From owner-freebsd-hackers Thu Jan 16 08:10:20 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.4/8.8.4) id IAA28266 for hackers-outgoing; Thu, 16 Jan 1997 08:10:20 -0800 (PST) Received: from pdx1.world.net (pdx1.world.net [192.243.32.18]) by freefall.freebsd.org (8.8.4/8.8.4) with ESMTP id IAA28259 for ; Thu, 16 Jan 1997 08:10:18 -0800 (PST) From: proff@suburbia.net Received: from suburbia.net (suburbia.net [203.4.184.1]) by pdx1.world.net (8.7.5/8.7.3) with SMTP id IAA08411 for ; Thu, 16 Jan 1997 08:11:18 -0800 (PST) Received: (qmail 8965 invoked by uid 110); 16 Jan 1997 13:06:14 -0000 Message-ID: <19970116130614.8964.qmail@suburbia.net> Subject: Re: ipfw patches to test In-Reply-To: from Darren Reed at "Jan 16, 97 11:10:20 pm" To: avalon@coombs.anu.edu.au (Darren Reed) Date: Fri, 17 Jan 1997 00:06:14 +1100 (EST) Cc: hackers@freebsd.org X-Mailer: ELM [version 2.4ME+ PL28 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk > To give you some idea of what I mean by this, when matching a packet > through IP Filter, it does some preprocessing of the IP header(s) and > matches src, dst, IP options (including security), ttl, tos, version, > protocol, fragmented/not in 5 32bit mask-matches. If you look at IP > Filter now, you'll notice that it does all 5 of these without branching > (whether it should or shouldn't branch early is dependant on CPU, > especially instruction pipeline depth). Cool. And on 64 bit arch you can of course do it in.. err 2.5 ;) > btw, with the rmon fast packet matching with masks reference, were you > alluding to the paper for one of the OSDI(?) conferences where they had > benchmarked it at twice the speed of BPF ? > > Darren Don't recall reading the OSD paper, just noticed this technique in RMON source. Although I also read a bpf/fast mask comparison somewhere. Cheers, Julian