jpaul2
December 27, 2022, 5:50am
1
Related to post Sniff RoCE traffic using tcpdump - #2 by samerka
I am able to collect packets, but it ends up collecting tcp, udp packets…
Using tcpdump options like “udp” or “udp port 4791” doesn’t collect any packets.
Any reason? Is there a different way to restrict to collecting only RoCE packets?
To capture RoCE offload packets, you need use latest libpcap and rebuild tcpdump.
Follow tcpdump guide compile libpcap and tcpdump.
# libpcap installation notes
Libpcap can be built either with the configure script and `make`, or
with CMake and any build system supported by CMake.
To build libpcap with the configure script and `make`:
* Run `./configure` (a shell script). The configure script will
determine your system attributes and generate an appropriate `Makefile`
from `Makefile.in`. The configure script has a number of options to
control the configuration of libpcap; `./configure --help`` will show
them.
* Next, run `make`. If everything goes well, you can
`su` to root and run `make install`. However, you need not install
libpcap if you just want to build tcpdump; just make sure the tcpdump
and libpcap directory trees have the same parent directory.
To build libpcap with CMake and the build system of your choice, from
the command line:
This file has been truncated. show original
jpaul2
December 29, 2022, 5:23am
3
Thanks…
Actual issue is that I’m not able to filter during collection (I can filter later in wireshark or by reading pcap file…)
sudo tcpdump -i mlx5_0 -s 0 -w rdma.pcap
This collects all packets, udp, tcp, any port, etc… This is too much for debugging…
sudo tcpdump -i mlx5_0 udp port 4791 -s 0 -w rdma.pcap
sudo tcpdump -i mlx5_0 udp -s 0 -w rdma.pcap
Same here… No packets collected.
system
Closed
January 12, 2023, 5:24am
4
This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.