lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 05 Jun 2013 10:18:46 -0400
From:	Vlad Yasevich <vyasevic@...hat.com>
To:	Sergei Shtylyov <sergei.shtylyov@...entembedded.com>
CC:	netdev@...r.kernel.org, bridge@...ts.linux-foundation.org,
	shemminger@...tta.com
Subject: Re: [PATCHv4 net-next 0/2] Add two new flags to bridge.

On 06/05/2013 10:14 AM, Sergei Shtylyov wrote:
> Hello.
>
> On 05-06-2013 18:07, Vlad Yasevich wrote:
>
>> The following series adds 2 new flags to bridge.  One flag allows
>> the user to control whether mac learning is performed on the interface
>> or not.  By default mac learning is on.
>> The other flag allows the user to control whether unicast traffic
>> is flooded (send without an fdb) to a given unicast port.  Default is
>> on.
>
>> Changes since v4:
>>   - Implemented Stephen's suggestions.
>
>> Changes since v2:
>>   - removed unused "unlock" tag.
>
>> Changes since v1:
>>   - Integrated suggestion from MST to not impact RTM_NEWNEIGH and to
>>     skip lookups when learning is disabled.
>
>> Vlad Yasevich (2):
>>    bridge: Add flag to control mac learning.
>>    bridge: Add a flag to control unicast packet flood.
>
>> Vlad Yasevich (2):
>>    bridge: Add flag to control mac learning.
>>    bridge: Add a flag to control unicast packet flood.
>
>      Hm, why your patches are listed twice?
>

Copy-paste error using prior version description.  There are only 2 
patches.  Sorry about that.

-vlad

> WBR, Sergei
>

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ