Hello,
That is mostly for the record but it looks like the intel X520 is not
very good and generates a high level of interrupts.
On a router / firewall with 500 Kpps in input (dropped by pf) is enough to put
the CPUs at
100% busy.
We use FreeBSD 11.3 on a machine with 12 CPU Intel(R) Xeon(R) CP
> On 9 July 2020, at 16:24, Mark Johnston wrote:
>
> On Thu, Jul 09, 2020 at 02:15:40PM -0700, Doug Hardie wrote:
>>> On 9 July 2020, at 13:10, Mark Johnston wrote:
>>> Hopefully "protocol not supported" is a sufficiently descriptive error
>>> message.
>>
>> Actually, the users of these system
> On 9 July 2020, at 14:45, Michael Tuexen wrote:
>
>> On 9. Jul 2020, at 23:15, Doug Hardie wrote:
>>
>> Actually, the users of these systems would have no clue about that message.
>> All they would figure out is that the system is down and they can't do their
>> job and bitch to the CEO.
10.07.2020 2:44, Doug Hardie wrote:
>> On 9 July 2020, at 08:13, Mark Johnston wrote:
>>
>> Hi,
>>
>> I spent some time working on making it possible to load the SCTP stack
>> as a kernel module, the same as we do today with IPSec. There is one
>> patch remaining to be committed before that can
On Thu, Jul 09, 2020 at 02:15:40PM -0700, Doug Hardie wrote:
> > On 9 July 2020, at 13:10, Mark Johnston wrote:
> > Hopefully "protocol not supported" is a sufficiently descriptive error
> > message.
>
> Actually, the users of these systems would have no clue about that message.
> All they wou
> On 9. Jul 2020, at 23:15, Doug Hardie wrote:
>
>> On 9 July 2020, at 13:10, Mark Johnston wrote:
>>
>> On Thu, Jul 09, 2020 at 12:44:25PM -0700, Doug Hardie wrote:
On 9 July 2020, at 08:13, Mark Johnston wrote:
Hi,
I spent some time working on making it possible to
> On 9 July 2020, at 13:10, Mark Johnston wrote:
>
> On Thu, Jul 09, 2020 at 12:44:25PM -0700, Doug Hardie wrote:
>>> On 9 July 2020, at 08:13, Mark Johnston wrote:
>>>
>>> Hi,
>>>
>>> I spent some time working on making it possible to load the SCTP stack
>>> as a kernel module, the same as we
On Thu, Jul 09, 2020 at 12:44:25PM -0700, Doug Hardie wrote:
> > On 9 July 2020, at 08:13, Mark Johnston wrote:
> >
> > Hi,
> >
> > I spent some time working on making it possible to load the SCTP stack
> > as a kernel module, the same as we do today with IPSec. There is one
> > patch remaining
> On 9. Jul 2020, at 21:44, Doug Hardie wrote:
>
>> On 9 July 2020, at 08:13, Mark Johnston wrote:
>>
>> Hi,
>>
>> I spent some time working on making it possible to load the SCTP stack
>> as a kernel module, the same as we do today with IPSec. There is one
>> patch remaining to be committ
> On 9 July 2020, at 08:13, Mark Johnston wrote:
>
> Hi,
>
> I spent some time working on making it possible to load the SCTP stack
> as a kernel module, the same as we do today with IPSec. There is one
> patch remaining to be committed before that can be done in head. One
> caveat is that the
> On 9. Jul 2020, at 21:01, Eugene Grosbein wrote:
>
> 09.07.2020 23:59, Michael Tuexen wrote:
>
>>> This may be relaxed with "sctp_enable" knob for /etc/rc.conf and new
>>> startup script
>>> /etc/rc.d/sctp that: a) REQUIRE: kld; b) checks if sctp.ko already loaded
>>> and load it as needed;
09.07.2020 23:59, Michael Tuexen wrote:
>> This may be relaxed with "sctp_enable" knob for /etc/rc.conf and new startup
>> script
>> /etc/rc.d/sctp that: a) REQUIRE: kld; b) checks if sctp.ko already loaded
>> and load it as needed;
>> c) applies sctp sysctl tuning from /etc/sysctl.conf for valu
Navdeep / List
Can you help me understand what I am looking at here. I enabled the lacp
debug until I finally saw the issue I noted before. Due to some log rotation
part of the message is clipped.
Here is a part the full thing is on patebin https://pastebin.com/BGtbxcBf
30 2020-07-09T15:47:
> On 9. Jul 2020, at 19:02, Mark Johnston wrote:
>
> On Thu, Jul 09, 2020 at 11:36:34PM +0700, Eugene Grosbein wrote:
>> 09.07.2020 22:41, Michael Tuexen wrote:
>>
I am wondering if anyone has any objections to or concerns about this
proposal. Any feedback is appreciated.
>>
>> I'm f
On Thu, Jul 09, 2020 at 11:36:34PM +0700, Eugene Grosbein wrote:
> 09.07.2020 22:41, Michael Tuexen wrote:
>
> >> I am wondering if anyone has any objections to or concerns about this
> >> proposal. Any feedback is appreciated.
>
> I'm for it.
>
> > maybe it is acceptable to document user visib
> On 9. Jul 2020, at 18:36, Eugene Grosbein wrote:
>
> 09.07.2020 22:41, Michael Tuexen wrote:
>
>>> I am wondering if anyone has any objections to or concerns about this
>>> proposal. Any feedback is appreciated.
>
> I'm for it.
>
>> maybe it is acceptable to document user visible changes. T
09.07.2020 22:41, Michael Tuexen wrote:
>> I am wondering if anyone has any objections to or concerns about this
>> proposal. Any feedback is appreciated.
I'm for it.
> maybe it is acceptable to document user visible changes. This could include
> * parameter tunings in /etc/sysctl.conf are only
> On 9. Jul 2020, at 17:13, Mark Johnston wrote:
>
> Hi,
>
> I spent some time working on making it possible to load the SCTP stack
> as a kernel module, the same as we do today with IPSec. There is one
> patch remaining to be committed before that can be done in head. One
> caveat is that the
Hi,
I spent some time working on making it possible to load the SCTP stack
as a kernel module, the same as we do today with IPSec. There is one
patch remaining to be committed before that can be done in head. One
caveat is that the module can't be unloaded, as some work is needed to
make this sa
TSPB Birlikte Eğitim Mesleki Gelişim Eğitimleri
Bülteni Daha İyi Görüntülemek İçin Tıklayın
[http://track-9.n-mail-3.com/1011D2389711|00119c00fdf926bb981d59ee664f79715a6a|11005296|1010469|00102406.html]TSPB
Birlikte Eğitim Mesleki Gelişim Eğitimleri
"Kişisel Verilerin Korunması Kanunu (KVKK)"
20 matches
Mail list logo