lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <a27a76e8-d7c3-457d-be98-00cf2d942cf8@mojatatu.com> Date: Mon, 15 Aug 2016 06:41:14 -0400 From: Jamal Hadi Salim <jhs@...atatu.com> To: Shmulik Ladkani <shmulik.ladkani@...il.com> Cc: Amir Vadai <amir@...ai.me>, Jiri Pirko <jiri@...nulli.us>, Cong Wang <xiyou.wangcong@...il.com>, John Fastabend <john.fastabend@...il.com>, Jiri Pirko <jiri@...lanox.com>, Linux Kernel Network Developers <netdev@...r.kernel.org>, Or Gerlitz <ogerlitz@...lanox.com>, Hadar Har-Zion <hadarh@...lanox.com>, Oded Shanoon <odeds@...lanox.com>, Amir Vadai <amirva@...lanox.com> Subject: Re: [RFC net-next 0/2] net/sched: cls_flower, act_mirred: VXLAN redirect using TC On 16-08-15 06:24 AM, Shmulik Ladkani wrote: > On Mon, 15 Aug 2016 06:08:10 -0400, jhs@...atatu.com wrote: >> Assuming $VXLAN is actually not a linux netdev of type vxlan? >> then the action does vxlan encap redirect sends it to the $VXLAN >> dev with encapsulation in place. > > I assume Amir refers to vxlan netdev in VXLAN_F_COLLECT_METADATA mode, > using the tun_info metadata found in skb_metadata_dst. > The action is supposed to assign the tun metadata. > I see - so you let the vxlan netdev do the encap? Would it still scale to a _very large_ number of tunnels? How many netdevs are you going to use? I am assuming you will hit a nasty lock somewhere(qdisc?) if you use only one. cheers, jamal
Powered by blists - more mailing lists