lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20100421.234254.226227236.davem@davemloft.net> Date: Wed, 21 Apr 2010 23:42:54 -0700 (PDT) From: David Miller <davem@...emloft.net> To: leonerd@...nerd.org.uk Cc: netdev@...r.kernel.org Subject: Re: [PATCH] Socket filter access to hatype From: Paul LeoNerd Evans <leonerd@...nerd.org.uk> Date: Wed, 21 Apr 2010 18:25:46 +0100 > When capturing packets on a PF_PACKET/SOCK_RAW socket bound to all > interfaces, there doesn't appear to be a way for the filter program to > actually find out the underlying hardware type the packet was captured > on, such as is reported by the sll_hatype field of the struct sockaddr_ll > when the packet is sent up to userland. > > Unless I've managed to miss a trick somewhere, this would seem to put a > fairly fundamental blocker on actually being able to filter in such > packets. Granted there's the SKF_OFF_NET area to inspect at the e.g. IPv4 > level, but this makes it impossible to do anything on e.g. the Ethernet > level. > > See below for a patch to add an SKF_AD_HATYPE field, up among the other > special access fields around SKF_AD_OFF. This looks fine but you need to submit your patch properly, including proper "Signed-off-by: " tags etc. see Documentation/SubmittingPatches for details. Please make a complete fresh new submission, and don't try to shortcut this by just replying and adding the Signed-off-by: or anything like that. Thanks. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists