Hi Guys, This is my first time posting to this mailing list so I hope I'm doing it right and not repeating an older question. I've been experiencing an issue where a bpf which I supply to a pf_ring supported tcpdump v-4.1.1 (compiled against libpcap-1.6.2 from the 6.2.0-stable branch) takes time to be applied, when capturing data in non zc mode (for example: tcpdump -i eth0 host 1.1.1.1) -> this leads to tcpdump displaying packets which do not match the bpf. This issue is something which libpcap should already take into consideration, as can be seen here: https://github.com/ntop/PF_RING/blob/6.2.0-stable/userland/libpcap-1.6.2-ring/pcap-linux.c#L6272"]https://github.com/ntop/PF_RING/blob/6.2.0-stable/userland/libpcap-1.6.2-ring/pcap-linux.c#L6272. However, that call to setsockopt always return an error ("bad address") which results in the aforementioned behavior. It's important to note that using the same bpf in kernel bypass mode (tcpdump -i zc:eth0 host 1.1.1.1) works perfectly and the bpf is applied right away. Moreover, executing the standard tcpdump which comes with ubuntu 14.04, while supplying the same exact bpm works fine as well. Can someone please explain this behavior ? Thanks in advance, Moshe