pch_gbe: run the ptp bpf just once per packet
This patch fixes code which needlessly ran the BPF twice per packet. Instead, we just run the classifier once and test whether the packet is any kind of PTP event message. Signed-off-by: Richard Cochran <richardcochran@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
358dfb6d77
commit
32127a0a0a
1 changed files with 1 additions and 3 deletions
|
@ -134,10 +134,8 @@ static int pch_ptp_match(struct sk_buff *skb, u16 uid_hi, u32 uid_lo, u16 seqid)
|
|||
u16 *hi, *id;
|
||||
u32 lo;
|
||||
|
||||
if ((sk_run_filter(skb, ptp_filter) != PTP_CLASS_V2_IPV4) &&
|
||||
(sk_run_filter(skb, ptp_filter) != PTP_CLASS_V1_IPV4)) {
|
||||
if (sk_run_filter(skb, ptp_filter) == PTP_CLASS_NONE)
|
||||
return 0;
|
||||
}
|
||||
|
||||
offset = ETH_HLEN + IPV4_HLEN(data) + UDP_HLEN;
|
||||
|
||||
|
|
Loading…
Reference in a new issue