Hi All,
*Context*: Using dpdk + vpp for telecom network user plane processing
*Desired*: want to use dpdk crypto-dev scheduler to have 2 cores dedicated
for crypto operations
*Issue*: crypto devices of different types (AES_MB & AES_GCM) are not
supported concurrently.
*Query*: *Have anyone used
Hi Guys,
I have a question about ipsec policy in VPP. From my testing and deep
into the code, I found there's a no confliction detection and resolving in
current implementation for ipsec policy which means I could add two polices
with some overlap area with same priority. Should we add
Sure, that’s a good option. But, the point is that the stack won’t try to
figure out if the output interface is actually capable of honoring the
“offload” flag. Still need to think if this could be handled better.
Also, note that the stack handles segmentation itself, it does not offload
rx/tx
Am Mo., 29. Apr. 2019 um 18:21 Uhr schrieb Florin Coras <
fcoras.li...@gmail.com>:
> Unfortunately, as things stand, the tunnel should compute the checksum
> before encapsulating the traffic. Otherwise the output node won’t be able
> to find the right headers.
>
> Will look into simplifying this.
Unfortunately, as things stand, the tunnel should compute the checksum before
encapsulating the traffic. Otherwise the output node won’t be able to find the
right headers.
Will look into simplifying this.
Florin
> On Apr 29, 2019, at 8:18 AM, Andreas Schultz
> wrote:
>
> Thanks, that
Thanks, that helped a lot. I found that traffic is not passing through the
node as I expected it.
The actual graph is
tcp4-output -> ip4-lookup -> ip4-rewrite -> upf-if-input
Note: upf-if-input is the node function of an interface. It is found
through a fib entry that look like this:
Hi Andreas,
The tracing should work but because we’re reusing the syn packet to build the
syn-ack, it might not show correctly. Could you breakpoint the tcp4-output and
try to see if the trace code is hit?
As for the checksum, tcp only tags the packet with a request to have it
offloaded. If
Try “pcap dispatch trace on max 1 buffer-trace
1000”, cause a transaction, “pcap dispatch trace off”; then look at the
resulting trace w/ a vpp-dispatch-trace enabled wireshark. See
https://fdio-vpp.readthedocs.io/en/latest/gettingstarted/developers/buildwireshark.html
HTH... Dave
From:
Hello VPP reviewers.
When adding a comment to API flag day document,
I have stumbled upon an idea,
that is somewhat larger than the document itself.
It has to do with a weaker form of VPP backward compatibility,
specific to clients using Python API (PAPI).
Here is the relevant part of the
Hi,
I'm trying to debug a problem and need to trace tcp4-output with vpp 19.04.
So far I have tried it with "trace add tcp4-output 100 verbose", but that
is not producing the expected result. The trace buffer is always empty.
I was expecting that "trace add af-packet-input 100" would also trace
Hello,
We are experiencing quite a lot of network issues when running CSIT tests for
19.04 report:
Caused: hudson.remoting.ChannelClosedException: Channel "unknown": Remote call
on JNLP4-connect connection from
vex-yul-rot-ingress-1.ci.codeaurora.org/10.30.48.3:41068 failed. The channel is
11 matches
Mail list logo