Re: pkg_add -vV slow progression

2023-09-18 Thread Mihai Popescu
On Mon, Sep 18, 2023 at 7:09 PM Otto Moerbeek  wrote:
>
> On Sun, Sep 17, 2023 at 09:17:58PM +0300, Mihai Popescu wrote:
>
> > Hello,
> >
> > Is there any recent major change in base packages or pkg_add?
> > I ask because the pkg_add -vV is slower than usual at each package,
> > most of the time spent in Extracting ... phase.
> > I use amd64 recent snapshot. I checked my disk and https downloads,
> > they are fine.
> >
> > Thank you.
> >
>
> Maybe the switching off of softdep? But that's been a while already,
> and you don't say if had that enabled.
>
> -Otto

No softdep enabled!
I will try another mirror next time, like Stuart said. I checked that
mirror with a plain download inside a browser, it was fine, maybe
things go bad after some repetitive downloads, I had this before.

Thanks.



PHP scattered crosswalk..

2023-09-18 Thread Daniele B.


Hello everyone and Stuart in particular,

I just grasped that after my station upgrade to 7.3
my PHP situation is the following:

Information for inst:php-8.0.29
Required by:
pecl80-imagick-3.7.0p1
pecl80-memcached-3.2.0p0
and more..

Information for inst:php-8.1.21
Required by:
pear-utils-1.10.19p3

And it doesn appear to me the best as from 
inst:php-8.0.29 depend all my PHP extensions and two pecl and from
inst:php-8.1.21 depends only the pear-utils (and PHP extensions
repositiory) if I'm not wrong, nice uh?

What is your best suggestion, I could try to go ahead 
with inst:php-8.0.29 as my working environment 
and not caring too much about pear requirements, or
it is better to try to fix situation upgrading
everything to php-8.1.21?

Thanks in advance,


-- Daniele Bonini



Re: pfsync/rdomain broken on -current (works on 7.3)

2023-09-18 Thread Mark Patruck

On 9/18/23 8:59 PM, Stuart Henderson wrote:

On 2023-09-18, Mark Patruck  wrote:

i've already wrote to dlg@, but also want to know if others see
the same behavior or at least inform about it.

pfsync(4) in combination with rdomain(4) doesn't work anymore on
a fresh -current. I see packets on pfsync0, but nothing leaves
the machine, so no states are synchronised.


pfsync had a big rewrite between 7.3 and -current. Setting rtableid
in the packet header was present in the 7.3 version but dropped in the
rewrite; can you try this?

Index: if_pfsync.c
===
RCS file: /cvs/src/sys/net/if_pfsync.c,v
retrieving revision 1.321
diff -u -p -r1.321 if_pfsync.c
--- if_pfsync.c 16 Sep 2023 09:33:27 -  1.321
+++ if_pfsync.c 18 Sep 2023 18:59:14 -
@@ -1537,6 +1537,7 @@ pfsync_sendout(struct pfsync_softc *sc,
imo.imo_ifidx = sc->sc_sync_ifidx;
imo.imo_ttl = PFSYNC_DFLTTL;
imo.imo_loop = 0;
+   m->m_pkthdr.ph_rtableid = sc->sc_if.if_rdomain;
  
  	if (ip_output(m, NULL, NULL, IP_RAWOUTPUT, &imo, NULL, 0) == 0) {

counters_pkt(sc->sc_if.if_counters, ifc_opackets,



The diff works fine on two of my systems. Traffic is flowing
between syncdevs again. Thanks Stuart.


--
Mark Patruck ( mark at wrapped.cx )
GPG key 0xF2865E51 / 187F F6D3 EE04 1DCE 1C74  F644 0D3C F66F F286 5E51

https://www.wrapped.cx



Re: pkg_add -vV slow progression

2023-09-18 Thread Stuart Henderson
On 2023-09-18, Otto Moerbeek  wrote:
> On Sun, Sep 17, 2023 at 09:17:58PM +0300, Mihai Popescu wrote:
>
>> Hello,
>> 
>> Is there any recent major change in base packages or pkg_add?
>> I ask because the pkg_add -vV is slower than usual at each package,
>> most of the time spent in Extracting ... phase.
>> I use amd64 recent snapshot. I checked my disk and https downloads,
>> they are fine.
>> 
>> Thank you.
>> 
>
> Maybe the switching off of softdep? But that's been a while already,
> and you don't say if had that enabled.

Does it make a difference if you use a different mirror?



-- 
Please keep replies on the mailing list.



Re: pfsync/rdomain broken on -current (works on 7.3)

2023-09-18 Thread Stuart Henderson
On 2023-09-18, Mark Patruck  wrote:
> i've already wrote to dlg@, but also want to know if others see
> the same behavior or at least inform about it.
>
> pfsync(4) in combination with rdomain(4) doesn't work anymore on
> a fresh -current. I see packets on pfsync0, but nothing leaves
> the machine, so no states are synchronised.

pfsync had a big rewrite between 7.3 and -current. Setting rtableid
in the packet header was present in the 7.3 version but dropped in the
rewrite; can you try this?

Index: if_pfsync.c
===
RCS file: /cvs/src/sys/net/if_pfsync.c,v
retrieving revision 1.321
diff -u -p -r1.321 if_pfsync.c
--- if_pfsync.c 16 Sep 2023 09:33:27 -  1.321
+++ if_pfsync.c 18 Sep 2023 18:59:14 -
@@ -1537,6 +1537,7 @@ pfsync_sendout(struct pfsync_softc *sc, 
imo.imo_ifidx = sc->sc_sync_ifidx;
imo.imo_ttl = PFSYNC_DFLTTL;
imo.imo_loop = 0;
+   m->m_pkthdr.ph_rtableid = sc->sc_if.if_rdomain;
 
if (ip_output(m, NULL, NULL, IP_RAWOUTPUT, &imo, NULL, 0) == 0) {
counters_pkt(sc->sc_if.if_counters, ifc_opackets,



Re: pkg_add -vV slow progression

2023-09-18 Thread Otto Moerbeek
On Sun, Sep 17, 2023 at 09:17:58PM +0300, Mihai Popescu wrote:

> Hello,
> 
> Is there any recent major change in base packages or pkg_add?
> I ask because the pkg_add -vV is slower than usual at each package,
> most of the time spent in Extracting ... phase.
> I use amd64 recent snapshot. I checked my disk and https downloads,
> they are fine.
> 
> Thank you.
> 

Maybe the switching off of softdep? But that's been a while already,
and you don't say if had that enabled.

-Otto



pfsync/rdomain broken on -current (works on 7.3)

2023-09-18 Thread Mark Patruck

Hi,

i've already wrote to dlg@, but also want to know if others see
the same behavior or at least inform about it.

pfsync(4) in combination with rdomain(4) doesn't work anymore on
a fresh -current. I see packets on pfsync0, but nothing leaves
the machine, so no states are synchronised.

For example (w/ or w/o vlan(4) doesn't make a difference)

- pfsync0 in rdomain 5 (configured with syncdev vlan5 and syncpeer,
  so no multicast traffic)

- vlan5 in rdomain 5

- lo5 in rdomain 5

- pf(4) is passing pfsync traffic


With tcpdump i only see packets on pfsync0

 Sep 18 11:41:52.207074 PFSYNCv69 len 212

but nothing on vlan5.

Besides that, the kernel prints the following message every sec, so
it seems pfsync(4) is not rdomain aware anymore.

 /bsd: vlan5: trying to send packet on wrong domain. if 5 vs. mbuf 0


I've tested with 7.3 and here it works.

Sep 18 11:56:19.142731 52:59:06:94:af:12 52:01:45:47:1c:34 0800 142: 
192.168.5.1: PFSYNCv6 len 108act UPD ST COMP count 1

...
 (DF) [tos 0x10]


-Mark


--
Mark Patruck ( mark at wrapped.cx )
GPG key 0xF2865E51 / 187F F6D3 EE04 1DCE 1C74  F644 0D3C F66F F286 5E51

https://www.wrapped.cx



Re: OpenBSD Wireguard implementation not copying ToS from inner to outer WG header

2023-09-18 Thread Stuart Henderson
On 2023-09-17, Andrew Lemin  wrote:
> I have been testing the Wireguard implementation on OpenBSD and noticed
> that the ToS field is not being copied from the inner unencrypted header to
> the outer Wireguard header, resulting in ALL packets going into the same PF
> Prio / Queue.
>
> For example, ACKs (for Wireguard encrypted packets) end up in the first
> queue (not the priority queue) despite PF rules;
>
> queue ext_iface on $extif bandwidth 1000M max 1000M
>   queue pri on $extif parent ext_iface flows 1000 bandwidth 25M min 5M
>   queue data on $extif parent ext_iface flows 1000 bandwidth 100M default
>
> match on $extif proto tcp set prio (3, 6) set queue (data, pri)
>
> All unencrypted SYNs and ACKs etc correctly go into the 'pri' queue, and
> payload packets go into 'data' queue.
> However for Wireguard encrypted packets, _all_ packets (including SYNs and
> ACKs) go into the 'data' queue.
>
> I thought maybe you need to force the ToS/prio/queue values, so I also
> tried sledgehammer approach;
> match proto tcp flags A/A set tos lowdelay set prio 7 set queue pri
> match proto tcp flags S/S set tos lowdelay set prio 7 set queue pri
>
> But sadly all encrypted SYNs and ACKs etc still only go into the data queue
> no matter what.
> This can be confirmed with wireshark that all ToS bits are lost
>
> This results in poor Wireguard performance on OpenBSD.

Here's a naive untested diff that might at least use the prio internally
in OpenBSD...

Index: if_wg.c
===
RCS file: /cvs/src/sys/net/if_wg.c,v
retrieving revision 1.29
diff -u -p -r1.29 if_wg.c
--- if_wg.c 3 Aug 2023 09:49:08 -   1.29
+++ if_wg.c 18 Sep 2023 12:47:02 -
@@ -1525,6 +1525,8 @@ wg_encap(struct wg_softc *sc, struct mbu
 */
mc->m_pkthdr.ph_flowid = m->m_pkthdr.ph_flowid;
 
+   mc->m_pkthdr.pf.prio = m->m_pkthdr.pf.prio;
+
res = noise_remote_encrypt(&peer->p_remote, &data->r_idx, &nonce,
   data->buf, plaintext_len);
nonce = htole64(nonce); /* Wire format is little endian. */




RISCV - port to Mango Pi MQ-Pro (D1)

2023-09-18 Thread Peter J. Philipp
Hi,

I've been working a little bit on making OpenBSD run on Mango Pi, I haven't
succeeded yet, but I think we're close.  My patches are here:

https://github.com/pbug44/openbsd-src/tree/MANGOPI

it's a forked version of OpenBSD src with a "MANGOPI" branch.  I used to
send patches around to several OpenBSD devs but now it's probably better
to have a repo for it.

If you have this hardware and want OpenBSD running on it, help us!  If you
don't know how to program perhaps you can build-test.  I haven't merged
this patch yet, but I'll be working on this (it was compiling on a sept. 1st
version of -current).

A Mango Pi was sent to OpenBSD but came back to me after some time waiting
to be picked up at a postal outlet.  I don't know why they didn't call the
OpenBSD dev, the number was on the address.  Or perhaps they did and he
was on vacation at the time.  I still want to give this to the OpenBSD dev
that I sent it to, unless he doesn't want it, I still want to give this to
OpenBSD.  OpenBSD, contact me with new postal address information.

Best Regards,
-peter

-- 
Over thirty years experience on Unix-like Operating Systems starting with QNX.



Re: Compulab's Fitlet3: Intel's Elkhart Atom X6425E with MARVELL PHY 88E1512 Ethernet

2023-09-18 Thread Wolfgang Oelerich
… ok; thank you for the quick reply. 

von meinem Kläwwerfon gesendet

> Am 15.09.2023 um 21:54 schrieb Stefan Sperling :
> On Fri, Sep 15, 2023 at 04:55:42PM +0200, Wolfgang Oelerich wrote:
>> Hello,
>> 
>> recently, I „inherited“ one of Compulab‘s Fitlet3. I received it with 
>> Linux Mint installed and found all 4 available Ethernet ports working: 
>> 2 of its extensional FACET card and 2 of Intel‘s Elkhart Lake Atom X6425E 
>> with MARVELL-type PHY „88E1512" at Atom's PCIe bus (see link below). 
>> 
>> Now, I tried a clean install of OpenBSD 7.3/AMD64 which smoothly worked 
>> out but only the FACET card Ethernet ports have been recognized properly. 
>> While assuming BIOS is ok since Linux Mint worked I am wondering how far 
>> the hardware combination of X6425E/MARVELL PHY 88E1512 is already set to 
>> be working or if there is some driver or other Kernel level code not 
>> available yet.
> 
> Elkhart Lake Ethernet will require PCI attachment code to be written
> for dwqe(4). There is interest in getting this working but it will take
> time. Definitely won't be ready for OpenBSD 7.4. Maybe 7.5.