Port-sparc archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: bpfjit



On Tue, Nov 06, 2012 at 08:03:35AM +0000, Alexander Nasonov wrote:
> # modload bpfjit
> # sysctl -w net.bpf.jit=1

Note that you need to do this early with GENERIC{,.MP} kernels on sparc,
as we do not hape options INSECURE, so module loading later will not
work.

> Once it's done, all new filter programs will be compiled into binary
> code by the kernel and that code will be passed as a hook to watch for
> matching packets.
> 
> You can see all jit'ed programs using fstat(1):
> 
> $ fstat | grep jit
> _tcpdump tcpdump    18471    5* bpf rec=97, dr=0, cap=4, pid=18471, promisc, 
> seesent, jit, idle

I only tried a few (trivial) filters, but they seem to work:

_tcpdump tcpdump      401    5* bpf rec=275, dr=0, cap=195, pid=401, promisc, 
seesent, jit, idle
_tcpdump tcpdump      388    5* bpf rec=748, dr=0, cap=5, pid=388, promisc, 
seesent, jit, idle


Martin


Home | Main Index | Thread Index | Old Index