6 1e
e1 e4 99 13 00 22 c0 00 cc ca 3a 77 5e a9 b5 ca 73 f2 7c 5e
0f 74 38 97
12:45:46.615 [D] event occurred
events: 1
device: net1 (tap0)
12:45:46.615 [D] incoming ethernet frame (98 bytes)
type: IPv4 (0x0800)
dst: 00:00:5e:00:53:01
src: e2:20:76:2d:5d:2d
payload: 45 00 00 54 b3 16 00 00 40 01 43 8f c0 00 02 01 c0 00 02 02
00 00 c9 53 b3 84 00 02 4b 15 a4 6a 69 5a b7 7e 15 ad 39 fd
8b 0a f5 86 1d f3 e0 45 e2 33 53 3d ee 4c e8 34 23 18 e6 1e
e1 e4 99 13 00 22 c0 00 cc ca 3a 77 5e a9 b5 ca 73 f2 7c 5e
0f 74 38 97
12:45:46.616 [D] incoming ip packet
version: 4
ihl: 5
precedence: Routine (0x0)
delay: Normal (0x0)
throughput: Normal (0x0)
relibility: Normal (0x0)
total length: 84 bytes (data: 64 bytes)
id: 45846
flag (df): May Fragment (0x0)
flag (mf): Last Fragment (0x0)
fragment offset: 0
ttl: 64
protocol: ICMP (1)
checksum: 0x438f
source address: 192.0.2.1
destination address: 192.0.2.2
data: 00 00 c9 53 b3 84 00 02 4b 15 a4 6a 69 5a b7 7e 15 ad 39 fd
8b 0a f5 86 1d f3 e0 45 e2 33 53 3d ee 4c e8 34 23 18 e6 1e
e1 e4 99 13 00 22 c0 00 cc ca 3a 77 5e a9 b5 ca 73 f2 7c 5e
0f 74 38 97
12:45:46.616 [D] incoming icmp packet
type: Echo Reply (0)
code: 0
checksum: 0xc953
id: 45956
seq: 2
data: 15 ad 39 fd 8b 0a f5 86 1d f3 e0 45 e2 33 53 3d ee 4c e8 34
23 18 e6 1e e1 e4 99 13 00 22 c0 00 cc ca 3a 77 5e a9 b5 ca
73 f2 7c 5e 0f 74 38 97
12:45:46.616 [I] icmp packet received: seq=2, id=45956
12:45:47.616 [I] icmp packet sent: seq=3, id=44940
12:45:47.616 [D] outgoing icmp packet
type: Echo (8)
code: 0
checksum: 0xb270
data: 1c fd 2d 95 ed 19 4e 27 e8 8e 91 bb 81 d3 93 49 09 8c a5 b0
5b ce 22 d4 c6 31 0e df 98 64 89 99 7e 23 af 01 39 e8 47 8c
ba 9d 30 0f b6 ee 7b b7
12:45:47.617 [D] outgoing ip packet
version: 4
ihl: 5
precedence: Routine (0x0)
delay: Normal (0x0)
throughput: Normal (0x0)
relibility: Normal (0x0)
total length: 84 bytes (data: 64 bytes)
id: 4
flag (df): May Fragment (0x0)
flag (mf): Last Fragment (0x0)
fragment offset: 0
ttl: 255
protocol: ICMP (1)
checksum: 0x37a1
source address: 192.0.2.2
destination address: 192.0.2.1
data: 08 00 b2 70 af 8c 00 03 49 2a c6 7e bc 6d c3 d2 1c fd 2d 95
ed 19 4e 27 e8 8e 91 bb 81 d3 93 49 09 8c a5 b0 5b ce 22 d4
c6 31 0e df 98 64 89 99 7e 23 af 01 39 e8 47 8c ba 9d 30 0f
b6 ee 7b b7
12:45:47.617 [D] outgoing ethernet frame (98 bytes)
type: IPv4 (0x0800)
dst: e2:20:76:2d:5d:2d
src: 00:00:5e:00:53:01
payload: 45 00 00 54 00 04 00 00 ff 01 37 a1 c0 00 02 02 c0 00 02 01
08 00 b2 70 af 8c 00 03 49 2a c6 7e bc 6d c3 d2 1c fd 2d 95
ed 19 4e 27 e8 8e 91 bb 81 d3 93 49 09 8c a5 b0 5b ce 22 d4
c6 31 0e df 98 64 89 99 7e 23 af 01 39 e8 47 8c ba 9d 30 0f
b6 ee 7b b7
12:45:47.617 [D] event occurred
events: 1
device: net1 (tap0)
12:45:47.617 [D] incoming ethernet frame (98 bytes)
type: IPv4 (0x0800)
dst: 00:00:5e:00:53:01
src: e2:20:76:2d:5d:2d
payload: 45 00 00 54 b5 72 00 00 40 01 41 33 c0 00 02 01 c0 00 02 02
00 00 ba 70 af 8c 00 03 49 2a c6 7e bc 6d c3 d2 1c fd 2d 95
ed 19 4e 27 e8 8e 91 bb 81 d3 93 49 09 8c a5 b0 5b ce 22 d4
c6 31 0e df 98 64 89 99 7e 23 af 01 39 e8 47 8c ba 9d 30 0f
b6 ee 7b b7
12:45:47.618 [D] incoming ip packet
version: 4
ihl: 5
precedence: Routine (0x0)
delay: Normal (0x0)
throughput: Normal (0x0)
relibility: Normal (0x0)
total length: 84 bytes (data: 64 bytes)
id: 46450
flag (df): May Fragment (0x0)
flag (mf): Last Fragment (0x0)
fragment offset: 0
ttl: 64
protocol: ICMP (1)
checksum: 0x4133
source address: 192.0.2.1
destination address: 192.0.2.2
data: 00 00 ba 70 af 8c 00 03 49 2a c6 7e bc 6d c3 d2 1c fd 2d 95
ed 19 4e 27 e8 8e 91 bb 81 d3 93 49 09 8c a5 b0 5b ce 22 d4
c6 31 0e df 98 64 89 99 7e 23 af 01 39 e8 47 8c ba 9d 30 0f
b6 ee 7b b7
12:45:47.618 [D] incoming icmp packet
type: Echo Reply (0)
code: 0
checksum: 0xba70
id: 44940
seq: 3
data: 1c fd 2d 95 ed 19 4e 27 e8 8e 91 bb 81 d3 93 49 09 8c a5 b0
5b ce 22 d4 c6 31 0e df 98 64 89 99 7e 23 af 01 39 e8 47 8c
ba 9d 30 0f b6 ee 7b b7
12:45:47.618 [I] icmp packet received: seq=3, id=44940