lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20221214090124.4c01a360@kernel.org>
Date:   Wed, 14 Dec 2022 09:01:24 -0800
From:   Jakub Kicinski <kuba@...nel.org>
To:     Leon Romanovsky <leon@...nel.org>
Cc:     Alexandra Kossovsky <Alexandra.Kossovsky@...etlabs.ru>,
        Saeed Mahameed <saeedm@...dia.com>,
        Maxim Mikityanskiy <maximmi@...dia.com>, netdev@...r.kernel.org
Subject: Re: [PATCH] net/mlx5e: parameter to disable symmetric hash

On Wed, 14 Dec 2022 17:35:42 +0300 Alexandra Kossovsky wrote:
> Some AF_XDP applications assume standard Topelitz hash when spreading
> traffic accross queues via RSS.  MLX5 driver always set "symmetric"
> bit, which results in unexpected queues for any particular connection.
> 
> With this patch is is possible to disable that symmetric bit via
> use_symmetric_hash module parameter, and use the standard Toeplitz hash
> with well-known predictable result, same as for other NICs.

This module param, OTOH, not okay..

[ https://lore.kernel.org/all/20221214085106.42a88df1@kernel.org/ ]

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ