[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAJ3xEMgf1ue3Byt3n1+LYFFKED8fq3RXJhqihTY=X6cww_MQkg@mail.gmail.com>
Date: Mon, 23 Feb 2015 19:18:19 +0200
From: Or Gerlitz <gerlitz.or@...il.com>
To: Jeff Kirsher <jeffrey.t.kirsher@...el.com>
Cc: David Miller <davem@...emloft.net>,
Greg Rose <gregory.v.rose@...el.com>,
Linux Netdev List <netdev@...r.kernel.org>,
"nhorman@...hat.com" <nhorman@...hat.com>,
"sassmann@...hat.com" <sassmann@...hat.com>,
"jogreene@...hat.com" <jogreene@...hat.com>
Subject: Re: [net-next 13/16] i40e: Fix i40e_ndo_set_vf_spoofchk
On Mon, Feb 23, 2015 at 5:25 AM, Jeff Kirsher
<jeffrey.t.kirsher@...el.com> wrote:
> From: Greg Rose <gregory.v.rose@...el.com>
>
> The netdev op that allows the operator to turn MAC/VLAN spoof checking on
> and off did not include the flag for VLAN spoof checking. This patch
> fixes that problem.
If we're on VST mode, the VF isn't aware their traffic is tagged with
vlan-id Y and if they try to send with vlan-id X I assume you are
forcing it to be Y, right?
If we're on VGT mode, what spoof check you can do? we don't have a
model for allowed vlans, did I miss something?
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists