lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BLUPR0701MB2004623B3F087A8213B2AEBF8DCA0@BLUPR0701MB2004.namprd07.prod.outlook.com>
Date:   Mon, 5 Jun 2017 14:03:14 +0000
From:   "Mintz, Yuval" <Yuval.Mintz@...ium.com>
To:     Ganesh Goudar <ganeshgr@...lsio.com>,
        "netdev@...r.kernel.org" <netdev@...r.kernel.org>,
        "davem@...emloft.net" <davem@...emloft.net>
CC:     "nirranjan@...lsio.com" <nirranjan@...lsio.com>,
        "kumaras@...lsio.com" <kumaras@...lsio.com>
Subject: RE: [PATCH] cxgb4: implement ndo_set_vf_rate()

> +	pktsize = be16_to_cpu(port_rpl.u.info.mtu);
> +	/* subtract ethhdr size and 4 bytes crc since, f/w appends it */
> +	pktsize = pktsize - sizeof(struct ethhdr) - 4;
> +	/* subtract ipv4 hdr size, tcp hdr size to get typical IPv4 MSS size */
> +	pktsize = pktsize - sizeof(struct iphdr) - sizeof(struct tcphdr);
> +	/* configure Traffic Class for rate-limiting */
> +	ret = t4_sched_params(adap, SCHED_CLASS_TYPE_PACKET,
> +			      SCHED_CLASS_LEVEL_CL_RL,
> +			      SCHED_CLASS_MODE_CLASS,
> +			      SCHED_CLASS_RATEUNIT_BITS,
> +			      SCHED_CLASS_RATEMODE_ABS,
> +			      pi->port_id, class_id, 0,
> +			      max_tx_rate * 1000, 0, pktsize);

Does it mean you're achieving throughput limitation by
limiting the PP/s?

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ