lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Sat, 15 Jun 2019 13:35:13 -0700 (PDT)
From:   David Miller <davem@...emloft.net>
To:     linux@...linux.org.uk
Cc:     vivien.didelot@...il.com, netdev@...r.kernel.org, andrew@...n.ch,
        f.fainelli@...il.com
Subject: Re: [PATCH net-next] net: dsa: mv88e6xxx: do not flood CPU with
 unknown multicast

From: Russell King - ARM Linux admin <linux@...linux.org.uk>
Date: Sat, 15 Jun 2019 21:28:10 +0100

> On Sat, Jun 15, 2019 at 01:25:55PM -0700, David Miller wrote:
>> From: Vivien Didelot <vivien.didelot@...il.com>
>> Date: Wed, 12 Jun 2019 18:33:44 -0400
>> 
>> > The DSA ports must flood unknown unicast and multicast, but the switch
>> > must not flood the CPU ports with unknown multicast, as this results
>> > in a lot of undesirable traffic that the network stack needs to filter
>> > in software.
>> > 
>> > Signed-off-by: Vivien Didelot <vivien.didelot@...il.com>
>> 
>> Applied.
> 
> Hi Dave,
> 
> We found this breaks IPv6, so it shouldn't have been applied (which is
> the point I raised when I replied to Vivien).  Vivien is now able to
> reproduce that.
> 
> I guess you need a revert patch now?

Yep, I'll revert, thanks for letting me know.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ