Hi, This looks bogus. The PF_BRIDGE/FORWARD hook is only called for packets that are purely bridged (not routed), and thus the FORWARD sabotage hook should never be stealing these packets (as the output device is not a bridge device). Do you have a testcase where this patch actually makes a difference? If so, I suspect there is a bug elsewhere..
cheers, Lennert On Mon, Jan 07, 2002 at 08:48:40PM +0100, Bart De Schuymer wrote: > Hello Lennert, > http://users.pandora.be/bart.de.schuymer/bridge-nf/bridge-nf-thresh-vs-0.0.5 > pre3.diff > This small patch makes sure any hypothetical function with priority value > less than THRESH doesn't get executed twice (for the ip forward hook). > > cheers, > Bart > _______________________________________________ Bridge mailing list [EMAIL PROTECTED] http://www.math.leidenuniv.nl/mailman/listinfo/bridge
