lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Tue, 25 Jun 2013 16:44:53 +0300
From:	"Michael S. Tsirkin" <mst@...hat.com>
To:	John Fastabend <john.fastabend@...il.com>
Cc:	Or Gerlitz <or.gerlitz@...il.com>,
	Pawit Pornkitprasan <p.pawit@...il.com>,
	Vlad Yasevich <vyasevic@...hat.com>, netdev@...r.kernel.org,
	Ryousei Takano <takano-ryousei@...t.go.jp>,
	"Rose, Gregory V" <gregory.v.rose@...el.com>,
	Stephen Hemminger <stephen@...workplumber.org>,
	Amir Vadai <amirv@...lanox.com>, Yan Burman <yanb@...lanox.com>
Subject: Re: PROBLEM: Bridging does not work with Mellanox ConnectX-2
 (mlx4_en) card in SR-IOV mode

On Mon, Jun 24, 2013 at 11:13:32PM -0700, John Fastabend wrote:
> On 06/24/2013 10:36 PM, Or Gerlitz wrote:
> >On Tue, Jun 25, 2013 at 3:46 AM, Pawit Pornkitprasan <p.pawit@...il.com> wrote:
> >>On Tue, Jun 25, 2013 at 7:45 AM, Pawit Pornkitprasan <p.pawit@...il.com> wrote:
> >>>
> >>>Thank you. I will try it out.
> >>>
> >>
> >>Update: I've tried "sudo bridge fdb add [target mac address] dev p4p1"
> >>and the bridge is working properly. Is there any reason why the
> >>bridging code cannot do this automatically?
> >
> >Good question, there is some ongoing work in that direction but I am
> >not sure where things stand now, I added Michael and Vlad who are
> >involved in that adventure.
> 
> At least the original thought here was for most use cases user space
> added the MAC  addresses behind the bridge typically by creating a
> virtual device or tap device. In this case whatever added this device
> should also add the FDB entry to the embedded bridge.

Of course, it can only work if flood is disabled for (most) ports.
I agree it's not intuitive that this only works when
learning is also off - but this was always intended as
an optimization, not as a correctness feature.

If a card doesn't support promisc mode, bridging won't
be reliable as it depends on ability to enable
promisc mode sometimes.

> If the bridge is actually learning MAC addresses possibly from a
> trusted guest. Then something needs to listen for the FDB events
> and push them to the hardware.
> 

As a side note, it should be possible for bridge to detect that
a port that's being added requires flood but doesn't
actually support promisc mode, and fail adding the port.
This would require bridge utils to learn about the
new flag that disables flood.
Does this sound like a better way to handle it than
a fake success setting promisc mode?


> I suppose we could add another knob to propagate FDB entries if it
> is useful. Although adding it to libvirt/whatever seems like it would
> work just as well.
> 
> .John

This is work in progress in qemu/libvirt.


> -- 
> John Fastabend         Intel Corporation
> --
> To unsubscribe from this list: send the line "unsubscribe netdev" in
> the body of a message to majordomo@...r.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ