Page MenuHomeFreeBSD

glebius (Gleb Smirnoff)
User

Projects (6)

User Details

User Since
May 28 2014, 2:27 PM (554 w, 2 d)

Recent Activity

Today

glebius committed rG9234a50752cd: ng_ksocket: add IPv6 support for address parsing and unparsing (authored by p.mousavizadeh_protonmail.com).
ng_ksocket: add IPv6 support for address parsing and unparsing
Fri, Jan 10, 8:05 PM
glebius closed D48204: Add IPv6 support for address parsing and unparsing in ng_ksocket..
Fri, Jan 10, 8:04 PM · network
glebius added inline comments to D48204: Add IPv6 support for address parsing and unparsing in ng_ksocket..
Fri, Jan 10, 7:58 PM · network

Yesterday

glebius added a comment to D48204: Add IPv6 support for address parsing and unparsing in ng_ksocket..

Also, any meaningful change to a manual page requires bumping the .Dd value at the beginning of the page to today's date.

Thu, Jan 9, 3:32 PM · network
glebius added inline comments to D48204: Add IPv6 support for address parsing and unparsing in ng_ksocket..
Thu, Jan 9, 3:31 PM · network
glebius committed rG8e8f8d86e305: rpcbind: remove extraneous check for nconf not being unix(4) (authored by glebius).
rpcbind: remove extraneous check for nconf not being unix(4)
Thu, Jan 9, 4:05 AM
glebius committed rGebb36fcaae4d: rpc: remove svc_create(), it is not used (authored by glebius).
rpc: remove svc_create(), it is not used
Thu, Jan 9, 4:05 AM
glebius committed rG3a0cdb2675e6: rpc: clean kernel RPC internal headers of non-kernel declarations (authored by glebius).
rpc: clean kernel RPC internal headers of non-kernel declarations
Thu, Jan 9, 4:05 AM
glebius committed rG2834fd2ad58b: kgssapi: remove the debug module (authored by glebius).
kgssapi: remove the debug module
Thu, Jan 9, 4:05 AM
glebius committed rG5aac61c5d2bc: rpc: delete disabled code from rpcb_clnt.c (authored by glebius).
rpc: delete disabled code from rpcb_clnt.c
Thu, Jan 9, 4:05 AM

Wed, Jan 8

glebius accepted D48329: ls -h: humanize the total as well.

I agree that scripts shouldn't use -h.

Wed, Jan 8, 4:43 PM

Mon, Jan 6

glebius accepted D48344: rawip: Take the inpcb lock when appropriate in rip_ctloutput().
Mon, Jan 6, 11:40 PM
glebius committed rGb5c1f7d479de: xdr: use C99 initializers for xdr_ops (authored by glebius).
xdr: use C99 initializers for xdr_ops
Mon, Jan 6, 4:23 PM
glebius committed rG7f39f03c4d9a: libc/xdr: remove bogus lseek(2) for xdr streams (authored by glebius).
libc/xdr: remove bogus lseek(2) for xdr streams
Mon, Jan 6, 4:23 PM
glebius closed D48205: libc/xdr: remove bogus lseek(2) for xdr streams.
Mon, Jan 6, 4:22 PM

Fri, Jan 3

glebius requested review of D48316: netlink: some refactoring of NETLINK_GENERIC layer.
Fri, Jan 3, 10:35 PM
glebius committed rGe9255dafa1ef: pf: netlink KPI use cleanup (authored by glebius).
pf: netlink KPI use cleanup
Fri, Jan 3, 10:25 PM
glebius closed D48306: pf: netlink KPI use cleanup.
Fri, Jan 3, 10:25 PM
glebius requested review of D48315: sockets: virtualize kern.ipc.numopensockets.
Fri, Jan 3, 10:24 PM
glebius requested review of D48314: sockets: virtualize kern.ipc.soacceptqueue.
Fri, Jan 3, 9:36 PM
glebius added a comment to D48205: libc/xdr: remove bogus lseek(2) for xdr streams.

Isn't it used by svc_vc.c and clnt_vc.c? Any consumers of those interfaces would use this, it looks like, but there is no use of XDR_GET/SETPOS there that is affected by the bug, I think.

Fri, Jan 3, 7:21 PM
glebius updated the diff for D48205: libc/xdr: remove bogus lseek(2) for xdr streams.
  • use ptrdiff_t
  • put back break
Fri, Jan 3, 7:20 PM
glebius added inline comments to D48309: netlink: fix size comparison.
Fri, Jan 3, 6:43 PM
glebius requested review of D48311: netlink: provide snl(3) API for variable length raw data attribute.
Fri, Jan 3, 6:30 PM
glebius requested review of D48310: netlink: snl_create_genl_msg_request() may fail due to ENOMEM.
Fri, Jan 3, 6:29 PM
glebius requested review of D48309: netlink: fix size comparison.
Fri, Jan 3, 6:29 PM
glebius requested review of D48308: netlink: add snl(3) primitive to obtain group ID.
Fri, Jan 3, 6:28 PM
glebius requested review of D48307: netlink: augment group writer with priv(9) argument.
Fri, Jan 3, 6:28 PM
glebius requested review of D48306: pf: netlink KPI use cleanup.
Fri, Jan 3, 6:23 PM
glebius added a comment to D48054: IfAPI: hide struct ifaddr from if_foreach_addr_type() callbacks.

LGTM but let me ask @bartosz.sobczak_intel.com to take a look at irdma changes.

Fri, Jan 3, 5:58 PM

Mon, Dec 30

glebius accepted D48258: TCP RACK, BBR: cleanup of ctf_process_inbound_raw.
Mon, Dec 30, 8:07 PM
glebius added a comment to D48254: libdtrace: Be less strict when comparing pointer types.

Are you sure it was exactly the same? I fixed another problem recently which has similar symptoms: b64c5a0ace59.

Mon, Dec 30, 6:00 PM
glebius added a comment to D48254: libdtrace: Be less strict when comparing pointer types.

Don't have expertise to review, but thanks a lot for working on that. Was following your discussion with Dmitry. I hit this problem many many times, when running a different mix of modules on FreeBSD CURRENT and never bothered to understand it. Always resorted to recompile a static kernel.

Mon, Dec 30, 5:55 PM

Sun, Dec 29

glebius committed R11:c56f2a7ef8c8: net/minidlna: rescan/rebuild support in rc script (authored by glebius).
net/minidlna: rescan/rebuild support in rc script
Sun, Dec 29, 9:45 PM
glebius added a comment to D48246: committers-guide: increase subject length limit to 67 characters.

btw, I got this script. Named wrap74, it would wrap lines to 74 chars. And you can have several symlinks/hardlinks for it, with different names, e.g. wrap79, wrap64.

Sun, Dec 29, 7:41 PM
glebius closed D48238: net/minidlna: update to my snapshot on github.
Sun, Dec 29, 6:05 AM
glebius committed R11:a17c5eb04c04: net/minidlna: update to my snapshot on github (authored by glebius).
net/minidlna: update to my snapshot on github
Sun, Dec 29, 6:05 AM
glebius requested review of D48238: net/minidlna: update to my snapshot on github.
Sun, Dec 29, 4:20 AM
glebius added a comment to D48237: tcp: don't send beyond receivers advertised window.

In the sack_rxmit block there is another cwin calculation that uses tcp_compute_pipe() without capping with off. Later this cwin is used to calculate len. However, I have never caught such condition, so this revision leaves the above tcp_compute_pipe() use untouched.

Sun, Dec 29, 12:33 AM
glebius requested review of D48237: tcp: don't send beyond receivers advertised window.
Sun, Dec 29, 12:28 AM
glebius requested review of D48236: tcp: properly reset sackhint values when SACK recovery is done.
Sun, Dec 29, 12:26 AM
glebius requested review of D48235: tcp: make sack_rxmit in tcp_output() a bool.
Sun, Dec 29, 12:26 AM

Sat, Dec 28

glebius accepted D48232: ping: adjust error messages and comments for -gGh flags.
Sat, Dec 28, 11:24 PM
glebius accepted D48231: ping: correct minimal payload size for the sweep ping.
Sat, Dec 28, 11:02 PM

Thu, Dec 26

glebius requested review of D48205: libc/xdr: remove bogus lseek(2) for xdr streams.
Thu, Dec 26, 9:34 PM
glebius added a comment to D47512: ipv4: allow use of 240/4 by default.

Oh, pardon my Chirstmas hangover :)

Thu, Dec 26, 7:30 PM
glebius added a comment to D47512: ipv4: allow use of 240/4 by default.

Sorry for slightly diverting the topic. Once regular use of 240/4 is enabled by default, does it make any sense to maintain the IPv4 multicast support at all?

Thu, Dec 26, 6:31 PM

Tue, Dec 24

glebius committed rGc21f5751ef09: acpi_ibm: pass brightness events to evdev(4) (authored by glebius).
acpi_ibm: pass brightness events to evdev(4)
Tue, Dec 24, 2:14 AM
glebius closed D48174: acpi_ibm: pass brightness events to evdev(4).
Tue, Dec 24, 2:14 AM

Mon, Dec 23

glebius closed D48148: tcp: don't ever return ECONNRESET on close(2).
Mon, Dec 23, 6:36 PM
glebius committed rG053a98849734: tcp: don't ever return ECONNRESET on close(2) (authored by glebius).
tcp: don't ever return ECONNRESET on close(2)
Mon, Dec 23, 6:36 PM

Sun, Dec 22

glebius requested review of D48174: acpi_ibm: pass brightness events to evdev(4).
Sun, Dec 22, 3:28 AM

Fri, Dec 20

glebius added a comment to D48163: ip: Defer checks for an unspecified dstaddr until after pfil hooks.

On second thought this probably needs to be mentioned in Relnotes and not MFC-ed. Cause it might be that somebody was relying on the stack to drop those packets before firewall.

Fri, Dec 20, 5:56 PM
glebius accepted D48163: ip: Defer checks for an unspecified dstaddr until after pfil hooks.
Fri, Dec 20, 5:56 PM

Thu, Dec 19

glebius committed rGd052fcbd8668: rpc: svc_tli_create() is always called with NULL socket (authored by glebius).
rpc: svc_tli_create() is always called with NULL socket
Thu, Dec 19, 8:13 PM
glebius accepted D47335: sppp: Fix getting wrong spppreq cmd from ioctl.

Is this for stable/13 only? If you care about closing the bug, just go forward and commit it. The driver was removed in recent versions of FreeBSD.

Thu, Dec 19, 4:26 PM
glebius requested review of D48148: tcp: don't ever return ECONNRESET on close(2).
Thu, Dec 19, 4:09 PM
glebius committed rGc91dd7a054b3: tcp: remove unused variable from tcp_usr_disconnect() (authored by glebius).
tcp: remove unused variable from tcp_usr_disconnect()
Thu, Dec 19, 4:12 AM

Wed, Dec 18

glebius committed rGff7e00eb4dd6: tests: remove reference to renamed test (authored by glebius).
tests: remove reference to renamed test
Wed, Dec 18, 6:39 PM

Tue, Dec 17

glebius accepted D48069: ip_fw: address lock order reversal.
Tue, Dec 17, 9:53 PM
glebius added a comment to D48069: ip_fw: address lock order reversal.

uint8_t code

Tue, Dec 17, 9:52 PM
glebius added a comment to D48127: git-arc: vertically align tag values.

The change is a matter of taste, of course. So I decided to add all contributors to the script to create a kind of a vote. Anybody else using git-arc are also very welcome to join the review and vote their (dis)agreement.

Tue, Dec 17, 8:43 PM
glebius requested review of D48127: git-arc: vertically align tag values.
Tue, Dec 17, 8:41 PM

Mon, Dec 16

glebius added inline comments to D48069: ip_fw: address lock order reversal.
Mon, Dec 16, 3:02 PM
glebius committed rG3604a050eedb: tcp_hpts: refactor the per tcpcb call to either input/output method (authored by glebius).
tcp_hpts: refactor the per tcpcb call to either input/output method
Mon, Dec 16, 2:53 PM
glebius closed D47925: tcp_hpts: refactor the per tcpcb call to either input/output method.
Mon, Dec 16, 2:53 PM
glebius committed rG2ef97d8b7564: xen/netfront: use iflladdr_event to send ARPs (authored by glebius).
xen/netfront: use iflladdr_event to send ARPs
Mon, Dec 16, 2:50 PM
glebius closed D48053: xen/netfront: use iflladdr_event to send ARPs.
Mon, Dec 16, 2:50 PM
glebius added inline comments to D48052: IfAPI: add if_getaddr().
Mon, Dec 16, 2:42 PM

Thu, Dec 12

glebius added a reviewer for D48053: xen/netfront: use iflladdr_event to send ARPs: royger.
Thu, Dec 12, 2:13 PM
glebius requested review of D48052: IfAPI: add if_getaddr().
Thu, Dec 12, 2:12 PM
glebius requested review of D48054: IfAPI: hide struct ifaddr from if_foreach_addr_type() callbacks.
Thu, Dec 12, 2:12 PM
glebius requested review of D48053: xen/netfront: use iflladdr_event to send ARPs.
Thu, Dec 12, 2:12 PM
glebius added a comment to D47925: tcp_hpts: refactor the per tcpcb call to either input/output method.

Later I'd probably bring the input and output to same KBI, so that both return same signedness error for unlocked return. But this requires a sweeping change over stacks, so later.

Thu, Dec 12, 2:09 PM
glebius accepted D48001: icmp: improve INVARIANTS check.
Thu, Dec 12, 1:56 PM

Dec 10 2024

glebius accepted D48020: inpcb: Close some SO_REUSEPORT_LB races.
Dec 10 2024, 7:56 PM
glebius updated the diff for D47925: tcp_hpts: refactor the per tcpcb call to either input/output method.

Negate result of ctf_do_queued_segments() and compare error to >= 0.

Dec 10 2024, 7:26 PM
glebius added inline comments to D47925: tcp_hpts: refactor the per tcpcb call to either input/output method.
Dec 10 2024, 7:14 PM
glebius accepted D47944: vnet: Remove intermediate type casting to sysinit_nfunc_t.
Dec 10 2024, 7:06 PM
glebius requested changes to D48001: icmp: improve INVARIANTS check.

Thanks! Please apply same changes to netinet6/icmp6.c

Dec 10 2024, 7:05 PM

Dec 9 2024

glebius added a comment to D47935: pmap_growkernel(): do not panic immediately, return error.

I see, thanks. One other question: does the system in question have more than one NUMA domain? If so, we will use a large import quantum, KVA_NUMA_IMPORT_QUANTUM, and we need to be able to allocate more than two PTPs in order to grow the map by that much. That is, when vm_ndomains > 1, we should set vmd_interrupt_min to a larger value.

Dec 9 2024, 5:24 PM
glebius added a comment to D47935: pmap_growkernel(): do not panic immediately, return error.
vm.uma.tcp_inpcb.stats.xdomain: 0
vm.uma.tcp_inpcb.stats.fails: 0
vm.uma.tcp_inpcb.stats.frees: 602031303
vm.uma.tcp_inpcb.stats.allocs: 602042494
vm.uma.tcp_inpcb.stats.current: 11191
vm.uma.tcp_inpcb.domain.0.timin: 3
vm.uma.tcp_inpcb.domain.0.limin: 12
vm.uma.tcp_inpcb.domain.0.wss: 762
vm.uma.tcp_inpcb.domain.0.bimin: 1524
vm.uma.tcp_inpcb.domain.0.imin: 1524
vm.uma.tcp_inpcb.domain.0.imax: 3556
vm.uma.tcp_inpcb.domain.0.nitems: 2286
vm.uma.tcp_inpcb.limit.bucket_max: 18446744073709551615
vm.uma.tcp_inpcb.limit.sleeps: 0
vm.uma.tcp_inpcb.limit.sleepers: 0
vm.uma.tcp_inpcb.limit.max_items: 0
vm.uma.tcp_inpcb.limit.items: 0
vm.uma.tcp_inpcb.keg.domain.0.free_slabs: 0
vm.uma.tcp_inpcb.keg.domain.0.free_items: 23424
vm.uma.tcp_inpcb.keg.domain.0.pages: 30444
vm.uma.tcp_inpcb.keg.efficiency: 92
vm.uma.tcp_inpcb.keg.reserve: 0
vm.uma.tcp_inpcb.keg.align: 63
vm.uma.tcp_inpcb.keg.ipers: 7
vm.uma.tcp_inpcb.keg.ppera: 4
vm.uma.tcp_inpcb.keg.rsize: 2176
vm.uma.tcp_inpcb.keg.name: tcp_inpcb
vm.uma.tcp_inpcb.bucket_size_max: 254
vm.uma.tcp_inpcb.bucket_size: 131
vm.uma.tcp_inpcb.flags: 0x850000<VTOSLAB,SMR,FIRSTTOUCH>
vm.uma.tcp_inpcb.size: 2176
Dec 9 2024, 4:46 PM
glebius added a comment to D47935: pmap_growkernel(): do not panic immediately, return error.

Also, in your stack, why are we using kmem_malloc() to allocate a slab for inpcbs? That should be going through uma_small_alloc(), which doesn't need KVA. Was the kernel compiled with KASAN enabled?

Dec 9 2024, 4:44 PM
glebius committed rGa6a0b8d50e87: in6_var.h: make struct in6_ifaddr declaration searchable with grep(1) (authored by glebius).
in6_var.h: make struct in6_ifaddr declaration searchable with grep(1)
Dec 9 2024, 4:20 PM
glebius committed rG8e1af80243ff: IfAPI: make if_getlladdr() to return char * (authored by glebius).
IfAPI: make if_getlladdr() to return char *
Dec 9 2024, 4:20 PM
glebius committed rGd3f035f8d96a: ifnet: make sa_dl_equal() a static function (authored by glebius).
ifnet: make sa_dl_equal() a static function
Dec 9 2024, 4:20 PM

Dec 6 2024

glebius added a comment to D47935: pmap_growkernel(): do not panic immediately, return error.

What's the motivation for this change?

Dec 6 2024, 5:01 PM

Dec 4 2024

glebius requested review of D47925: tcp_hpts: refactor the per tcpcb call to either input/output method.
Dec 4 2024, 8:35 PM
glebius committed rGb2bde8a6d391: tcp_hpts: consistenly use macros to lock & unlock (authored by glebius).
tcp_hpts: consistenly use macros to lock & unlock
Dec 4 2024, 8:25 PM
glebius committed rG5cb73dbe4820: tcp_hpts: use booleans for tcp_hptsi() local variables (authored by glebius).
tcp_hpts: use booleans for tcp_hptsi() local variables
Dec 4 2024, 8:25 PM
glebius committed rG63446fd35421: tcp_hpts: use boolean to tell is it callout or userret context (authored by glebius).
tcp_hpts: use boolean to tell is it callout or userret context
Dec 4 2024, 8:25 PM
glebius closed D47889: git-arc: fix diff2reviewers() with multiple reviewers.
Dec 4 2024, 2:40 AM
glebius committed rGd6ed5ff4ac7d: git-arc: fix diff2reviewers() with multiple reviewers (authored by glebius).
git-arc: fix diff2reviewers() with multiple reviewers
Dec 4 2024, 2:40 AM

Dec 3 2024

glebius accepted D47590: inpcb: Factor out parts of in6_pcbbind() and in_pcbbind_setup().
Dec 3 2024, 8:26 PM
glebius added a comment to D47870: inpcb: Further restrict binding to a port owned by a different UID.

Do you have any idea on the inp->inp_socket->so_type != SOCK_STREAM check?

Dec 3 2024, 8:21 PM
glebius accepted D47832: inpcb: Remove bogus SO_REUSEPORT(_LB) checks in in_pcbbind().
Dec 3 2024, 8:19 PM
glebius requested review of D47889: git-arc: fix diff2reviewers() with multiple reviewers.
Dec 3 2024, 8:15 PM
glebius closed D47557: netlink: use nitems() and roundup(2) from param.h.
Dec 3 2024, 8:06 PM
glebius committed rG29f6150256c2: netlink: use nitems() and roundup(2) from param.h (authored by glebius).
netlink: use nitems() and roundup(2) from param.h
Dec 3 2024, 8:06 PM
glebius committed rGfe048349c63c: netlink: use proper argument types in genl_register_family() (authored by glebius).
netlink: use proper argument types in genl_register_family()
Dec 3 2024, 8:06 PM