[pve-devel] Port BR_GROUPFWD_RESTRICTED patch for Layer 1-esque Linux Bridge forwarding

Alexandre DERUMIER aderumier at odiso.com
Sun Aug 26 12:28:37 CEST 2018


Hi,

my 2 cents, but maybe it could work with macvtap/macvlan ?

https://suhu0426.github.io/Web/Presentation/20150203/index.html


or maybe simply with pci-passthrough (with srv-io) of physical interface inside the vms.



----- Mail original -----
De: "Jesus Llorente" <jesus.llorente at gmail.com>
À: "pve-devel" <pve-devel at pve.proxmox.com>
Envoyé: Vendredi 24 Août 2018 09:00:52
Objet: [pve-devel] Port BR_GROUPFWD_RESTRICTED patch for Layer 1-esque Linux Bridge forwarding

Hello, 

I am working on a scenario that uses virtual machines to run a switch 
appliance. The aim of my test is not performance, but to test different 
configurations and network models. However, I have stumbled upon something 
that depends on the kernel which is making Linux bridges consume link local 
multicast packets (LLDP, LACP, etc) in compliance with 802.3ad 

In this patch 
https://lists.linuxfoundation.org/pipermail/bridge/2015-January/009291.html 
they removed a hard-coded restriction so that the behavior of the bridge 
can be then controlled from the OS with the variable 
/sys/class/net/$brname/bridge/group_fwd_mask 

In this post, the author explains the different values this variable can 
take, according to what we are trying to allow/restrict. 
https://interestingtraffic.nl/2017/11/21/an-oddly-specific-post-about-group_fwd_mask 

I would like to suggest porting this patch to the pve kernel to remove all 
the restrictions and enable full transparent bridging (point-to-point like 
links) across devices, in a Layer 1 fashion. 

PS: Thank you for your amazing work!! 
_______________________________________________ 
pve-devel mailing list 
pve-devel at pve.proxmox.com 
https://pve.proxmox.com/cgi-bin/mailman/listinfo/pve-devel 




More information about the pve-devel mailing list