Offloaded Traffic Sniffer

Linux Kernel Upstream Release Notes v5.17
Warning

Supported in ConnectX®-4 and above adapter cards.

Offloaded Traffic Sniffer allows bypass kernel traffic (such as RoCE, VMA, and DPDK) to be captured by existing packet analyzer, such as tcpdump.

Procedure_Heading_Icon.PNG

To enable Offloaded Traffic Sniffer:

  1. Turn on the new ethtool private flags "sniffer" (off by default).

    Copy
    Copied!
                

    $ ethtool --set-priv-flags enp130s0f0 sniffer on

  2. Once the sniffer flags are set on the desired Ethernet interface, run tcpdump to capture the interface's bypass kernel traffic.

    Warning

    Note that enabling Offloaded Traffic Sniffer can cause bypass kernel traffic speed degradation.

For examples on how to dump RDMA traffic using the Inbox tcpdump tool for ConnectX-4 adapter cards, click here.

© Copyright 2023, NVIDIA. Last updated on Oct 11, 2023.