Hi,

This looks bogus.  The PF_BRIDGE/FORWARD hook is only called for packets that
are purely bridged (not routed), and thus the FORWARD sabotage hook should
never be stealing these packets (as the output device is not a bridge device).
Do you have a testcase where this patch actually makes a difference?  If so,
I suspect there is a bug elsewhere..


cheers,
Lennert


On Mon, Jan 07, 2002 at 08:48:40PM +0100, Bart De Schuymer wrote:

> Hello Lennert,
> http://users.pandora.be/bart.de.schuymer/bridge-nf/bridge-nf-thresh-vs-0.0.5
> pre3.diff
> This small patch makes sure any hypothetical function with priority value
> less than THRESH doesn't get executed twice (for the ip forward hook).
> 
> cheers,
> Bart
> 
_______________________________________________
Bridge mailing list
[EMAIL PROTECTED]
http://www.math.leidenuniv.nl/mailman/listinfo/bridge

Reply via email to