From owner-freebsd-net Thu Jun 27 12:18: 4 2002 Delivered-To: freebsd-net@freebsd.org Received: from mail.toltecint.net (mail.toltecint.net [65.45.180.172]) by hub.freebsd.org (Postfix) with SMTP id 2677137B401 for ; Thu, 27 Jun 2002 12:17:48 -0700 (PDT) Received: (qmail 31638 invoked by uid 85); 27 Jun 2002 19:17:46 -0000 Received: from artslaptop.toltecint.net (HELO ARTSLAPTOP.toltec.biz) (192.168.135.20) by mail.toltecint.net with SMTP; 27 Jun 2002 19:17:44 -0000 Message-Id: <5.1.1.6.2.20020627122834.022c8f50@mail.toltecint.net> X-Sender: art@mail.toltecint.net X-Mailer: QUALCOMM Windows Eudora Version 5.1.1 Date: Thu, 27 Jun 2002 13:17:52 -0600 To: freebsd-net@FreeBSD.ORG From: Arthur Peet Subject: bpf/netgraph interaction Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed X-Virus-Scanned: by AMaViS perl-11 Sender: owner-freebsd-net@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org G'day. Can anyone explain the relationship between BPF and netgraph sockets? I am trying to intercept packets destined for a process which is using BPF for read and write operations on an interface (and drop not-so-good packets). I can see all packets on the interface (using NgRecvData), however I am unable to drop the bad packets (by not calling my NgSendData function) as the process using BPF seems to be bypassing the netgraph functions. Thanks, -Art To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-net" in the body of the message