diff options
author | Dave Barach <dave@barachs.net> | 2019-01-17 09:30:43 -0500 |
---|---|---|
committer | Dave Barach <dave@barachs.net> | 2019-01-17 09:31:00 -0500 |
commit | 1d052d2ef211c1dc5cc1f11b84feded90e1b5b27 (patch) | |
tree | 8a033391de5ee6f40bd0f00bbee290c8f99f834a /extras/wireshark | |
parent | a704f5b2a97346eaaeec466cda6169406a313490 (diff) |
DOC ONLY: wireshark dissector upstreamed
Remove the last remnant from extra/wireshark, update the Sphinx docs
Change-Id: I5886557f17192475c03fcb0dfde581e1e63cea5c
Signed-off-by: Dave Barach <dave@barachs.net>
Diffstat (limited to 'extras/wireshark')
-rw-r--r-- | extras/wireshark/readme.md | 84 |
1 files changed, 0 insertions, 84 deletions
diff --git a/extras/wireshark/readme.md b/extras/wireshark/readme.md deleted file mode 100644 index fe4fdbfeb5a..00000000000 --- a/extras/wireshark/readme.md +++ /dev/null @@ -1,84 +0,0 @@ -How to build a vpp dispatch trace aware Wireshark -================================================= - -We have upstreamed our vpp pcap dispatch trace dissector. After -working through a laundry list of issues discovered during the -upstreaming process, it appears that the code is close to being -merged. See https://code.wireshark.org/review/#/c/31466. - -As of this writing, the simplest way to build a vpp dispatch trace -aware wireshark is to clone the wireshark repo, and apply the vpp -dissector patch. - - -Download wireshark source code ------------------------------- - -The wireshark git repo is large, so it takes a while to clone. - -``` - git clone https://code.wireshark.org/review/wireshark -``` - -Download Gerrit 31466 using the URL shown above. If you have "git -review" set up, it's as simple as "git review -d 31466" in the wireshark -workspace. - -Alternatively, download a patch-file from the gerrit server and apply -the patch. - -Install prerequisite Debian packages ------------------------------------- - -Here is a list of prerequisite packages which must be present in order -to compile wireshark, beyond what's typically installed on an Ubuntu -18.04 system: - -``` - libgcrypt11-dev flex bison qtbase5-dev qttools5-dev-tools qttools5-dev - qtmultimedia5-dev libqt5svg5-dev libpcap-dev qt5-default -``` - -Compile Wireshark ------------------ - -Wireshark uses cmake, so it's relatively easy to build, at least on -Ubuntu 18.04. - -``` - $ cd wireshark - $ mkdir build - $ cd build - $ cmake -G Ninja ../ - $ ninja -j 8 - $ sudo ninja install -``` - -Make a pcap dispatch trace --------------------------- - -Configure vpp to pass traffic in some fashion or other, and then: - -``` - vpp# pcap dispatch trace on max 10000 file vppcapture buffer-trace dpdk-input 1000 - -``` - -or similar. Run traffic for long enough to capture some data. Save the -dispatch trace capture like so: - -``` - vpp# pcap dispatch trace off -``` - -Display in Wireshark --------------------- - -Display /tmp/vppcapture in the vpp-enabled version of wireshark. -Normal version of wireshark will refuse to process vpp dispatch trace -pcap files because they won't understand the encap type. - -Set wireshark to filter on vpp.bufferindex to watch a single packet -traverse the forwarding graph. Otherwise, you'll see a vector of -packets in e.g. ip4-lookup, then a vector of packets in ip4-rewrite, -etc. |