[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <f494c25b-1ef0-1fe4-9ac5-05eafa903be0@cumulusnetworks.com>
Date: Mon, 23 Jan 2017 21:10:34 -0700
From: David Ahern <dsa@...ulusnetworks.com>
To: Andy Lutomirski <luto@...capital.net>
Cc: Alexei Starovoitov <alexei.starovoitov@...il.com>,
Andy Lutomirski <luto@...nel.org>,
Network Development <netdev@...r.kernel.org>,
"David S. Miller" <davem@...emloft.net>,
Daniel Borkmann <daniel@...earbox.net>,
Alexei Starovoitov <ast@...nel.org>
Subject: Re: [PATCH v2] bpf: Restrict cgroup bpf hooks to the init netns
On 1/23/17 7:39 PM, Andy Lutomirski wrote:
> I'm not sure I followed what you meant. If I understood right (which
> is a big if) you're saying that ip vrf when run in a netns works
> correctly in that netns. I agree, but I think that it would continue
> to work (even more reliably) if the hooks only executed in the netns
> in which they were created. I think that would probably be a good
> improvement, and it could be done on top of my patch, but I'm not
> about to write that code for 4.10.
Sounds like an efficiency on the implementation that does not require limiting the code today to just init namespace.
Powered by blists - more mailing lists