Re: IPv6 Multicast Listener Discovery - Listing and Disabling Group Membership

2018-10-03 Thread Aham Brahmasmi
Stuart,

> Yes the original code was in the original import from KAME. The code
> that actually *processed* these queries was removed in the commit I
> mentioned (so it seems your main concern is already dealt with), but
> I think the interfaces are still joined to the group so will receive
> those packets.

I too think that the Node Information multicast group is joined when
the interface comes up, but could not ascertain this for sure whether
the group was being joined or not. Hence my 1st question - How to
determine the list of IPv6 multicast groups joined by an interface?

"netstat -g" does not return IPv6 multicast groups joined, because I
think it deals with multicast routing rather than IPv6 multicast groups.
I could not gather much from the results of apropos multicast[1].

Regards,
ab

[1] - 
https://man.openbsd.org/?query=multicast=1=0=default=OpenBSD-current
-|-|-|-|-|-|-|--



Re: IPv6 Multicast Listener Discovery - Listing and Disabling Group Membership

2018-10-03 Thread Stuart Henderson
On 2018/10/03 12:36, Aham Brahmasmi wrote:
> Hi Stuart,
> 
> Thank you for your response.
> 
> > > 2) How to disable an interface from joining IPv6 Node Information
> > > multicast group (RFC 4620)?
> > > In sys/netinet6/in6.c, the function in6_update_ifa contains the
> > > following lines:
> > >
> > > /*
> > >  * join node information group address
> > >  */
> > > if (in6_nigroup(ifp, hostname, hostnamelen, ) == 0) {
> > >   imm = in6_joingroup(ifp, _addr, );
> > >   if (!imm) {
> > >   /* XXX not very fatal, go on... */
> > >   } else {
> > >   LIST_INSERT_HEAD(>ia6_memberships,
> > >   imm, i6mm_chain);
> > >   }
> > > }
> > 
> > Not 100% sure but I think this may have been missed when support for
> > RFC 4620 was removed from the kernel in 2014
> > 
> > https://github.com/openbsd/src/commit/43f29087ef2fc515510c43f9dd706f7bbd9e39b7
> 
> You may be probably right, although I do not claim to understand IPv6.
> My best guess is that the code block might have been originally present
> in the KAME project.

Yes the original code was in the original import from KAME. The code
that actually *processed* these queries was removed in the commit I
mentioned (so it seems your main concern is already dealt with), but
I think the interfaces are still joined to the group so will receive
those packets.



Re: Some highlights: Emacs 21.4 and 25.3

2018-10-03 Thread Roderick



On Tue, 2 Oct 2018, John M wrote:


This may be a bit off-topic but the feature responsible for this is
'electric-indent-mode', which is enabled by default in 24.4 or later.


It is not enough to prevent indentation in Tcl mode.

(setq tcl-mode-map (make-sparse-keymap))

is not anymore documented and prevents not only indentation.

I would stop using emacs, but after so much years using it ...

Rodrigo




Re: checking source with pvs-studio

2018-10-03 Thread Tom Smyth
...  is it just 750 for a License ?
If one were to donate a License ? would that work for the project ?

Thanks
Tom Smyth
On Wed, 3 Oct 2018 at 17:33, Todd C. Miller  wrote:
>
> On Wed, 03 Oct 2018 10:20:45 +0200, Ingo Schwarze wrote:
>
> > Which is of course trivial to do - you write a script to do a
> > checkout, run "sed -i", run the tool, collect the the results,
> > and delete the checkout.  So the harassment by the author is not
> > even effective for his intended purpose.
>
> The license explicitly prohibits this kinds of behavior, though of
> course there's no way for them to tell.  If someone really wanted
> to use it, a trial license does not have this kind of restriction
> though it only lasts for a week IIRC.
>
> I think it's clear that we're not going to be using pvs-studio which
> is a bit of a shame since it does catch real bugs.  The way Coverity
> deals with open source projects is easier for us to deal with.
>
>  - todd
>


-- 
Kindest regards,
Tom Smyth

Mobile: +353 87 6193172
The information contained in this E-mail is intended only for the
confidential use of the named recipient. If the reader of this message
is not the intended recipient or the person responsible for
delivering it to the recipient, you are hereby notified that you have
received this communication in error and that any review,
dissemination or copying of this communication is strictly prohibited.
If you have received this in error, please notify the sender
immediately by telephone at the number above and erase the message
You are requested to carry out your own virus check before
opening any attachment.



Re: checking source with pvs-studio

2018-10-03 Thread Todd C. Miller
On Wed, 03 Oct 2018 17:42:16 +0100, Tom Smyth wrote:

> ...  is it just 750 for a License ?
> If one were to donate a License ? would that work for the project ?

No, it would not.  Their licensing model simply won't work for us.
Even if it did, it's not like we could run it natively on OpenBSD.

 - todd



Re: checking source with pvs-studio

2018-10-03 Thread Tom Smyth
Hi Todd,

I was thinking ... it might be possible to examine
a copy of the code out of band on a different OS system ...
and deal with the bugs that are flagged
as part of the normal OpenBSD development process,

if the license is not permissible then I suppose my suggestion
was entirely academic :/

PS awesome talk in euroBSD Con :)

Thanks anyway

Tom Smyth

On Wed, 3 Oct 2018 at 18:02, Todd C. Miller  wrote:
>
> On Wed, 03 Oct 2018 17:42:16 +0100, Tom Smyth wrote:
>
> > ...  is it just 750 for a License ?
> > If one were to donate a License ? would that work for the project ?
>
> No, it would not.  Their licensing model simply won't work for us.
> Even if it did, it's not like we could run it natively on OpenBSD.
>
>  - todd



-- 
Kindest regards,
Tom Smyth

Mobile: +353 87 6193172
The information contained in this E-mail is intended only for the
confidential use of the named recipient. If the reader of this message
is not the intended recipient or the person responsible for
delivering it to the recipient, you are hereby notified that you have
received this communication in error and that any review,
dissemination or copying of this communication is strictly prohibited.
If you have received this in error, please notify the sender
immediately by telephone at the number above and erase the message
You are requested to carry out your own virus check before
opening any attachment.



Re: checking source with pvs-studio

2018-10-03 Thread Todd C. Miller
On Wed, 03 Oct 2018 18:07:00 +0100, Tom Smyth wrote:

> I was thinking ... it might be possible to examine
> a copy of the code out of band on a different OS system ...
> and deal with the bugs that are flagged
> as part of the normal OpenBSD development process,

It is possible to generate pre-processed versions of the source for
analysis on another system (Linux, macOS, etc).  It's not something
that fits in well to how OpenBSD development works but it is possible.

> if the license is not permissible then I suppose my suggestion
> was entirely academic :/

I don't see us being able to use anything that uses per-developer
seat licensing.

> PS awesome talk in euroBSD Con :)

Wrong Todd :-)

 - todd



Re: Performance impact of PF on APU2

2018-10-03 Thread Benjamin Petit
Thanks, I just saw the previous discussion, from late 2017.

Do you know where we can follow the work that is being done? I would be more 
than
happy to test early version.



Re: checking source with pvs-studio

2018-10-03 Thread Todd C. Miller
On Wed, 03 Oct 2018 10:20:45 +0200, Ingo Schwarze wrote:

> Which is of course trivial to do - you write a script to do a
> checkout, run "sed -i", run the tool, collect the the results,
> and delete the checkout.  So the harassment by the author is not
> even effective for his intended purpose.

The license explicitly prohibits this kinds of behavior, though of
course there's no way for them to tell.  If someone really wanted
to use it, a trial license does not have this kind of restriction
though it only lasts for a week IIRC.

I think it's clear that we're not going to be using pvs-studio which
is a bit of a shame since it does catch real bugs.  The way Coverity
deals with open source projects is easier for us to deal with.

 - todd



Re: Performance impact of PF on APU2

2018-10-03 Thread Tom Smyth
Hello,

your forwarding performance will vary based on a few things...
at the minute Routing is MP safe... but if one of the lan ports
lets say em1 was in a bridge...  then the forwarding is  done
by a single core...

My testing on OpenBSD 6.3  showed speeds of 750/s - 800Mb/s
with default rules usingx86-64 GENERIC (not i386)

speeds generally fell when playing with Encapsulation..
I was using a test rig as follows

apuc2iperfclient - -- apuc2iperf server

I hope this helps

TomSmyth
On Wed, 3 Oct 2018 at 19:04, Benjamin Petit  wrote:
>
> Thanks, I just saw the previous discussion, from late 2017.
>
> Do you know where we can follow the work that is being done? I would be more 
> than
> happy to test early version.
>


-- 
Kindest regards,
Tom Smyth

Mobile: +353 87 6193172
The information contained in this E-mail is intended only for the
confidential use of the named recipient. If the reader of this message
is not the intended recipient or the person responsible for
delivering it to the recipient, you are hereby notified that you have
received this communication in error and that any review,
dissemination or copying of this communication is strictly prohibited.
If you have received this in error, please notify the sender
immediately by telephone at the number above and erase the message
You are requested to carry out your own virus check before
opening any attachment.



Re: Performance impact of PF on APU2

2018-10-03 Thread Stuart Henderson
On 2018-10-03, Benjamin Petit  wrote:
> Before upgrading to CURRENT, I think routing with or without pf
> enabled was around 600Mbit/s, but I would need to reinstall to test
> again.

Snapshots are usually built with the "pool_debug" kernel option,
releases are built without it. This is good for finding some types of
bug, but can have an impact, you could try sysctl kern.pool_debug=0
and see if that improves performance.

What were you running before (including syspatches if present)?
If it was from before mitigations for CPU bugs were added, those are
generally expected to slow things down.




Re: Performance impact of PF on APU2

2018-10-03 Thread Benjamin Petit
Hello, and thanks for your responses!

> My testing on OpenBSD 6.3  showed speeds of 750/s - 800Mb/s
> with default rules using    x86-64 GENERIC (not i386)

Same setup as yours, and I definitely don't reach 750-800Mbits/s (550 at best)

When I transfer a big file from one network to another, I clearly see that
one core stays pretty much at 100%. I don't have any bridge configured

> Snapshots are usually built with the "pool_debug" kernel option,
> releases are built without it. This is good for finding some types of
> bug, but can have an impact, you could try sysctl kern.pool_debug=0
> and see if that improves performance.

No significant impact

> What were you running before (including syspatches if present)?
> If it was from before mitigations for CPU bugs were added, those are
> generally expected to slow things down.

All syspatches up-to-date (until Monday at least). BIOS is up-to-date
so I suppose that mitigations were already in place?

I will reinstall 6.3+latest syspatches and measure again.

Currently I see that sometimes iperf3 needs to retries to send some
packets. I don't see any dropped packets in sysctl.





Re: Performance impact of PF on APU2

2018-10-03 Thread Benjamin Petit
My sysctl output:

kern.ostype=OpenBSD
kern.osrelease=6.4
kern.osrevision=201811
kern.version=OpenBSD 6.4 (GENERIC.MP) #342: Tue Oct  2 23:23:09 MDT
2018
dera...@amd64.openbsd.org:/usr/src/sys/arch/amd64/compile/GENERIC.M
P

kern.maxvnodes=22282
kern.maxproc=1310
kern.maxfiles=7030
kern.argmax=262144
kern.securelevel=1
kern.hostname=gw.home.**
kern.hostid=0
kern.clockrate=tick = 1, tickadj = 40, hz = 100, profhz = 100,
stathz = 100
kern.dnsjackport=0
kern.posix1version=200809
kern.ngroups=16
kern.job_control=1
kern.saved_ids=1
kern.boottime=Wed Oct  3 20:45:34 2018
kern.domainname=
kern.maxpartitions=16
kern.rawpartition=2
kern.maxthread=1950
kern.nthreads=48
kern.osversion=GENERIC.MP#342
kern.somaxconn=128
kern.sominconn=80
kern.nosuidcoredump=1
kern.fsync=1
kern.sysvmsg=1
kern.sysvsem=1
kern.sysvshm=1
kern.msgbufsize=98256
kern.malloc.buckets=16,32,64,128,256,512,1024,2048,4096,8192,16384,3276
8,65536,131072,262144,524288
kern.malloc.bucket.16=(calls = 1722 total_allocated = 768 total_free =
393 elements = 256 high watermark = 1280 could_free = 0)
kern.malloc.bucket.32=(calls = 4386 total_allocated = 896 total_free =
623 elements = 128 high watermark = 640 could_free = 0)
kern.malloc.bucket.64=(calls = 7536 total_allocated = 1472 total_free =
1113 elements = 64 high watermark = 320 could_free = 876)
kern.malloc.bucket.128=(calls = 9964 total_allocated = 3296 total_free
= 27 elements = 32 high watermark = 160 could_free = 3)
kern.malloc.bucket.256=(calls = 4129 total_allocated = 112 total_free =
6 elements = 16 high watermark = 80 could_free = 0)
kern.malloc.bucket.512=(calls = 1621 total_allocated = 144 total_free =
6 elements = 8 high watermark = 40 could_free = 0)
kern.malloc.bucket.1024=(calls = 2460 total_allocated = 172 total_free
= 5 elements = 4 high watermark = 20 could_free = 55)
kern.malloc.bucket.2048=(calls = 58 total_allocated = 36 total_free = 0
elements = 2 high watermark = 10 could_free = 0)
kern.malloc.bucket.4096=(calls = 2780 total_allocated = 1047 total_free
= 2 elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.8192=(calls = 394 total_allocated = 216 total_free =
3 elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.16384=(calls = 372 total_allocated = 5 total_free =
0 elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.32768=(calls = 10 total_allocated = 9 total_free = 0
elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.65536=(calls = 1540 total_allocated = 3 total_free =
0 elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.131072=(calls = 3 total_allocated = 3 total_free = 0
elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.262144=(calls = 0 total_allocated = 0 total_free = 0
elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.524288=(calls = 1 total_allocated = 1 total_free = 0
elements = 1 high watermark = 5 could_free = 0)
kern.malloc.kmemnames=free,,devbuf,,pcb,rtableifaddr,soopts,sysctl,
counters,,ioctlops,iov,mount,,NFS_req,NFS_mount,,vnodes,namecache,U
FS_quota,UFS_mount,shm,VM_map,sem,dirhash,ACPI,VM_pmapfile,file_des
c,,proc,subproc,VFS_cluster,,,MFS_node,,,Export_Host,NFS_srvsock,,NFS_d
aemon,ip_moptions,in_multi,ether_multi,mrt,ISOFS_mount,ISOFS_node,MSDOS
FS_mount,MSDOSFS_fat,MSDOSFS_node,ttys,exec,miscfs_mount,fusefs_mount,,
,,,pfkey_data,tdb,xform_data,,pagedep,inodedep,newblk,,,indirdep,,,
,,VM_swap,,UVM_amap,UVM_aobj,,USB,USB_device,USB_HC,,memdesc,,,
crypto_data,,IPsec_credsemuldata,ip6_options,NDP,,,temp,NTF
S_mount,NTFS_node,NTFS_fnode,NTFS_dir,NTFS_hash,NTFS_attr,NTFS_data,NTF
S_decomp,NTFS_vrun,kqueue,,SYN_cache,UDF_mount,UDF_file_entry,UDF_file_
id,,AGP_Memory,DRM
kern.malloc.kmemstat.free=(inuse = 0, calls = 0, memuse = 0K, limblocks
= 0, mapblocks = 0, maxused = 0K, limit = 78644K, spare = 0, sizes =
(none))
kern.malloc.kmemstat.devbuf=(inuse = 2071, calls = 3032, memuse =
4663K, limblocks = 0, mapblocks = 0, maxused = 4664K, limit = 78644K,
spare = 0, sizes =
(16,32,64,128,256,512,1024,2048,4096,8192,16384,32768,65536,131072))
kern.malloc.kmemstat.pcb=(inuse = 76, calls = 114, memuse = 16K,
limblocks = 0, mapblocks = 0, maxused = 17K, limit = 78644K, spare = 0,
sizes = (16,32,128,1024))
kern.malloc.kmemstat.rtable=(inuse = 71, calls = 157, memuse = 3K,
limblocks = 0, mapblocks = 0, maxused = 3K, limit = 78644K, spare = 0,
sizes = (16,32,64,128,256))
kern.malloc.kmemstat.ifaddr=(inuse = 52, calls = 53, memuse = 11K,
limblocks = 0, mapblocks = 0, maxused = 11K, limit = 78644K, spare = 0,
sizes = (32,64,128,256,4096))
kern.malloc.kmemstat.soopts=(inuse = 0, calls = 0, memuse = 0K,
limblocks = 0, mapblocks = 0, maxused = 0K, limit = 78644K, spare = 0,
sizes = (none))
kern.malloc.kmemstat.sysctl=(inuse = 3, calls = 3, memuse = 2K,
limblocks = 0, mapblocks = 0, maxused = 2K, limit = 78644K, spare = 0,
sizes = (32,128,1024))
kern.malloc.kmemstat.counters=(inuse = 79, calls = 79, memuse = 67K,
limblocks = 0, 

Re: Performance impact of PF on APU2

2018-10-03 Thread Benjamin Petit
Ok so I compared 6.3-release, 6.3-release+syspatches(=stable?) and the latest 
snapshot from October 2.

I measured iperf3 throughput between A and B, like this:
PC A <---> APU2 <---> PC B

pf rules are the one shipped by default in 6.3:

  gw# pfctl -sr 
 
  block return all
  pass all flags S/SA
  block return in on ! lo0 proto tcp from any to any port 6000:6010
  block return out log proto tcp all user = 55
  block return out log proto udp all user = 55

OpenBSD 6.3 RELEASE:   
  - pf enabled:  841 Mbits/sec  
  - pf disabled: 935 Mbits/sec

OpenBSD 6.3 + Syspatch:
  - pf enabled:  803 Mbits/sec
  - pf disabled: 936 Mbits/sec

OpenBSD CURRENT:
  - pf enabled: 526 Mbits/sec (541 with kern.pool_debug=0)
  - pf disabled: 934 Mbits/sec

So there is a small perf drop when applying all syspatches to 6.3 (not sure 
which one cause the drop), 
but the performance drop SIGNIFICANTLY using the latest snapshot.

Am I missing something? (I really hope I am)



Re: Performance impact of PF on APU2

2018-10-03 Thread Tom Smyth
can you show us a copy of your sysctl output?

check if smt is disabled ...  (Hyper Threading )

Im not sure if this would have an effect on the
APU2C2 ...  but worth checking as it is a change
in behaviour between 6.3 and current AFIK

Thanks

Tom Smyth
On Thu, 4 Oct 2018 at 04:58, Benjamin Petit  wrote:
>
> Ok so I compared 6.3-release, 6.3-release+syspatches(=stable?) and the latest 
> snapshot from October 2.
>
> I measured iperf3 throughput between A and B, like this:
> PC A <---> APU2 <---> PC B
>
> pf rules are the one shipped by default in 6.3:
>
>   gw# pfctl -sr
>   block return all
>   pass all flags S/SA
>   block return in on ! lo0 proto tcp from any to any port 6000:6010
>   block return out log proto tcp all user = 55
>   block return out log proto udp all user = 55
>
> OpenBSD 6.3 RELEASE:
>   - pf enabled:  841 Mbits/sec
>   - pf disabled: 935 Mbits/sec
>
> OpenBSD 6.3 + Syspatch:
>   - pf enabled:  803 Mbits/sec
>   - pf disabled: 936 Mbits/sec
>
> OpenBSD CURRENT:
>   - pf enabled: 526 Mbits/sec (541 with kern.pool_debug=0)
>   - pf disabled: 934 Mbits/sec
>
> So there is a small perf drop when applying all syspatches to 6.3 (not sure 
> which one cause the drop),
> but the performance drop SIGNIFICANTLY using the latest snapshot.
>
> Am I missing something? (I really hope I am)



-- 
Kindest regards,
Tom Smyth

Mobile: +353 87 6193172
The information contained in this E-mail is intended only for the
confidential use of the named recipient. If the reader of this message
is not the intended recipient or the person responsible for
delivering it to the recipient, you are hereby notified that you have
received this communication in error and that any review,
dissemination or copying of this communication is strictly prohibited.
If you have received this in error, please notify the sender
immediately by telephone at the number above and erase the message
You are requested to carry out your own virus check before
opening any attachment.



Re: Performance impact of PF on APU2

2018-10-03 Thread Benjamin Petit
Added my sysctl output in attachement (I never really used
distribution lists before...)

I don't think the APU2 uses HT, but I tried with sysctl hw.smt=1,
no difference in the iperf3 numbers.

On Thu, 2018-10-04 at 05:02 +0100, Tom Smyth wrote:
> can you show us a copy of your sysctl output?
> 
> check if smt is disabled ...  (Hyper Threading )
> 
> Im not sure if this would have an effect on the
> APU2C2 ...  but worth checking as it is a change
> in behaviour between 6.3 and current AFIK
> 
> Thanks
> 
> Tom Smyth
> On Thu, 4 Oct 2018 at 04:58, Benjamin Petit  wrote:
> > Ok so I compared 6.3-release, 6.3-release+syspatches(=stable?) and
> > the latest snapshot from October 2.
> > 
> > I measured iperf3 throughput between A and B, like this:
> > PC A <---> APU2 <---> PC B
> > 
> > pf rules are the one shipped by default in 6.3:
> > 
> >   gw# pfctl -sr
> >   block return all
> >   pass all flags S/SA
> >   block return in on ! lo0 proto tcp from any to any port 6000:6010
> >   block return out log proto tcp all user = 55
> >   block return out log proto udp all user = 55
> > 
> > OpenBSD 6.3 RELEASE:
> >   - pf enabled:  841 Mbits/sec
> >   - pf disabled: 935 Mbits/sec
> > 
> > OpenBSD 6.3 + Syspatch:
> >   - pf enabled:  803 Mbits/sec
> >   - pf disabled: 936 Mbits/sec
> > 
> > OpenBSD CURRENT:
> >   - pf enabled: 526 Mbits/sec (541 with kern.pool_debug=0)
> >   - pf disabled: 934 Mbits/sec
> > 
> > So there is a small perf drop when applying all syspatches to 6.3
> > (not sure which one cause the drop),
> > but the performance drop SIGNIFICANTLY using the latest snapshot.
> > 
> > Am I missing something? (I really hope I am)
> 
> 
kern.ostype=OpenBSD
kern.osrelease=6.4
kern.osrevision=201811
kern.version=OpenBSD 6.4 (GENERIC.MP) #342: Tue Oct  2 23:23:09 MDT 2018
dera...@amd64.openbsd.org:/usr/src/sys/arch/amd64/compile/GENERIC.MP

kern.maxvnodes=22282
kern.maxproc=1310
kern.maxfiles=7030
kern.argmax=262144
kern.securelevel=1
kern.hostname=gw.home.**
kern.hostid=0
kern.clockrate=tick = 1, tickadj = 40, hz = 100, profhz = 100, stathz = 100
kern.dnsjackport=0
kern.posix1version=200809
kern.ngroups=16
kern.job_control=1
kern.saved_ids=1
kern.boottime=Wed Oct  3 20:45:34 2018
kern.domainname=
kern.maxpartitions=16
kern.rawpartition=2
kern.maxthread=1950
kern.nthreads=48
kern.osversion=GENERIC.MP#342
kern.somaxconn=128
kern.sominconn=80
kern.nosuidcoredump=1
kern.fsync=1
kern.sysvmsg=1
kern.sysvsem=1
kern.sysvshm=1
kern.msgbufsize=98256
kern.malloc.buckets=16,32,64,128,256,512,1024,2048,4096,8192,16384,32768,65536,131072,262144,524288
kern.malloc.bucket.16=(calls = 1722 total_allocated = 768 total_free = 393 
elements = 256 high watermark = 1280 could_free = 0)
kern.malloc.bucket.32=(calls = 4386 total_allocated = 896 total_free = 623 
elements = 128 high watermark = 640 could_free = 0)
kern.malloc.bucket.64=(calls = 7536 total_allocated = 1472 total_free = 1113 
elements = 64 high watermark = 320 could_free = 876)
kern.malloc.bucket.128=(calls = 9964 total_allocated = 3296 total_free = 27 
elements = 32 high watermark = 160 could_free = 3)
kern.malloc.bucket.256=(calls = 4129 total_allocated = 112 total_free = 6 
elements = 16 high watermark = 80 could_free = 0)
kern.malloc.bucket.512=(calls = 1621 total_allocated = 144 total_free = 6 
elements = 8 high watermark = 40 could_free = 0)
kern.malloc.bucket.1024=(calls = 2460 total_allocated = 172 total_free = 5 
elements = 4 high watermark = 20 could_free = 55)
kern.malloc.bucket.2048=(calls = 58 total_allocated = 36 total_free = 0 
elements = 2 high watermark = 10 could_free = 0)
kern.malloc.bucket.4096=(calls = 2780 total_allocated = 1047 total_free = 2 
elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.8192=(calls = 394 total_allocated = 216 total_free = 3 
elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.16384=(calls = 372 total_allocated = 5 total_free = 0 
elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.32768=(calls = 10 total_allocated = 9 total_free = 0 
elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.65536=(calls = 1540 total_allocated = 3 total_free = 0 
elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.131072=(calls = 3 total_allocated = 3 total_free = 0 
elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.262144=(calls = 0 total_allocated = 0 total_free = 0 
elements = 1 high watermark = 5 could_free = 0)
kern.malloc.bucket.524288=(calls = 1 total_allocated = 1 total_free = 0 
elements = 1 high watermark = 5 could_free = 0)

Re: network architecture question

2018-10-03 Thread Aham Brahmasmi
Hi Tom,

> The book of PF by Peter M Hansteen is very good, and openBSD Specific
> Building Internet firewalls is good also ...  Building internet
> firewalls book can
> be a bit verbose atimes... but it does go through things in detail...

Thank you for your recommendation. I apologize for my incomplete
question earlier - I am aware of the excellent books from mwlucas and
peternmhansteen.

> regarding BGP ...
> https://www.ssi.gouv.fr/uploads/2016/03/bgp-configuration-best-practices.pdf

Thanks, will put these on my to-learn list.

Regards,
ab
-|-|-|-|-|-|-|--



Re: network architecture question

2018-10-03 Thread Aham Brahmasmi
Hi Ingo,

Thank you for your response.

> i mostly learn by reading reference manuals, standard documents,
> and source code.

I try to too, but with limited successes. So topology and other higher
order concepts are out of my competency area, and hence my question.

> I mentioned it to show that the strength of two-tier firewalls has
> been well-established in standard textbooks for a long time.

Understood. The recommendations for these standard textbooks is what I
think I was going for.

Regards,
ab
-|-|-|-|-|-|-|--



Re: IPv6 Multicast Listener Discovery - Listing and Disabling Group Membership

2018-10-03 Thread Aham Brahmasmi
Hi Stuart,

Thank you for your response.

> > 2) How to disable an interface from joining IPv6 Node Information
> > multicast group (RFC 4620)?
> > In sys/netinet6/in6.c, the function in6_update_ifa contains the
> > following lines:
> >
> > /*
> >  * join node information group address
> >  */
> > if (in6_nigroup(ifp, hostname, hostnamelen, ) == 0) {
> > imm = in6_joingroup(ifp, _addr, );
> > if (!imm) {
> > /* XXX not very fatal, go on... */
> > } else {
> > LIST_INSERT_HEAD(>ia6_memberships,
> > imm, i6mm_chain);
> > }
> > }
> 
> Not 100% sure but I think this may have been missed when support for
> RFC 4620 was removed from the kernel in 2014
> 
> https://github.com/openbsd/src/commit/43f29087ef2fc515510c43f9dd706f7bbd9e39b7

You may be probably right, although I do not claim to understand IPv6.
My best guess is that the code block might have been originally present
in the KAME project.

Regards,
ab
-|-|-|-|-|-|-|--



Re: checking source with pvs-studio

2018-10-03 Thread Ingo Schwarze
Hi,

Aaron Mason wrote on Wed, Oct 03, 2018 at 09:07:40AM +1000:

> Apparently you've got to go through your source code
> and plug the product in every single non-header file.

Which is of course trivial to do - you write a script to do a
checkout, run "sed -i", run the tool, collect the the results,
and delete the checkout.  So the harassment by the author is not
even effective for his intended purpose.

If the developer is *that* stupid in such a major respect,
it's probably best to ignore the tool outright - that stupidity
gives me the prejudice that the tool is likely to be hostile
towards free software, greedy for private profit, and even
more stupid in other ways, so it's likely a waste of time
in the first place.

It's not like there aren't lots of other choices, written by
smart people for a change.

Yours,
  Ingo