lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1351194525.2662.21.camel@bwh-desktop.uk.solarflarecom.com> Date: Thu, 25 Oct 2012 20:48:45 +0100 From: Ben Hutchings <bhutchings@...arflare.com> To: Chris Metcalf <cmetcalf@...era.com> CC: <netdev@...r.kernel.org>, <linux-kernel@...r.kernel.org> Subject: Re: [PATCH] tilegx: fix some issues in the SW TSO support On Thu, 2012-10-25 at 20:36 +0100, Ben Hutchings wrote: [...] > There's a simple way to test this - configure the 'attacker' host and > interface like this: > > # ip link set $IFACE mtu 128 > # sysctl net.ipv4.route.min_adv_mss=88 > > and then use something like netperf to generate a high bandwidth stream > of TCP traffic toward it from the tilegx interface. Also you would need to run some other traffic in parallel (multiple streams to the 'attacker' and some more normal streams) to ensure there is real contention. Ben. -- Ben Hutchings, Staff Engineer, Solarflare Not speaking for my employer; that's the marketing department's job. They asked us to note that Solarflare product names are trademarked. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists