The following reply was made to PR kern/112612; it has been noted by GNATS.

From: Cristian KLEIN <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED],  [EMAIL PROTECTED]
Cc:  
Subject: Re: kern/112612: [lo] Traffic via additional lo(4) interface shows
 up on lo0 in bpf(4)
Date: Mon, 16 Jul 2007 17:18:33 +0300

 This is a multi-part message in MIME format.
 --------------070102080802050402090903
 Content-Type: text/plain; charset=ISO-8859-1; format=flowed
 Content-Transfer-Encoding: 7bit
 
 The following patch is against -CURRENT:
 
 cd /usr/src
 patch < if_loop.patch
 
 Recompile the kernel and it should work.
 
 --------------070102080802050402090903
 Content-Type: text/x-patch;
  name="if_loop.patch"
 Content-Transfer-Encoding: 7bit
 Content-Disposition: inline;
  filename="if_loop.patch"
 
 --- sys/net/if_loop.c.orig     2007-02-09 02:09:35.000000000 +0200
 +++ sys/net/if_loop.c  2007-07-16 17:02:31.438464106 +0300
 @@ -274,15 +274,15 @@
                        bpf_mtap(ifp->if_bpf, m);
                }
        } else {
 -              if (bpf_peers_present(loif->if_bpf)) {
 -                      if ((m->m_flags & M_MCAST) == 0 || loif == ifp) {
 +              if (bpf_peers_present(ifp->if_bpf)) {
 +                      if ((m->m_flags & M_MCAST) == 0 || (ifp->if_flags == 
IFF_LOOPBACK)) {
                                /* XXX beware sizeof(af) != 4 */
                                u_int32_t af1 = af;     
  
                                /*
                                 * We need to prepend the address family.
                                 */
 -                              bpf_mtap2(loif->if_bpf, &af1, sizeof(af1), m);
 +                              bpf_mtap2(ifp->if_bpf, &af1, sizeof(af1), m);
                        }
                }
        }
 
 --------------070102080802050402090903--
_______________________________________________
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to