lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <1258265615.3251.10.camel@bigi> Date: Sun, 15 Nov 2009 01:13:35 -0500 From: jamal <hadi@...erus.ca> To: xiaosuo@...il.com Cc: Stephen Hemminger <shemminger@...tta.com>, "David S. Miller" <davem@...emloft.net>, netdev@...r.kernel.org Subject: Re: [PATCH] act_mirred: cleanup and optimization On Fri, 2009-11-13 at 13:36 +0800, Changli Gao wrote: > act_mirred: cleanup and optimization. > > cleanup and optimization. > 1. don't let go back using goto. > 2. move checking if eaction is valid in tcf_mirred_init(). > 3. don't call skb_act_clone() until it is necessary. > 4. one exit of the critical context. > 5. allow eaction is TCA_INGRESS_MIRROR & TCA_INGRESS_REDIR. > I would break this into the following patches: patch 1: #1, #3, and #4 (this is what we discussed before) patch 2: #2 (Ive had this in my todo list forever) For #5 i think you misunderstood me earlier - TCA_INGRESS_* means not to do dev xmit (that is the domain of TCA_EGRESS_*) but rather something along the lines of netif_rx; this needs a lot of validation - the code has changed quiet a bit since the early days and as it has turned out noone has exactly been shedding any tears for that feature. The challenge is in the variety of netdevices which have different semantics.. Sorry - I am in some hectic travel mode (hence delayed response) but to answer your earlier question: no you cant redirect to packet socket today. cheers, jamal -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists