Thanks Mrityunjay,
CXGBE_PMD is enabled by default in VPP dpdk build, the PMD is built and the
interfaces are detected, however, as you can see from the backtrace is dies
when trying to link_update? (I assume)
Best,
Mohammed
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this
Just a general followup in case tl;dr
The point of traffic flow security/confidentiality is to hide the effects of
the user traffic on the secure tunnel output. With IPTFS there is a complete
decoupling so that one cannot infer anything about the encapsulated traffic
from the IPsec tunnel data
> On May 9, 2020, at 7:23 AM, Neale Ranns via lists.fd.io
> wrote:
>
>
>
> Hi Chris,
>
>
> > Are there other properties of a tunnel mode SA that you need that are lost
> > with this approach?
>
> I need to use tunnel mode SAs provided by IKEv2. Transport mode is an
> optional (normally on-
Hi Mohammed
I guess, If you are lucky, then below patch will work for you. Hope
your firmware version >= 1.17.14.0.
diff --git a/build/external/packages/dpdk.mk b/build/external/packages/
dpdk.mk
index a068210..49fcc5a 100644
--- a/build/external/packages/dpdk.mk
+++ b/build/external/packages/dp
I am facing crash issue on startup running Chelsio T6 NIC (cxgb pmd)
Also tested with v19.08.2 and v18.10
OS:
CentOS 7
Config:
unix { interactive } dpdk { dev :18:00.4 }
Backtrace:
#0 0x7f87a15f0387 in raise () from /lib64/libc.so.6
#1 0x7f87a15f1a78 in abort () from /lib64/libc.s
Another solution is to redirect the traffic from punt node to your feature
node. Here you can match on packets of interest and send them to interfere
output node.
Thanks,
Rajith
On Sat 9 May, 2020, 3:43 PM Mrityunjay Kumar, wrote:
> which vpp version are you heading? If you r using 19.05 or les