User Details
- User Since
- May 28 2014, 2:27 PM (554 w, 2 d)
Today
Yesterday
Also, any meaningful change to a manual page requires bumping the .Dd value at the beginning of the page to today's date.
Wed, Jan 8
I agree that scripts shouldn't use -h.
Mon, Jan 6
Fri, Jan 3
- use ptrdiff_t
- put back break
Mon, Dec 30
Don't have expertise to review, but thanks a lot for working on that. Was following your discussion with Dmitry. I hit this problem many many times, when running a different mix of modules on FreeBSD CURRENT and never bothered to understand it. Always resorted to recompile a static kernel.
Sun, Dec 29
btw, I got this script. Named wrap74, it would wrap lines to 74 chars. And you can have several symlinks/hardlinks for it, with different names, e.g. wrap79, wrap64.
In the sack_rxmit block there is another cwin calculation that uses tcp_compute_pipe() without capping with off. Later this cwin is used to calculate len. However, I have never caught such condition, so this revision leaves the above tcp_compute_pipe() use untouched.
Sat, Dec 28
Thu, Dec 26
Oh, pardon my Chirstmas hangover :)
Sorry for slightly diverting the topic. Once regular use of 240/4 is enabled by default, does it make any sense to maintain the IPv4 multicast support at all?
Tue, Dec 24
Mon, Dec 23
Sun, Dec 22
Fri, Dec 20
On second thought this probably needs to be mentioned in Relnotes and not MFC-ed. Cause it might be that somebody was relying on the stack to drop those packets before firewall.
Thu, Dec 19
Is this for stable/13 only? If you care about closing the bug, just go forward and commit it. The driver was removed in recent versions of FreeBSD.
Wed, Dec 18
Tue, Dec 17
uint8_t code
The change is a matter of taste, of course. So I decided to add all contributors to the script to create a kind of a vote. Anybody else using git-arc are also very welcome to join the review and vote their (dis)agreement.
Mon, Dec 16
Thu, Dec 12
Later I'd probably bring the input and output to same KBI, so that both return same signedness error for unlocked return. But this requires a sweeping change over stacks, so later.
Dec 10 2024
Negate result of ctf_do_queued_segments() and compare error to >= 0.
Thanks! Please apply same changes to netinet6/icmp6.c
Dec 9 2024
vm.uma.tcp_inpcb.stats.xdomain: 0 vm.uma.tcp_inpcb.stats.fails: 0 vm.uma.tcp_inpcb.stats.frees: 602031303 vm.uma.tcp_inpcb.stats.allocs: 602042494 vm.uma.tcp_inpcb.stats.current: 11191 vm.uma.tcp_inpcb.domain.0.timin: 3 vm.uma.tcp_inpcb.domain.0.limin: 12 vm.uma.tcp_inpcb.domain.0.wss: 762 vm.uma.tcp_inpcb.domain.0.bimin: 1524 vm.uma.tcp_inpcb.domain.0.imin: 1524 vm.uma.tcp_inpcb.domain.0.imax: 3556 vm.uma.tcp_inpcb.domain.0.nitems: 2286 vm.uma.tcp_inpcb.limit.bucket_max: 18446744073709551615 vm.uma.tcp_inpcb.limit.sleeps: 0 vm.uma.tcp_inpcb.limit.sleepers: 0 vm.uma.tcp_inpcb.limit.max_items: 0 vm.uma.tcp_inpcb.limit.items: 0 vm.uma.tcp_inpcb.keg.domain.0.free_slabs: 0 vm.uma.tcp_inpcb.keg.domain.0.free_items: 23424 vm.uma.tcp_inpcb.keg.domain.0.pages: 30444 vm.uma.tcp_inpcb.keg.efficiency: 92 vm.uma.tcp_inpcb.keg.reserve: 0 vm.uma.tcp_inpcb.keg.align: 63 vm.uma.tcp_inpcb.keg.ipers: 7 vm.uma.tcp_inpcb.keg.ppera: 4 vm.uma.tcp_inpcb.keg.rsize: 2176 vm.uma.tcp_inpcb.keg.name: tcp_inpcb vm.uma.tcp_inpcb.bucket_size_max: 254 vm.uma.tcp_inpcb.bucket_size: 131 vm.uma.tcp_inpcb.flags: 0x850000<VTOSLAB,SMR,FIRSTTOUCH> vm.uma.tcp_inpcb.size: 2176
Dec 6 2024
Dec 4 2024
Dec 3 2024
Do you have any idea on the inp->inp_socket->so_type != SOCK_STREAM check?