Commit 32127a0a authored by Richard Cochran's avatar Richard Cochran Committed by David S. Miller

pch_gbe: run the ptp bpf just once per packet

This patch fixes code which needlessly ran the BPF twice per
packet. Instead, we just run the classifier once and test
whether the packet is any kind of PTP event message.
Signed-off-by: default avatarRichard Cochran <richardcochran@gmail.com>
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parent 358dfb6d
...@@ -134,10 +134,8 @@ static int pch_ptp_match(struct sk_buff *skb, u16 uid_hi, u32 uid_lo, u16 seqid) ...@@ -134,10 +134,8 @@ static int pch_ptp_match(struct sk_buff *skb, u16 uid_hi, u32 uid_lo, u16 seqid)
u16 *hi, *id; u16 *hi, *id;
u32 lo; u32 lo;
if ((sk_run_filter(skb, ptp_filter) != PTP_CLASS_V2_IPV4) && if (sk_run_filter(skb, ptp_filter) == PTP_CLASS_NONE)
(sk_run_filter(skb, ptp_filter) != PTP_CLASS_V1_IPV4)) {
return 0; return 0;
}
offset = ETH_HLEN + IPV4_HLEN(data) + UDP_HLEN; offset = ETH_HLEN + IPV4_HLEN(data) + UDP_HLEN;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment