lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20160927.015606.437705429903770747.davem@davemloft.net>
Date:   Tue, 27 Sep 2016 01:56:06 -0400 (EDT)
From:   David Miller <davem@...emloft.net>
To:     shmulik.ladkani@...ellosystems.com
Cc:     jhs@...atatu.com, xiyou.wangcong@...il.com, edumazet@...gle.com,
        netdev@...r.kernel.org, shmulik.ladkani@...il.com
Subject: Re: [PATCH net-next 4/4] net/sched: act_mirred: Implement ingress
 actions

From: Shmulik Ladkani <shmulik.ladkani@...ellosystems.com>
Date: Thu, 22 Sep 2016 16:21:52 +0300

> From: Shmulik Ladkani <shmulik.ladkani@...il.com>
> 
> Up until now, 'action mirred' supported only egress actions (either
> TCA_EGRESS_REDIR or TCA_EGRESS_MIRROR).
> 
> This patch implements the corresponding ingress actions
> TCA_INGRESS_REDIR and TCA_INGRESS_MIRROR.
> 
> This allows attaching filters whose target is to hand matching skbs into
> the rx processing of a specified device.
> 
> Signed-off-by: Shmulik Ladkani <shmulik.ladkani@...il.com>
> Cc: Jamal Hadi Salim <jhs@...atatu.com>
> ---
>  Was wondering, whether netif_receive_skb or dev_forward_skb should be
>  used for the rx bouncing. Used netif_receive_skb as in ifb device.

The discussion on this patch has ventured off into what to do about
recursion.

But it unclear to me where this specific patch, and this series,
stands right now.  Someone please clear this up for me.

Thanks.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ