Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp2927862ybl; Thu, 29 Aug 2019 15:13:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqzThVFNQ6sxOEi9jG4tV29jsAvoUfa9UEUdaBDnjiRj40jfeAZ7c+Cpf+hnVDfxzLw4DeNK X-Received: by 2002:a63:cb4f:: with SMTP id m15mr10280471pgi.100.1567116811618; Thu, 29 Aug 2019 15:13:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567116811; cv=none; d=google.com; s=arc-20160816; b=pGXIpZtcZrDRwItal9ooe106kXIghGFPcbBP5G/4/BA4QAzSCl+a5yXdvgHZQnXA0T rnuHH5xSn2v3ljH5hG1B+J6KEaAFo+HtQQ13PjVEo6sj1VxFGj+DPX1cSqZPw0l+rE7a xsUvOWt/e3E6Yf02J/XogTjNMyGCEqUc9AsdDUgveUZ6s3KBg3nuN+aKErCt7RhPK9hS Fvw2CQ8nZQ8+vhpBKDcvcH437nM3NKKXQXBBR+WGeZmeCQKJ2EZ9o8Agww6I2ju2AA4G vWpLGvFz98XrDVL2CwktNBoU11tOmtOJa46xWMGd5Eo8/B64cvJG+c61naYX5qv4vrcN YRFA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=oCCpjMMl8pGsUQIpsgcpMBDZJOdbtH0p4uqFS2zPE20=; b=Xb+iC4BnEGcMP6HurVSg95jgj0Ex+z/CiJbCOv4BZWoJVhLU6Y/EJV+CWJyHZ1ztZk jA/nJ0Rag/eybxu+nrD8qmMiXE8cakhksj8+Zzc4tm91PI9RHmoPKSLBDMX084BRmgGp V9p9wldcMgYp5+Mi19TMBQeUTYSo470R4KyzdPHBAW6ErfpKjkHvFbLclvYm/s8nkpd+ jfgdzgoA3CANhvPO9G7xfuedTsx+D1ilxdn2TTKPUx1VTUgMGklyjUUOlgRu8yC58Fe7 i/Q8j5Xuzq7n6ygc/gbzsDLs6y1bRqKgjNxdIUo9BUm9YcZGU/h4sSQ9B/k8pujc2gzv IwUg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j1si3819252pfr.52.2019.08.29.15.13.15; Thu, 29 Aug 2019 15:13:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728256AbfH2WMD (ORCPT + 99 others); Thu, 29 Aug 2019 18:12:03 -0400 Received: from shards.monkeyblade.net ([23.128.96.9]:54374 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727912AbfH2WMC (ORCPT ); Thu, 29 Aug 2019 18:12:02 -0400 Received: from localhost (unknown [IPv6:2601:601:9f80:35cd::d71]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id BFB2D153AC2C5; Thu, 29 Aug 2019 15:12:01 -0700 (PDT) Date: Thu, 29 Aug 2019 15:12:01 -0700 (PDT) Message-Id: <20190829.151201.940681219080864052.davem@davemloft.net> To: idosch@idosch.org Cc: andrew@lunn.ch, jiri@resnulli.us, horatiu.vultur@microchip.com, alexandre.belloni@bootlin.com, UNGLinuxDriver@microchip.com, allan.nielsen@microchip.com, ivecera@redhat.com, f.fainelli@gmail.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v3 1/2] net: core: Notify on changes to dev->promiscuity. From: David Miller In-Reply-To: <20190829193613.GA23259@splinter> References: <20190829175759.GA19471@splinter> <20190829182957.GA17530@lunn.ch> <20190829193613.GA23259@splinter> X-Mailer: Mew version 6.8 on Emacs 26.1 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Thu, 29 Aug 2019 15:12:02 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ido Schimmel Date: Thu, 29 Aug 2019 22:36:13 +0300 > I fully agree that we should make it easy for users to capture offloaded > traffic, which is why I suggested patching libpcap. Add a flag to > capable netdevs that tells libpcap that in order to capture all the > traffic from this interface it needs to add a tc filter with a trap > action. That way zero familiarity with tc is required from users. Why not just make setting promisc mode on the device do this rather than require all of this tc indirection nonsense? That's the whole point of this conversation I thought?