2/16/2023 0 Comments Ubuuntu tcpdump wireshark![]() ![]() Listening on mlx5_1, link-type EN10MB (Ethernet), capture size 262144 bytes Tcpdump: verbose output suppressed, use -v or -vv for full protocol decode What is making me scratch my head is when I download the exact same versions in source code form from the site (tcpdump 4.9.3 and libpcap 1.9.1), compile them, then ‘make install’ them, it works just sudo tcpdump -i mlx5_1 In my scenario, I am using a similar config to you, except I am using Ubuntu 20.04 and the following tcpdump -version: My question to you is are you using the Ubuntu distribution’s repo tcpdump package or have you installed them from somewhere else manually? While Samer’s statement about removing the Offload Traffic Sniffer holds true (meaning you can’t enable or disable the sniffer through ethtool anymore), RMDA sniffer support was introduced into libpcap version 1.9.0 or newer and shouldn’t rely on that. I too have been running into the same error as you. Open the pcap through wireshark to verify.Tcpdump -i mlx4_0 -s 0 -w /tmp/traces/capture1.pcap Tcpdump -i mlx5_0 -s 0 -w /tmp/traces/capture1.pcap Install perftest package from MLNX_OFED RPMS directory Install Upstream kernel starting from version 4.9 support sniffing RDMA(RoCE) trafficĭocker run -it -v /dev/infiniband:/dev/infiniband -v /tmp/traces:/tmp/traces -net=host -privileged mellanox/tcpdump-rdma bash ![]() Install OS that is compatible with kernel 4.9 and above MFT 4.9 and above (You can download it from Mellanox Firmware Tools (MFT) ) We removed support for Offloaded Traffic Sniffer feature, but we can suggest using the docker-container solution to use RDMA devices, in order to capture and analyze RDMA packets using tcpdump.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |