Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 24 May 2006 15:36:13 +0100 (BST)
From:      Robert Watson <rwatson@FreeBSD.org>
To:        Jung-uk Kim <jkim@FreeBSD.org>
Cc:        cvs-src@FreeBSD.org, src-committers@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   Re: cvs commit: src/sys/amd64/amd64 bpf_jit_machdep.c bpf_jit_machdep.h src/sys/conf files files.amd64 files.i386 options.amd64         options.i386 src/sys/i386/i386 bpf_jit_machdep.c bpf_jit_machdep.h         src/sys/net bpf.c bpf_jitter.c bpf_jitter.h bpfdesc.h
Message-ID:  <20060524153540.E48623@fledge.watson.org>
In-Reply-To: <200512060258.jB62wCnk084452@repoman.freebsd.org>
References:  <200512060258.jB62wCnk084452@repoman.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 6 Dec 2005, Jung-uk Kim wrote:

>  Add experimental BPF Just-In-Time compiler for amd64 and i386.
>
>  Use the following kernel configuration option to enable:
>
>          options BPF_JITTER
>
>  If you want to use bpf_filter() instead (e. g., debugging), do:
>
>          sysctl net.bpf.jitter.enable=0
>
>  to turn it off.
>
>  Currently BIOCSETWF and bpf_mtap2() are unsupported, and bpf_mtap() is
>  partially supported because 1) no need, 2) avoid expensive m_copydata(9).
>
>  Obtained from:  WinPcap 3.1 (for i386)

Do you have any plans to MFC this to RELENG_6?  I've had a question about 
getting it up and running for intrusion detection / network monitoring.

Robert N M Watson



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20060524153540.E48623>