lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 29 Aug 2019 23:18:49 -0700 (PDT) From: David Miller <davem@...emloft.net> To: jiri@...nulli.us Cc: andrew@...n.ch, horatiu.vultur@...rochip.com, alexandre.belloni@...tlin.com, UNGLinuxDriver@...rochip.com, allan.nielsen@...rochip.com, ivecera@...hat.com, f.fainelli@...il.com, netdev@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH v3 1/2] net: core: Notify on changes to dev->promiscuity. From: Jiri Pirko <jiri@...nulli.us> Date: Fri, 30 Aug 2019 08:13:27 +0200 > In fact, I have usecase where I need to see only slow-path traffic by > wireshark, not all packets going through hw. This could be an attribute in the descriptor entries for the packets provided to userspace, and BPF filters could act on these as well. Switch network devices aren't special, promiscuous mode means all packets on the wire that you are attached. This talk about special handling of "trapping" is a strawman.
Powered by blists - more mailing lists