On Sun, Aug 17, 2008 at 11:44 AM, Sepherosa Ziehau <[EMAIL PROTECTED]> wrote: > sephe 2008/08/16 20:44:48 PDT > > DragonFly src repository > > Modified files: > sys/net bpf.c > Log: > Various tap functions of bpf(4) are the only non-MPSAFE code on ethernet > input path (in polling or interrupt threads), so push mplock holding down > into bpf(4) tap functions. Also re-check the bpf_if after holding mplock > to avoid use-after-check race.
I suggest to set kern.intr_mpsafe to 1 after this change. I have used it for at least one year, except the bpf issue, I didn't notice any other trouble Best Regards, sephe -- Live Free or Die
