On Tue, 2010-01-12 at 01:30 +0100, David Miller wrote: > From: frank.blaschka@xxxxxxxxxx > Date: Mon, 11 Jan 2010 13:50:50 +0100 > > > From: Ursula Braun <ursula.braun@xxxxxxxxxx> > > > > New feature to trace HiperSockets network traffic for debugging > > purposes. > > > > Signed-off-by: Ursula Braun <ursula.braun@xxxxxxxxxx> > > Signed-off-by: Frank Blaschka <frank.blaschka@xxxxxxxxxx> > How exactly does this work? Dave, HiperSockets provides internal "virtual" Local Area Networks within a System z server for communication between different virtual servers running on one System z server. The HiperSockets Network Traffic Analyzer (HS NTA) is a function available with System z10. It traces messages from and to devices within the same HiperSockets LAN the NTA device belongs to, if the participating LPARs are authorized for sniffing at the SE (Support Element of a System z server). An HS NTA device in Linux on System z is a specialized HiperSockets device managed by the qeth driver and initialized specifically for sniffing. The trigger for an HS device to act as a Network Traffic Analyzer is the sysfs attribute "sniffer". If this attribute is set to 1, the NTA-specific initialization is started when the HS device is brought online. Traffic sniffing starts, once the device is switched into promiscuous mode, for instance by invoking the tcpdump-tool. Regards, Ursula Braun -- To unsubscribe from this list: send the line "unsubscribe linux-s390" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html