User Details
- User Since
- Apr 14 2021, 8:54 PM (258 w, 2 d)
Jul 26 2025
Weird. Sounds like it should be reverted.
Why would you merge this?
Jul 23 2025
Do you think it’s a bad idea to extend the existing WireGuard driver with Netgraph hooks or custom UDP stream processing? (Similar to how mpd handles PPP streams in flexible ways.) — just a side question. Would that be a question better suited for the mailing list?
I think calling it something with "wg" in the name also is like cheating on your homework, poorly. "My dog ate my homework" level of silliness. Like... we all see it there. So just don't do it. Quit trying to call it WireGuard. Make your own VPN protocol, do all sorts of fun things, add this or that random obfuscation idea, whatever. Networking is fun; I don't want to stop you from enjoying yourself. I'm just asking that you don't try to peddle this as some kind of WireGuard thing, because from my perspective, it really is not. And I think this perspective suits us both: by getting rid of "wg" and not trying to pretend it's WireGuard, you get me totally out of your hair and you get to do whatever you want and I don't need to worry about it. And _then_ if you do come across some good ideas you want to upstream or talk to upstream about including in a protocol or whatever else, you can happily send an email to the mailing list, "hey I made a different non-wireguard thing, but I think this would be a cool idea to add. What do you guys think?" And then we can look at it and see. But, anyway, all of that begins by you not trying to pretend this is "wg" anything.
Jul 12 2025
I'm uncomfortable with you calling this "wireguard" in any way shape or form.
Jul 11 2025
"AdvancedSecurity" -- Windows 2000 branding comes to WireGuard!
Jun 19 2025
LGTM.
Jun 12 2025
May 22 2025
Mar 18 2024
Feb 27 2024
What ever happened to submitting this upstream in parts, as I described above in my first comment?
Nov 24 2022
Nov 17 2022
May 19 2021
May 18 2021
Seems clean and simple to me. Nice improvement over the last revision. Let's merge this.
Sure, that approach works fine too, and amounts to the same thing you'd arrive at with SRCU or epoch.
Another approach would be to add SX_NOASSERTS (in addition to SX_NOWITNESS), which would skip those KASSERTs and such.
If you look at _sx_xunlock() you see there is an assert that same thread locks and unlocks.
I don't think we want LinuxKPI stuff in core networking code, right?
I just wrote up a workaround of calling WITNESS_DESTROY and INIT manually like the vfs code which would work but was hackish, and then realized....
May 3 2021
I had previously sent this to freebsd-net, but I'm told phrabricator is a better place for it. Copy and pasting from: https://lists.freebsd.org/pipermail/freebsd-net/2021-April/058173.html :
Apr 20 2021
Apr 14 2021
It looks like the idea here is to increment a reference during ioctl, drop it at the end of an ioctl, and never increment a reference if it decrements to zero. Then, when destroying, you can simply drop the final reference and then sleep-loop until the reference drops to zero before you move on freeing things.
