| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20110805041309.GB15141@zapo> Date: Fri, 5 Aug 2011 06:13:09 +0200 From: "Edgar E. Iglesias" <edgar.iglesias@...il.com> To: Joakim Tjernlund <joakim.tjernlund@...nsmode.se> Cc: Ben Hutchings <bhutchings@...arflare.com>, netdev@...r.kernel.org Subject: Re: PHY down? On Tue, Aug 02, 2011 at 02:24:04PM +0200, Joakim Tjernlund wrote: > Ben Hutchings <bhutchings@...arflare.com> wrote on 2011/08/02 13:01:08: > > > > On Tue, 2011-08-02 at 11:24 +0200, Joakim Tjernlund wrote: > > > I must be missing something obvious but I cannot find how > > > to bring eth0's PHY down (link down) from user space. > > > Tried various settings with ethtool and ifconfig eth0 down but it didn't help. > > > > If you configure an interface down, and if the interface is not used for > > remote management, then some drivers will turn the PHY off. But there > > is no general way to control this explicitly. > > OK, when to stop the PHY doesn't seem standardized. Seem logical to me > to also turn off the PHY when interface is configured down. Perhaps this could > be agreed upon? > What does remote management mean? How do I identify if the I/F is used for remote management? > > Jocke I'd rather see an explicit way of turning off the PHY. Downing the interface might be useful without killing the PHY. I've seen PoE switches that kill you when you bring the link down or reset the PHY after once beeing up, Down/up of interface might become impossible in some environments if we would standardize on PHY off for interface down. Maybe an explicit ethtool option? Cheers -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists