lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <OS0PR01MB5922253965DE7FAAE0A679E586B69@OS0PR01MB5922.jpnprd01.prod.outlook.com>
Date:   Tue, 12 Oct 2021 13:34:18 +0000
From:   Biju Das <biju.das.jz@...renesas.com>
To:     Andrew Lunn <andrew@...n.ch>
CC:     Sergei Shtylyov <sergei.shtylyov@...il.com>,
        "David S. Miller" <davem@...emloft.net>,
        Jakub Kicinski <kuba@...nel.org>,
        Sergey Shtylyov <s.shtylyov@....ru>,
        Geert Uytterhoeven <geert+renesas@...der.be>,
        Sergey Shtylyov <s.shtylyov@...russia.ru>,
        Adam Ford <aford173@...il.com>,
        Yuusuke Ashizuka <ashiduka@...itsu.com>,
        Yoshihiro Shimoda <yoshihiro.shimoda.uh@...esas.com>,
        "netdev@...r.kernel.org" <netdev@...r.kernel.org>,
        "linux-renesas-soc@...r.kernel.org" 
        <linux-renesas-soc@...r.kernel.org>,
        Chris Paterson <Chris.Paterson2@...esas.com>,
        Biju Das <biju.das@...renesas.com>,
        Prabhakar Mahadev Lad <prabhakar.mahadev-lad.rj@...renesas.com>
Subject: RE: [PATCH net-next v2 13/14] ravb: Update EMAC configuration mode
 comment

Hi Andrew,

Thanks for the feedback.

> Subject: Re: [PATCH net-next v2 13/14] ravb: Update EMAC configuration
> mode comment
> 
> > by looking at the RJ LED's there is not much activity and packet
> > statistics also show not much activity by default.
> 
> > How can we check, it is overloading the controller? So that I can
> > compare with and without this setting
> 
> What is you link peer? A switch? That will be doing some filtering, so you
> probably don't see unicast traffic from other devices. So you need to
> flood your link with traffic the switch does not filter. Try multicast
> traffic for a group you are not a member off. You might need to disable
> IGMP snooping on the switch.
> 

I have tested in below environments
Setup 1: 
  Machine1: RZ/G2L platform connected to Ubuntu Guest VM(bridged),Host oS windows via SWITCH and
  Machine2: RZ/G2M platform connected to Ubuntu Guest VM(bridged),Host oS windows via SWITCH

Then ran multicast_sender app from machine 2 and ran tcpdump on machine 1.
using devmem, I have controlled on/off PRM bit.

In both cases, on tcpdump from machine 1, I see multicast packets which I am not a member off.

Setup2:-

  RZ/G2L platform directly connected to RZ/G2M platform. 

Ran UDP unicast sockets to send data from RZ/G2M platform

ran tcpdump from from RZ/G2L platform

using devmem, I am controlling on/off PRM bit.

But for different addressed packet, I see RZ/G2L platfrom is trying to do ARP request for
different address. So packets are handled, with and without PRM bit set.

Regards,
Biju

> Or use a traffic generator as a link peer and have it generate streams
> with mixed sources and destinations.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ