Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 19 Jun 2002 13:56:42 -0700
From:      "Sam Leffler" <sam@errno.com>
To:        "Luigi Rizzo" <rizzo@icir.org>, "Julian Elischer" <julian@elischer.org>
Cc:        <julian@FreeBSD.ORG>, <net@FreeBSD.ORG>
Subject:   Re: removing global variables from the network stack
Message-ID:  <06bb01c217d3$d131b7f0$52557f42@errno.com>
References:  <20020619094420.C58636@iguana.icir.org> <Pine.BSF.4.21.0206191148000.26167-100000@InterJet.elischer.org> <20020619122535.A60231@iguana.icir.org>

next in thread | previous in thread | raw e-mail | index | archive | help
> I agree with you (and Sam Leffler, who suggested a similar approach
> based on the m_tag as in NetBSD) as a long term solution (though I
> have some concerns on performance, as i mentioned in the dev.summit
> in february).  However, proper handling of m_aux/m_tag chains (just
> look at Sam's patch) requires quite extensive changes, and I am
> afraid to break ipv6/kame stuff (which I have no way to test) in
> the process. I do not see this as a viable solution for RELENG_4.
>

FWIW my m_tag mods are based on openbsd code (which may well have come from
netbsd).  Using m_tag actually simplifies the KAME code considerably since
there's no reuse of aux bufs (KAME plays some games with identifying what an
aux buf is used for based on it's size).  I've been running IPV6 and IPSEC
"tortute tests" with these mods for 4+ months but they definitely need more
testing before committing anywhere (-stable or -current).

Also, as I said to you privately, m_tag support is required for the hardware
crypto mods I'm working on.  They also are the mechanism by which NIC
drivers pass onboard processing state back up to the IPSEC code (i.e. crypto
results done on the NIC).

I'll think about how to add them to -stable w/o breaking binary
compatibility.

    Sam


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-net" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?06bb01c217d3$d131b7f0$52557f42>