lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <51AF47B3.2070902@cogentembedded.com>
Date:	Wed, 05 Jun 2013 18:14:11 +0400
From:	Sergei Shtylyov <sergei.shtylyov@...entembedded.com>
To:	Vlad Yasevich <vyasevic@...hat.com>
CC:	netdev@...r.kernel.org, bridge@...ts.linux-foundation.org,
	shemminger@...tta.com
Subject: Re: [PATCHv4 net-next 0/2] Add two new flags to bridge.

Hello.

On 05-06-2013 18:07, Vlad Yasevich wrote:

> The following series adds 2 new flags to bridge.  One flag allows
> the user to control whether mac learning is performed on the interface
> or not.  By default mac learning is on.
> The other flag allows the user to control whether unicast traffic
> is flooded (send without an fdb) to a given unicast port.  Default is
> on.

> Changes since v4:
>   - Implemented Stephen's suggestions.

> Changes since v2:
>   - removed unused "unlock" tag.

> Changes since v1:
>   - Integrated suggestion from MST to not impact RTM_NEWNEIGH and to
>     skip lookups when learning is disabled.

> Vlad Yasevich (2):
>    bridge: Add flag to control mac learning.
>    bridge: Add a flag to control unicast packet flood.

> Vlad Yasevich (2):
>    bridge: Add flag to control mac learning.
>    bridge: Add a flag to control unicast packet flood.

     Hm, why your patches are listed twice?

WBR, Sergei

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ