lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20170210.143636.253114480501653886.davem@davemloft.net>
Date:   Fri, 10 Feb 2017 14:36:36 -0500 (EST)
From:   David Miller <davem@...emloft.net>
To:     ogerlitz@...lanox.com
Cc:     daniel@...earbox.net, jakub.kicinski@...ronome.com,
        john.r.fastabend@...el.com, amirva@...ai.me, netdev@...r.kernel.org
Subject: Re: [PATCH net-next 0/4] net/sched: Use TC skip flags to reflect
 HW offload status

From: Or Gerlitz <ogerlitz@...lanox.com>
Date: Thu,  9 Feb 2017 16:18:04 +0200

> Currently there is no way of querying whether a filter is
> offloaded to HW or not when using both policy (no flag).
> 
> Reuse the skip flags to show the insertion status by setting
> the skip_hw flag in case the filter wasn't offloaded.
> 
> The bpf patch is compile tested only, Daniel/Jakub, will 
> appreciate your review/ack.
 ...

I'm learning towards suggesting that you use new flags, this way it
will be unambiguous whether we are running an old kernel.

If you just use the skip flag, it's impossible to tell the difference.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ