Julian,
Thanks for your assistance. My understanding of the use and power of
netgraph is
much improved. Your first response to my question (Go to the source, ...),
gave me the
idea to filter the response "from" the process which was using BPF for it's
read and write
operations. This was done
Ipfw divers from within the IP stack
by then it's too late.
you could diver th epackets using netgraph and filter them and then
pass them back into the eiface netgraph node to continue up.
then you tell your application to listen to the "nge"
interface.. unfortunatly another driver also produce
At 04:50 PM 6/27/2002, Julian Elischer wrote:
> > Are there any other taps I may access in order to accomplish this goal?
>
>I forget the goal. sorry
No problem - Hope you don't mind if I restate it.
I am trying to strip/drop packets before they reach a server process which uses
BPF for communi
On Thu, 27 Jun 2002, Arthur Peet wrote:
>
> >Use the Source Luke!
>
> Thanks, Obi! :) I REALLY appreciate your response.
>
> >as you see, bpf copies are taken before netgraph processing..
> >and non-netgraph bridging occurs after that.
>
> It appears to me that if I switched the order in
>Use the Source Luke!
Thanks, Obi! :) I REALLY appreciate your response.
>as you see, bpf copies are taken before netgraph processing..
>and non-netgraph bridging occurs after that.
It appears to me that if I switched the order in which the processing
occurs and recompiled the kernel, the fu
Use the Source Luke!
ether_input(ifp, eh, m)
struct ifnet *ifp;
struct ether_header *eh;
struct mbuf *m;
{
struct ether_header save_eh;
/* Check for a BPF tap */
if (ifp->if_bpf != NULL) {
struct m_hdr mh;
/* T