Re: [PATCH netfilter] extensions/libxt_bpf.man: clarify BPF code generation with tcpdump

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Aug 10, 2016 at 03:23:07PM -0400, Willem de Bruijn wrote:
> From: Willem de Bruijn <willemb@xxxxxxxxxx>
> 
> The xt_bpf module applies BPF bytecode to the packet. Depending on
> where the module is invoked, the kernel may pass a packet with or
> without link layer header. Iptables has no such header.
> 
> A common `tcpdump -ddd <string>` compilation command may revert to
> a physical device that generates code for packets starting from the
> mac layer up (e.g., E10MB data link type: Ethernet).
> 
> Clarify in the man page that when using this tool for code generation,
> a suitable target device must be chosen.
> 
> Netfilter Bugzilla Bug #1048

Applied, thanks.
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Netfitler Users]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux