Related to post
Sniff RoCE traffic using tcpdump - #2 by samerka
I am able to collect packets, but it ends up collecting tcp, udp packets…
Using tcpdump options like “udp” or “udp port 4791” doesn’t collect any packets.
Any reason? Is there a different way to restrict to collecting only RoCE packets?
To capture RoCE offload packets, you need use latest libpcap and rebuild tcpdump.
Follow tcpdump guide compile libpcap and tcpdump.
This file has been truncated.
# libpcap installation notes
Libpcap can be built either with the configure script and `make`, or
with CMake and any build system supported by CMake.
To build libpcap with the configure script and `make`:
* Run `./configure` (a shell script). The configure script will
determine your system attributes and generate an appropriate `Makefile`
from `Makefile.in`. The configure script has a number of options to
control the configuration of libpcap; `./configure --help`` will show
* Next, run `make`. If everything goes well, you can
`su` to root and run `make install`. However, you need not install
libpcap if you just want to build tcpdump; just make sure the tcpdump
and libpcap directory trees have the same parent directory.
To build libpcap with CMake and the build system of your choice, from
the command line:
Actual issue is that I’m not able to filter during collection (I can filter later in wireshark or by reading pcap file…)
sudo tcpdump -i mlx5_0 -s 0 -w rdma.pcap
This collects all packets, udp, tcp, any port, etc… This is too much for debugging…
sudo tcpdump -i mlx5_0 udp port 4791 -s 0 -w rdma.pcap
sudo tcpdump -i mlx5_0 udp -s 0 -w rdma.pcap
Same here… No packets collected.
This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.