lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <7E12410D-3939-41D7-8DBD-9FB5E3EB446D@padl.com>
Date: Sat, 21 Dec 2024 09:56:28 +1100
From: Luke Howard <lukeh@...l.com>
To: Andrew Lunn <andrew@...n.ch>
Cc: Vladimir Oltean <olteanv@...il.com>, netdev@...r.kernel.org,
        Kieran Tyrrell <kieran@...nda.com>, Max Hunter <max@...tershome.org>
Subject: Re: net: dsa: mv88e6xxx architecture


> For a moment, forget about Marvell. Think about a purely software
> solution, maybe using the Linux bridge, and a collection of e1000e
> cards. Does the same problem exist? How would you solve it?

One could:

* Add (e.g.) TCA_MQPRIO_TC_ENTRY_SRP to indicate the TC is associated with a SRP class
* Add (e.g.) NTF_EXT_SRP_MANAGED to indicate the FDB/MDB entry was inserted by the SRP daemon

Packets with TCs marked TCA_MQPRIO_TC_ENTRY_SRP to DAs not marked NTF_EXT_SRP_MANAGED would be dropped (or deprioritised).

For mv88e6xxx, TCA_MQPRIO_TC_ENTRY_SRP would be supported for “AVB” traffic classes, and NTF_EXT_SRP_MANAGED would map to MV88E6XXX_G1_ATU_DATA_STATE_{UC,MC}_STATIC_AVB_NRL.

Or, we do nothing. As far as I can tell the biggest issue with not supporting this is whether the bridge would pass the Avnu test suite. That’s not so important to me, but it might be to some other users.

Cheers,
Luke

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ