DPDK patches and discussions
 help / color / mirror / Atom feed
From: Edison So <edison.so2@gmail.com>
To: dev@dpdk.org
Subject: [dpdk-dev] SR-IOV - Spoofed packets detected on Intel Corporation 82599EB 2-port 10G NIC Card
Date: Tue, 8 May 2018 09:16:53 -0400	[thread overview]
Message-ID: <CAO-yB4EUCXbkUfALEdSY4+=PP9q5Rz0DfA95DEq6_=kpGxe7Yw@mail.gmail.com> (raw)

Hello,

I have a question about disabling anti-MAC spoofing feature on  Intel
82599EB 2-port 10G NIC Card.

Below is the description of the issue.

*DPDK Version*

17.02

*Background*

1.    I installed ESXi 6.5 on a Dell PowerEdge R630 with a 2-port 82599EB
10G NIC.

2.    I installed two CentOS 7 VMWare VMs with DPDK.

*DPDK Verification*



On each VM running DPDK, I checked:

./dpdk-devbind.py --status



Network devices using DPDK-compatible driver

============================================

*0000:0b:00.0 '82599 Ethernet Controller Virtual Function' drv=igb_uio
unused=*



Network devices using kernel driver

===================================

0000:13:00.0 'VMXNET3 Ethernet Controller' if=eno33559296 drv=vmxnet3
unused=igb_uio *Active*



Other network devices

=====================

<none>



Crypto devices using DPDK-compatible driver

===========================================

<none>



Crypto devices using kernel driver

==================================

<none>



Other crypto devices

====================

<none>

On the VM, I used testpmd to disable MAC anti-spoofing and got an error:

testpmd> set vf mac antispoof 0 0 off

function not implemented

testpmd>



*SR-IOV Configuration on ESXi for each VM*

1.    I am using SR-IOV on the NIC ports. On each of the VM, I created a
new network adapter on the first VM as follows with *one* Virtual Function.

A.    Network Adapter 1: *10G port group 1*

§  Adapter Type: *SR-IOV passthrough*

§  Physical function: *82599EB 10-Gigabit SFI/SFP+ Network Connection -
0000:82:00.0*

§  MAC Address: *Automatic*

§  Guest OS MTU Change: *Disallow*

2.    On top of the creation of the new adapter, I also reserved some
memory as required by SR-IOV.

3.    I did the same on the second VM.

B.    Network Adapter 1: *10G port group 2*

§  Adapter Type: *SR-IOV passthrough*

§  Physical function: *82599EB 10-Gigabit SFI/SFP+ Network Connection -
0000:82:00.1*

§  MAC Address: *Automatic*

§  Guest OS MTU Change: *Disallow*

4.    Of course, each 10G port group is linked to a standard virtual group
which in turn is linked to a 82599EB 10G port (Uplink Port)

*Traffic Generation*

1.    I have a PCAP file which has packets with different MAC addresses
than the DPDK interface on the first VM.

2.    I generated a constant traffic from the first VM to the second VM
using the PCAP file and none was received on the second VM.

3.    I sshed to the ESXI host and ran *dmesg* and got the following error
messages repeatedly:

*2018-05-04T23:39:00.679Z cpu31:66145)<4>ixgbe 0000:82:00.0: vmnic4: 512
Spoofed packets detected*

4.    I googled this error and somewhat have concluded that this error may
have something to do with the *MAC Spoofing* feature on the 82599EB 10G NIC
card. How do I disable it?

5.    The 82599EB 10G NIC card using *esxcli* (on ESXi host) displays the
following information:



[root@vm:/vmfs/volumes/5acbc358-de2034d6-5472-90e2bac73ffc/VM1] *esxcli
network nic get -n vmnic4*

   Advertised Auto Negotiation: true

   Advertised Link Modes: 1000BaseT/Full, 10000BaseT/Full

   Auto Negotiation: true

   Cable Type: FIBRE

   Current Message Level: 7

   Driver Info:

         Bus Info: 0000:82:00.0

         Driver: ixgbe

         Firmware Version: 0x61bd0001

         Version: 3.7.13.7.14iov-NAPI

   Link Detected: true

   Link Status: Up

   Name: vmnic4

   PHYAddress: 0

   Pause Autonegotiate: true

   Pause RX: true

   Pause TX: true

   Supported Ports: FIBRE

   Supports Auto Negotiation: true

   Supports Pause: true

   Supports Wakeon: false

   Transceiver: external

   Virtual Address: 00:50:56:55:91:0c

   Wakeon: None



*Questions*

1. Is MAC anti-spoofing supported in DPDK version 17.02? If not, which
version supports MAC anti-spoofing? If supported, how can I disable it?

2. How do I determine the port id and vf id?


Your help is greatly appreciated.

                 reply	other threads:[~2018-05-08 13:16 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='CAO-yB4EUCXbkUfALEdSY4+=PP9q5Rz0DfA95DEq6_=kpGxe7Yw@mail.gmail.com' \
    --to=edison.so2@gmail.com \
    --cc=dev@dpdk.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).