sam wrote:

Is this only specific to Linux?
how about others using BSD systems?
sam

Claas Hilbrecht wrote:

I just looked at the code in FreeBSD 5 CURRENT, it handles 1000 tunnel by default:
case MOD_LOAD:

/* intitialize device */ mtx_init(&tapmtx, "tapmtx", NULL, MTX_DEF);
              SLIST_INIT(&taphead);

              clone_setup(&tapclones);
eh_tag = EVENTHANDLER_REGISTER(dev_clone, tapclone, 0, 1000);
              if (eh_tag == NULL) {
                      clone_cleanup(&tapclones);
                      mtx_destroy(&tapmtx);
                      return (ENOMEM);
              }
              return (0);

Sit back and relax. :)
sam

--Am Donnerstag, 1. Juli 2004 17:18 +0100 juerg.vonbue...@amag.ch schrieb:

We are running into trouble with more than 100 virtual tunnel devices .
The reported problem is as follows:
Jul 1 06:30:19 1100PRVC001 openvpn[15520]: Note: Cannot ioctl TUNSETIFF



I assume you need the following patch:

diff -urN linux-2.4.26.org/net/core/dev.c linux-2.4.26/net/core/dev.c
--- linux-2.4.26.org/net/core/dev.c    Wed Apr 14 15:05:41 2004
+++ linux-2.4.26/net/core/dev.c    Thu Apr 15 18:54:01 2004
@@ -619,8 +619,12 @@

    /*
     * If you need over 100 please also fix the algorithm...
+     *
+     * Maybe it's never needed but just to be sure we allow
+     * up to 1000 tun/tap devices.
+     *
     */
-    for (i = 0; i < 100; i++) {
+    for (i = 0; i < 1000; i++) {
        snprintf(buf,sizeof(buf),name,i);
        if (__dev_get_by_name(buf) == NULL) {
            strcpy(dev->name, buf);






Reply via email to