lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 23 Jun 2017 16:59:28 +0000
From:   "Keller, Jacob E" <jacob.e.keller@...el.com>
To:     Tariq Toukan <tariqt@...lanox.com>
CC:     Linux Kernel Network Developers <netdev@...r.kernel.org>,
        Saeed Mahameed <saeedm@...lanox.com>,
        Eran Ben Elisha <eranbe@...lanox.com>
Subject: RE: RXFH manual configuration

> -----Original Message-----
> From: Tariq Toukan [mailto:tariqt@...lanox.com]
> Sent: Sunday, June 18, 2017 1:32 AM
> To: Keller, Jacob E <jacob.e.keller@...el.com>
> Cc: Linux Kernel Network Developers <netdev@...r.kernel.org>; Saeed
> Mahameed <saeedm@...lanox.com>; Eran Ben Elisha
> <eranbe@...lanox.com>
> Subject: RXFH manual configuration
> 
> Hi Jacob,
> 
> I am looking at your patch:
> d4ab4286276f ethtool: correctly ensure {GS}CHANNELS doesn't conflict ...
> 
> I wonder - if I want to configure the number of channels (ethtool -L),
> without being aware to the history of indirection table (manually set or
> not), how can I know what is the expected behavior?
> I should be able, from userspace, to query the value of
> netif_is_rxfh_configured() in order to decide whether the outcome of an
> ethtool -L command is correct or not.
> 
> Do you know if this indication exists?
> 
> Thanks,
> Tariq

Hi,

I believe you can check the flags value, from /sys/class/net/<device>/flags, though you'll have to manually parse that. I don't think iproute2 suite shows this flag, but i suspect it could be modified to do so. Specifically you check for IFF_RXFH_CONFIGURED

Thanks,
Jake

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ