lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 1 Oct 2020 08:21:08 +0200 From: Peter Vollmer <peter.vollmer@...il.com> To: Andrew Lunn <andrew@...n.ch> Cc: Network Development <netdev@...r.kernel.org> Subject: Re: dsa/mv88e6xxx: leaking packets on MV88E6341 switch On Wed, Sep 30, 2020 at 09:19:56PM +0200, Andrew Lunn wrote: > > What would be the best way to debug this ? Is there a way to dump the > > ATU MAC tables to see what's going on with the address learning ? > > If you jump to net-next, and use > > https://github.com/lunn/mv88e6xxx_dump > > You can dump the full ATU from the switch. > > bridge fdb show > > can give you some idea what is going on, but it is less clear what is > in the hardware and what is in software. Thanks, I will try that. Peter
Powered by blists - more mailing lists