David Stevens/Beaverton/IBM wrote on 03/22/2012 08:10:44 PM:

> From: David Stevens/Beaverton/IBM

> To: Stefan Berger/Watson/IBM
> Cc: Eric Blake <eblake@redhat.com>, libvir-list@redhat.com
> Date: 03/22/2012 08:10 PM
> Subject: Re: [libvirt] [libvirt PATCHv6 1/1] add DHCP snooping
>
> Stefan Berger/Watson/IBM wrote on 03/22/2012 05:00:45 PM:
>
> > Maybe we should go with the previous code from a while ago which was
> > setting a flag for the thread to die. It caused other work-arounds
> > to become necessary but at least we don't have to deal with possibly
> > async. deaths of threads holding locks.

>
> Yes, I have in mind a way to do this now that should keep the

> simplicity and still not use signals. I'll try this out and
> repost.
>

Ok.
An idea may be that the threat has to 'find' its snoop request in a global list every time it processes a packet. Once it cannot find it anymore, it dies. Removing the request from the global list would be the way to terminate the threat. Also, it would have to hold a look to the snoop request while it does anything else than waiting for packets in the pcap library.

   Stefan