lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 1 Feb 2022 19:20:14 +0200 From: Vladimir Oltean <olteanv@...il.com> To: Tobias Waldekranz <tobias@...dekranz.com> Cc: davem@...emloft.net, kuba@...nel.org, netdev@...r.kernel.org, Andrew Lunn <andrew@...n.ch>, Vivien Didelot <vivien.didelot@...il.com>, Florian Fainelli <f.fainelli@...il.com>, linux-kernel@...r.kernel.org Subject: Re: [PATCH net-next 1/5] net: dsa: mv88e6xxx: Improve isolation of standalone ports On Tue, Feb 01, 2022 at 07:06:34PM +0200, Vladimir Oltean wrote: > Question: can we disable learning per FID? I searched for this in the > limited documentation that I have, but I didn't see such option. > Doing this would be advantageous because we'd end up with a bit more > space in the ATU. With your solution we're just doing damage control. Answering my own question... Your patch 4/5 does disable learning for packets coming from standalone ports, but not by FID, but by VTU policy. So that's good. Reading on...
Powered by blists - more mailing lists