Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Time stamping resolution difference between netmap-libpcap and no netmap #1

Open
GoogleCodeExporter opened this issue Mar 30, 2015 · 3 comments

Comments

@GoogleCodeExporter
Copy link

What steps will reproduce the problem?
1. Run tcpdump against an interface in netmap mode (against incoming traffic)
2. Look at the pcap in wireshark, timing resolution is in milliseconds
3. Run tcpdump against an interface in standard mode (against incoming traffic)
4. Look at the pcap in wireshark, timing resolution is in microseconds

What is the expected output? What do you see instead?
I'm running traffic to my DUT, which then processes the packets. I then save 
the egress traffic from DUT to pcap using traffic using netmap-libpcap. 
Netmap-libpcap has allowed to save packets at high speeds, but timestamping on 
the receiving side should also be timestamped at microsecond level

What version of the product are you using? On what operating system?
OS: Ubuntu 14.04 64bit (3.13.0-36-generic)
netmap git HEAD: 3ccdadad7d80bb1bc569d1f72ba3ece902350f65
netmap-libpcap git HEAD: 0890b993dae48767af172b693f2d664181dbe943
tcpdump: version 4.5.1

Please provide any additional information below.

I have attached three pcaps:

1. adapter_rx_timestamp1_netmap.pcap - captured via tcpdump -nei netmap:ethX
In this file, notice rx timestamp resolution is in micro-seconds

2. adapter_rx_timestamp3_nonetmap.pcap - captured via tcpdump -nei ethX
In this file, notice rx timestamp resolution is in milli-seconds

Original issue reported on code.google.com by morph...@gmail.com on 24 Sep 2014 at 10:01

Attachments:

@morphyno
Copy link

morphyno commented Mar 3, 2016

I think this can be closed now

daisuke-k pushed a commit to daisuke-k/netmap-libpcap that referenced this issue Aug 29, 2016
The warning was:
CID 602256 (luigirizzo#1 of 2): Buffer not null terminated (BUFFER_SIZE_WARNING)
CID 602256 (luigirizzo#2 of 2): Buffer not null terminated (BUFFER_SIZE_WARNING)
buffer_size_warning: Calling strncpy with a maximum size argument of 16 bytes
on destination array ifr.ifr_ifrn.ifrn_name of size 16 bytes might leave
the destination string unterminated.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants