lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 23 Nov 2016 18:40:40 +0100 From: Andrew Lunn <andrew@...n.ch> To: Stefan Eichenberger <stefan.eichenberger@...module.com> Cc: Stefan Eichenberger <eichest@...il.com>, vivien.didelot@...oirfairelinux.com, f.fainelli@...il.com, netdev@...r.kernel.org Subject: Re: [PATCH v2] net: dsa: mv88e6xxx: forward unknown mc packets on mv88e6097 On Wed, Nov 23, 2016 at 06:14:41PM +0100, Stefan Eichenberger wrote: > On Wed, Nov 23, 2016 at 05:59:49PM +0100, Andrew Lunn wrote: > > On Wed, Nov 23, 2016 at 05:54:40PM +0100, Stefan Eichenberger wrote: > > > Packets with unknown destination addresses are not forwarded to the cpu > > > port on mv88e6097 based switches (e.g. MV88E6097) at the moment. This > > > commit enables PORT_CONTROL_FORWARD_UNKNOWN_MC for this family. > > > > Please try adding MV88E6XXX_FLAG_EDSA to > > MV88E6XXX_FLAGS_FAMILY_6097. That is the better fix if it works. > > I was even wondering what EDSA means:) Thanks this solved the problem! Plain DSA puts four bytes of header between the MAC source address and the EtherType/Length. EDSA puts in an 8 byte header, and includes an Ethertype value of 0xdada. Having that ethertype value makes it more obvious what is going on. And if you have a recent version of tcpdump, it will decode the header. Andrew
Powered by blists - more mailing lists