lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 09 Jul 2014 16:44:20 -0700 (PDT) From: David Miller <davem@...emloft.net> To: mugunthanvnm@...com Cc: netdev@...r.kernel.org, linux-api@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [net-next PATCH v2 0/3] Broadcast/Multicast rate limit via Ethtool Coalesce From: Mugunthan V N <mugunthanvnm@...com> Date: Wed, 9 Jul 2014 12:44:07 +0530 > A system/cpu can be loaded by a hacker with flooding of broadcast or > multicast packets, to prevent this some Ethernet controllers like CPSW > provide a mechanism to limit the broadcast/multicast packet rate via > hardware limiters. This patch series enables this feature via > Ethtool Coalesce. This is pretty bogus if you ask me. What is the difference from accepting a high rate of unicast packets? I say it is no different. Therefore, this feature makes no sense to me at all. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists