lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 9 Jul 2008 13:35:21 +0100 From: Ben Hutchings <bhutchings@...arflare.com> To: Patrick McHardy <kaber@...sh.net> Cc: davem@...emloft.net, netdev@...r.kernel.org Subject: Re: [PATCH 02/08]: vlan: deliver packets received with VLAN acceleration to network taps Patrick McHardy wrote: > vlan: deliver packets received with VLAN acceleration to network taps > > When VLAN header stripping is used, packets currently bypass packet > sockets (and other network taps) completely. For locally existing > VLANs, they appear directly on the VLAN device, for unknown VLANs > they are silently dropped. > > Add a new function netif_nit_deliver() to deliver incoming packets > to all network interface taps and use it in __vlan_hwaccel_rx() to > make VLAN packets visible on the underlying device. [...] > +/* > + * netif_tap_deliver - deliver received packets to network taps > + * @skb: buffer > + * > + * This function is used to deliver incoming packets to network > + * taps. It should be used when the normal netif_receive_skb path > + * is bypassed, for example because of VLAN acceleration. > + */ > +void netif_nit_deliver(struct sk_buff *skb) [...] Is it supposed to be called netif_nit_deliver() or netif_tap_deliver()? Ben. -- Ben Hutchings, Senior Software Engineer, Solarflare Communications Not speaking for my employer; that's the marketing department's job. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists