nia
be6f37654f
Add bge(4) to the list of drivers that take advantage of NET_MPSAFE
2022-08-14 10:13:06 +00:00
andvar
0ac7f4ddbc
fix various typos, mainly s/trasfering/transferring/ and s/theese/these/.
2022-05-03 20:52:30 +00:00
riastradh
34e921e5dc
doc: Update TODO.smpnet to reflect invention of ETHER_F_ALLMULTI.
2021-12-31 00:57:12 +00:00
andvar
32a556f954
fix various typos in comments and messages.
2021-08-09 19:24:32 +00:00
nia
a3d8d8e3ac
doc: more MPSAFE interfaces
2021-08-04 13:50:47 +00:00
msaitoh
93c977b8e5
Remove ixgbe because both ixg and ixv exist in the list.
2021-08-03 01:44:10 +00:00
mrg
c6138d97c3
update the list of ethernet drivers that have been MPSAFEified.
2021-08-02 23:49:26 +00:00
nia
25ae59b713
if_tap was made mpsafe in revision 1.102
2021-01-20 10:26:43 +00:00
maxv
b84521f2f3
Remove references to BRIDGE_IPF, it is now compiled in by default.
2020-08-01 08:20:47 +00:00
maxv
09f8c90c94
BRIDGE_IPF is MP-safe, discussed with ozaki-r@
2020-07-31 16:59:04 +00:00
nia
91cb42c31c
strip(4) was removed
2020-05-23 18:42:17 +00:00
snj
d74cf4b1aa
netsmb is no more
2020-05-06 14:33:52 +00:00
jdolecek
02cc0c4d4e
write down some observations about the locking wild west around if_mcast_op()
2020-05-05 09:33:39 +00:00
thorpej
b8e08ca413
FDDI support has been removed.
2020-01-20 18:40:06 +00:00
thorpej
0c1c4978e2
Token Ring has been removed.
2020-01-19 20:02:23 +00:00
thorpej
6d2f94e573
HIPPI has been removed.
2020-01-19 16:58:22 +00:00
msaitoh
ec1e322ab7
Protecting ec_multi* of ethercom with ec_lock have been finished now.
2020-01-06 15:21:29 +00:00
msaitoh
2d56e9f118
Add aq(4) and ixl(4) to the MPSAFE component list.
2020-01-06 05:38:59 +00:00
ozaki-r
611478defb
Add another known issue (if_flags)
2019-03-27 06:56:37 +00:00
ozaki-r
d0b5d19ecc
Add another known issue
2019-03-26 05:17:17 +00:00
pgoyette
f24c721fc4
Note that kernels with NET_MPSAFE won't work with non-NET_MPSAFE modules.
...
XXX The initial merge of the [pgoyette-compat] branch will NOT address
XXX this issue.
2019-01-21 02:28:25 +00:00
maxv
02d7a902b5
Drop LMC-related entry from TODO.smpnet, and note removal of LMC.
2018-12-12 07:07:30 +00:00
maxv
23198f3a45
remove references to isdn
2018-09-23 13:48:16 +00:00
maxv
f1e25333a2
Note removal of midway and NATM, and prune the entries from TODO.smpnet.
2018-09-06 06:46:25 +00:00
maxv
735ddbc5b3
Retire EtherIP, we have L2TP instead.
2018-08-14 14:49:13 +00:00
ozaki-r
40e17cbfc8
Add ipsecif(4)
2018-08-07 07:19:28 +00:00
ozaki-r
6647f64d95
Categorize non MP-safe components into protected and unprotected ones
2018-08-07 07:19:09 +00:00
msaitoh
483517e3bb
Move txintr_setup() stuff from lmc_interrupt() and do it in ifnet_start().
...
Now we can use bpf_mtap() in the TX path. Not tested.
2018-06-25 09:32:28 +00:00
maxv
cd974a5908
Remove the Econet code. It was part of acorn26, which was removed a
...
month ago.
2018-02-27 14:28:01 +00:00
ozaki-r
21a3f65ab7
Mention the limitation of enabling both NET_MPSAFE and ALTQ
2017-12-05 03:23:29 +00:00
ozaki-r
9faa031948
Mention IPv6 address selection policy isn't MP-safe yet
...
Though it's not a problem until a policy is set.
2017-11-20 09:01:20 +00:00
ozaki-r
3a2af74328
Mention ec_multi*
2017-10-25 07:35:40 +00:00
ozaki-r
e3d0b2cc0d
Mention NOMPSAFE
2017-10-12 03:31:39 +00:00
knakahara
3ceeffee3e
add opencrypto(9)'s scalability comment
2017-10-12 03:27:00 +00:00
ozaki-r
a38b799eca
Write known issues on scalability
2017-08-10 09:26:55 +00:00
ozaki-r
fbb0de677c
Update
...
ipsec(4), opencrypto(9) and vlan(4) are now MP-safe.
2017-08-10 09:08:54 +00:00
ozaki-r
a0123401b6
Write about bpf's statistic counters
2017-03-30 06:50:53 +00:00
ozaki-r
6dc0e16b98
Write about lingering obsolete variables due to kvm(3)
2017-03-30 04:37:58 +00:00
msaitoh
ff07a3d986
Add ixv(4) to MP-safe component's list.
2017-03-11 07:23:13 +00:00
ozaki-r
c5fe62ba0f
Add ixg(4)
2017-03-11 06:40:19 +00:00
ozaki-r
1d5210cbd3
Tidy up again
2017-03-09 06:21:54 +00:00
ozaki-r
5562362b1a
Tidy up the lists
2017-03-08 07:32:58 +00:00
ozaki-r
ab05762cd7
Remove multicast stuffs from the list of Non MP-safe components
2017-03-08 06:59:36 +00:00
ozaki-r
24d5bbc8ed
Add l2tp(4)
2017-02-22 04:44:16 +00:00
ozaki-r
0e2f0c63b2
Add BRIDGE_IPF
2017-02-13 04:01:11 +00:00
ozaki-r
e87e25be9f
Add many entries
2017-02-10 03:59:02 +00:00
ozaki-r
9674e2224b
Defer bpf_mtap in Rx interrupt context to softint
...
bpf_mtap of some drivers is still called in hardware interrupt context.
We want to run them in softint as well as bpf_mtap of most drivers
(see if_percpuq_softint and if_input).
To this end, bpf_mtap_softint mechanism is implemented; it defers
bpf_mtap processing to a dedicated softint for a target driver.
By using the machanism, we can move bpf_mtap processing to softint
without changing target drivers much while it adds some overhead
on CPU and memory. Once target drivers are changed to softint-based,
we should return to normal bpf_mtap.
Proposed on tech-kern and tech-net
2017-01-24 09:05:27 +00:00