David Stevens/Beaverton/IBM wrote on 03/22/2012 08:10:44 PM: > From: David Stevens/Beaverton/IBM > To: Stefan Berger/Watson/IBM > Cc: Eric Blake <ebl...@redhat.com>, libvir-list@redhat.com > Date: 03/22/2012 08:10 PM > Subject: Re: [libvirt] [libvirt PATCHv6 1/1] add DHCP snooping > > Stefan Berger/Watson/IBM wrote on 03/22/2012 05:00:45 PM: > > > Maybe we should go with the previous code from a while ago which was > > setting a flag for the thread to die. It caused other work-arounds > > to become necessary but at least we don't have to deal with possibly > > async. deaths of threads holding locks. > > Yes, I have in mind a way to do this now that should keep the > simplicity and still not use signals. I'll try this out and > repost. >
Ok. An idea may be that the threat has to 'find' its snoop request in a global list every time it processes a packet. Once it cannot find it anymore, it dies. Removing the request from the global list would be the way to terminate the threat. Also, it would have to hold a look to the snoop request while it does anything else than waiting for packets in the pcap library. Stefan
-- libvir-list mailing list libvir-list@redhat.com https://www.redhat.com/mailman/listinfo/libvir-list