[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20190829.231849.163267210593234149.davem@davemloft.net>
Date: Thu, 29 Aug 2019 23:18:49 -0700 (PDT)
From: David Miller <davem@...emloft.net>
To: jiri@...nulli.us
Cc: andrew@...n.ch, horatiu.vultur@...rochip.com,
alexandre.belloni@...tlin.com, UNGLinuxDriver@...rochip.com,
allan.nielsen@...rochip.com, ivecera@...hat.com,
f.fainelli@...il.com, netdev@...r.kernel.org,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH v3 1/2] net: core: Notify on changes to
dev->promiscuity.
From: Jiri Pirko <jiri@...nulli.us>
Date: Fri, 30 Aug 2019 08:13:27 +0200
> In fact, I have usecase where I need to see only slow-path traffic by
> wireshark, not all packets going through hw.
This could be an attribute in the descriptor entries for the packets
provided to userspace, and BPF filters could act on these as well.
Switch network devices aren't special, promiscuous mode means all
packets on the wire that you are attached.
This talk about special handling of "trapping" is a strawman.
Powered by blists - more mailing lists