On Fri, May 06, 2022 at 10:16:35PM +0200, Mark Kettenis wrote:
> > Date: Fri, 6 May 2022 14:48:59 +0200
> > From: Alexander Bluhm
> >
> > On Thu, May 05, 2022 at 11:10:54PM +0200, Mark Kettenis wrote:
> > > > Date: Thu, 5 May 2022 22:41:01 +0200
> > > > From: Alexander Bluhm
> > > >
> > > > Hi,
> Date: Fri, 6 May 2022 14:48:59 +0200
> From: Alexander Bluhm
>
> On Thu, May 05, 2022 at 11:10:54PM +0200, Mark Kettenis wrote:
> > > Date: Thu, 5 May 2022 22:41:01 +0200
> > > From: Alexander Bluhm
> > >
> > > Hi,
> > >
> > > The easiest way to make divert_packet() MP safe for now, is to
> >
Hi,
When creating network load by forwarding packets, SSH gets unusable
and ping time gets above 10 seconds.
Problem is that while multiple forwarding threads are running with
shared net lock, the exclusive lock cannot be acquired. This is
unfair.
Diff below prevents that a read lock is granted
sbappendaddr() has no sleep points, so this should work. I have no
objections to commit this as quick and dirty fix. Otherwise the
network stack parallelisation diff should be reverted.
> On 6 May 2022, at 15:48, Alexander Bluhm wrote:
>
> On Thu, May 05, 2022 at 11:10:54PM +0200, Mark Kettenis
On Thu, May 05, 2022 at 11:10:54PM +0200, Mark Kettenis wrote:
> > Date: Thu, 5 May 2022 22:41:01 +0200
> > From: Alexander Bluhm
> >
> > Hi,
> >
> > The easiest way to make divert_packet() MP safe for now, is to
> > protect sbappendaddr() with kernel lock.
>
> All other invocations of sbappend
I would agree with the diff.. @claudio (for what it is worth)
in principle 240.0.0.0/4 was reserved for future use in the past...
so changing that today makes sense to me ...
On Fri, 6 May 2022 at 13:20, Claudio Jeker wrote:
>
> On Thu, May 05, 2022 at 11:37:24AM +0200, Claudio Jeker wrote:
>
Frederic Cambus wrote:
> On a more serious note though, building from ports was the only way
> to have -stable packages before we started to offer -stable binary
> packages with OpenBSD 6.5, and it is still the only way for users of
> architectures for which those packages are not provided. It's
On Fri, May 06, 2022 at 02:11:46PM +0200, Claudio Jeker wrote:
> On Thu, May 05, 2022 at 11:37:24AM +0200, Claudio Jeker wrote:
> > So most routing daemons and other network daemons like pppd do not allow
> > 240/4 as IPs because they check the IP against IN_BADCLASS().
> > I think it is time to re
On Thu, May 05, 2022 at 11:37:24AM +0200, Claudio Jeker wrote:
> So most routing daemons and other network daemons like pppd do not allow
> 240/4 as IPs because they check the IP against IN_BADCLASS().
> I think it is time to remove this restriction.
>
> Now there is another magical network 0.0.0.
On 5/3/22 10:03, Ulf Brosziewski wrote:
> The implementation of the tapping mechanism in wsmouse(4) has a bug
> concerning the transitions into the hold/drag state, see
> https://marc.info/...
> for details. The patch proposed in that message is obsolete. I've
> been made aware that there is
On Thu, May 05, 2022 at 01:19:08PM -0400, Farhan Khan wrote:
> Hi all,
>
> Summary Question:
>
> Broadly, I am trying to understand where a interrupt callback is specified if
> not already specified by usbd_open_pipe_intr(9). Specifically, for the
> athn(4)
> driver, I am trying to understand
On Wed, May 04, 2022 at 09:50:47AM -0600, Theo de Raadt wrote:
> > > Isn't the purpose of the clang-local(1) to document local changes to the
> > > system compiler, -fsanitize-minimal-runtime feels like a special case as
> > > we do not have the complete sanitizer runtime.
> >
> > What do you sug
12 matches
Mail list logo