Date: Wed, 24 May 2006 15:36:13 +0100 (BST) From: Robert Watson <rwatson@FreeBSD.org> To: Jung-uk Kim <jkim@FreeBSD.org> Cc: cvs-src@FreeBSD.org, src-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: Re: cvs commit: src/sys/amd64/amd64 bpf_jit_machdep.c bpf_jit_machdep.h src/sys/conf files files.amd64 files.i386 options.amd64 options.i386 src/sys/i386/i386 bpf_jit_machdep.c bpf_jit_machdep.h src/sys/net bpf.c bpf_jitter.c bpf_jitter.h bpfdesc.h Message-ID: <20060524153540.E48623@fledge.watson.org> In-Reply-To: <200512060258.jB62wCnk084452@repoman.freebsd.org> References: <200512060258.jB62wCnk084452@repoman.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 6 Dec 2005, Jung-uk Kim wrote: > Add experimental BPF Just-In-Time compiler for amd64 and i386. > > Use the following kernel configuration option to enable: > > options BPF_JITTER > > If you want to use bpf_filter() instead (e. g., debugging), do: > > sysctl net.bpf.jitter.enable=0 > > to turn it off. > > Currently BIOCSETWF and bpf_mtap2() are unsupported, and bpf_mtap() is > partially supported because 1) no need, 2) avoid expensive m_copydata(9). > > Obtained from: WinPcap 3.1 (for i386) Do you have any plans to MFC this to RELENG_6? I've had a question about getting it up and running for intrusion detection / network monitoring. Robert N M Watson
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20060524153540.E48623>