From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx03.mlp.com (mx03.mlp.com [213.52.242.172]) by dpdk.org (Postfix) with ESMTP id 408E3DE0 for ; Mon, 13 Feb 2017 17:29:12 +0100 (CET) IronPort-PHdr: =?us-ascii?q?9a23=3AQZROYx2IKFTH0L05smDT+DRfVm0co7zxezQtwd8Z?= =?us-ascii?q?seIeLfad9pjvdHbS+e9qxAeQG96Kt7QV0KGG7OjJYi8p2d65qncMcZhBBVcuqP?= =?us-ascii?q?49uEgeOvODElDxN/XwbiY3T4xoXV5h+GynYwAOQJ6tL1LdrWev4jEMBx7xKRR6?= =?us-ascii?q?JvjvGo7Vks+7y/2+94fdbghMizexe7d/IRu5oQjStMQdnJdvJLs2xhbVuHVDZv?= =?us-ascii?q?5YxXlvJVKdnhb84tm/8Zt++ClOuPwv6tBNX7zic6s3UbJXAjImM3so5MLwrhnM?= =?us-ascii?q?URGP5noHXWoIlBdDHhXI4wv7Xpf1tSv6q/Z91SyHNsD4Ubw4RTKv5LptRRT1ii?= =?us-ascii?q?kIKiQ5/XnXhMJukaxbvByvqR9+w4HIb46YL+Bxcr/ZcN4AWWZNQthdWipcCY28?= =?us-ascii?q?dYsPCO8BMP5Wo4f7vVQPrAGxBROyC+PpyT9IgWf61rA13OQlCw7JwRErE9YOv3?= =?us-ascii?q?TTttX1MLodX/uozKbSyzXDc/Za1Tng44XPfR8hpeuDUq9qfcTX00YuFhnKjk+O?= =?us-ascii?q?pozjPDOV0f8Asmac7+p6UeKglncnqxxrrTip2scgkJXGhoUQyl3d8yhy3YU7Jc?= =?us-ascii?q?WgRUJmfdKoCphduiCAO4Z4XM8uWW9ltSIixrEbpZK3ZigHxI4lyhPfcfCLbpSE?= =?us-ascii?q?7g/7WOafPzh1h25pdbe6ihuz8kWtxOPxW8y73VtErSdJj9zBtn4M2hDO6cWKT/?= =?us-ascii?q?V980W71jqS0Q3Y9/tKLloulaXBLp4s2rswlp0OvkvdBiL2g0D2jLOOdkUj5+io?= =?us-ascii?q?9/zrYrX4qZ+YMI95kg7wPaUglcKiA+o2LBYDU3SU9OimyLDt81f1TrJMgPMsiK?= =?us-ascii?q?XWrJfaJcEDqq64BQ9azJoj5g6iAzu6ytgVnngKIEhLdR6ZlYTkNVXDLOj9Dfil?= =?us-ascii?q?glSslDlrx+rBPr3kGpjCIXzDn638crpn7UBT0gsywspF551KDLEBI/XzV1T/td?= =?us-ascii?q?zfFB85NxG7w//6CNpn0IMeRXiDDbOeMKPXqVOI/P4gI/GQZI8JvzbwM+Ul5+Xw?= =?us-ascii?q?gn8jgl8QZrSm3YMKZ3C7BPhmJF+ZYXW/yusGRC0XpQckV8TmkFGBFzlJaDz6C7?= =?us-ascii?q?8n6ysgII6+AYSFQZqi1u+vxiC+S9dyb3JPEF2KEnCsP7uAUvtEKB2VOMttqyEN?= =?us-ascii?q?U6TgAcd16xWnuEnewqhuNOfS+SowqpX50NRs+uTViVc58jkiXJfV6H2EU2whxj?= =?us-ascii?q?BAfDQxxq0q+UE=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A2HrBQBo3qFY/ycgVgpeHQEFAQsBFwEBB?= =?us-ascii?q?AEBCgEBgkSBNBCBEK9wgx2EGxqGCAKCLRQBAQEBAQEBAQEBAQJ8C4IzGYJRXgE?= =?us-ascii?q?MCRVWJgEEGxG6RCaLHwEBCAImhk2JRIJKDFyCMQWbcgGcaYYtApMVNoEiUYcVi?= =?us-ascii?q?haBDAEBAQ?= X-IPAS-Result: =?us-ascii?q?A2HrBQBo3qFY/ycgVgpeHQEFAQsBFwEBBAEBCgEBgkSBNBC?= =?us-ascii?q?BEK9wgx2EGxqGCAKCLRQBAQEBAQEBAQEBAQJ8C4IzGYJRXgEMCRVWJgEEGxG6R?= =?us-ascii?q?CaLHwEBCAImhk2JRIJKDFyCMQWbcgGcaYYtApMVNoEiUYcVihaBDAEBAQ?= X-IronPort-AV: E=Sophos;i="5.35,156,1484024400"; d="scan'208,217";a="16646030" X-IronPort-Outbreak-Status: No, level 0, Unknown - Unknown Received: from unknown (HELO EXUSHTC04.AD.MLP.com) ([10.86.32.39]) by smtptlc.mlp.com with ESMTP; 13 Feb 2017 11:28:45 -0500 Received: from EXUSMBX02.AD.MLP.com ([fe80::6833:4381:f618:f7a1]) by EXUSHTC04.AD.MLP.com ([::1]) with mapi id 14.03.0248.002; Mon, 13 Feb 2017 11:26:44 -0500 From: "Lazarenko, Vlad (WorldQuant)" To: "users@dpdk.org" Thread-Topic: KNI & SIOCSIFFLAGS permission? Thread-Index: AdKGFfUMVX0AsIKESWexmy7bqcvo5g== Date: Mon, 13 Feb 2017 16:26:43 +0000 Message-ID: <790E2AC11206AC46B8F4BB82078E34F80628342B@EXUSMBX02.AD.MLP.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.5.75.101] MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.15 Subject: [dpdk-users] KNI & SIOCSIFFLAGS permission? X-BeenThere: users@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK usage discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 13 Feb 2017 16:29:12 -0000 Howdy, When using KNI, I'm trying to programmatically enable the port by bringing = the interface up by calling ioctl with SIOCGIFFLAGS (thanks Dumitru Caera a= nd Juniper's warp17 for great help getting KNI wrapped in PMD the right way= !). However, kernel does not allow me to do this unless I am root or the ex= ecutable has CAP_NET_ADMIN capability. Warp17 suggests to change user of th= e executable to root and give it SUI bit. Needless to say that configuring = capabilities or running my process as root is a pain in the neck. So the qu= estion is how do you guys usually go about this? Also, since we already hav= e access to rte_kni.ko, can we somehow add code there to enable us to bypas= s this kernel permission check just to make life easier? Thanks, Vlad ###########################################################################= ######## The information contained in this communication is confidential, may be subject to legal privilege, and is intended only for the individual named. If you are not the named addressee, please notify the sender immediately and delete this email from your system. The views expressed in this email are the views of the sender only. Outgoing and incoming electronic communicati= ons to this address are electronically archived and subject to review and/or di= sclosure to someone other than the recipient. ###########################################################################= ########