lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <5027AC88.2020509@mellanox.com> Date: Sun, 12 Aug 2012 16:15:52 +0300 From: Or Gerlitz <ogerlitz@...lanox.com> To: "Michael S. Tsirkin" <mst@...hat.com> CC: Or Gerlitz <or.gerlitz@...il.com>, "Eric W. Biederman" <ebiederm@...ssion.com>, <davem@...emloft.net>, <roland@...nel.org>, <netdev@...r.kernel.org>, <ali@...lanox.com>, <sean.hefty@...el.com>, Erez Shitrit <erezsh@...lanox.co.il>, Doug Ledford <dledford@...hat.com> Subject: Re: [PATCH V2 09/12] net/eipoib: Add main driver functionality On 12/08/2012 13:22, Michael S. Tsirkin wrote: >>> >>- IGMP/MAC snooping in a driver is just too hairy. >> >> >mmm, any rough idea/direction how to do that otherwise? > Sure, even two ways, ideally you'd do both:) > A. fix macvtap > 1. Use netdev_for_each_mc_addr etc to get multicast addresses > 2. teach macvtap to fill that in (it currently floods multicasts > for guest to guest communication so we ned to fix it anyway) > > B. fix bridge > teach bridge to work for VMs without using promisc mode I wasn't sure to fully follow... need some more bits of info, the macvtap fix relates only to IGMP snooping, correct? as for the bridge fix, does this somehow relates to ARP snooping we do in the driver? how? Or. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists