- User Since
- Mar 1 2015, 6:19 PM (308 w, 2 d)
Sep 12 2020
Sep 8 2020
Looks good to me, but this is not my area of expertise.
Jul 18 2020
Looks better, thanks!
Jul 5 2020
Sorry, I was thinking that the original text was gone; I see that it is here. It is still misleading, or at least poorly worded, to say that these commands "appeared" in FreeBSD 1.0. Essentially every command in 4.4BSD-Lite was also in FreeBSD 1.0, but we don't bother saying so; it adds no useful information. The reference to 1.0 should be deleted.
Jun 20 2020
Jun 18 2020
Jun 14 2020
Looks good to me, I'm ready to approve. I'd also like to see a reviewer who knows the brgphy code.
Jun 13 2020
May 30 2020
May 19 2020
Thanks, Conrad. I'm checking it out.
May 18 2020
In fact, tcp_connect was able to use a port that had a wildcard bind. I can't think of a real-world problem this would cause, but it was easy to fix.
Do not allow a port with a wildcard bind to be used for connect.
May 16 2020
Add sysctl to control new feature
May 15 2020
May 10 2020
The enterprise-grade Sidewinder firewall has had this feature for years. I don't know what other implementations work this way, but it seems like the obvious way to do this "right". A NAT box cannot serve multiple clients without handling port overlap, nor connections to multiple services (ports) on a server.
May 9 2020
Apr 22 2020
Apr 20 2020
Address more review comments; fix bug with bpf and txcsum.
Apr 19 2020
About doing a full detach: then code is needed to undo the init routine, and there are far more failure modes. I'll look at it though.
Is there an existing example of FDT / ACPI split to use as a model?
Apr 18 2020
Updates based on review comments, including teardown after failed attach.
Apr 17 2020
@greg: I'm not quite sure how the FDT/ACPI split should be done; I think that will have to wait for another time.
Apr 16 2020
Apr 15 2020
Arm seems most likely to want pre-loading, but I don't think it hurts anything. I think it could be enabled for everything. How about mips, powerpc?
Apr 14 2020
Looks good, I didn't realize that the kernel already had validation code. Might as well use it!
Apr 6 2020
Apr 4 2020
Nov 23 2019
Nov 12 2019
Conrad: this fixes a current problem with live systems, debugging a multicast problem. I am not aware of any requests to get multicast stats from a kernel core.
Nov 11 2019
Oct 3 2019
Sep 29 2019
Sep 22 2019
Sep 12 2019
Remove incomplete ifdefs.
Sep 6 2019
Upload correct version with nested loops.
Change to use nested loops for procs and threads; deal with zombproc
Sep 1 2019
Aug 30 2019
I took yet another tack last night, and it is better than previous attempts. It seems to be working correctly, but needs more testing. The changes are much bigger, mostly due to code motions. (svn diff is now 286 lines, about twice as big.) I'll test more, then decide whether to proceed with it.
Aug 29 2019
Aug 24 2019
Aug 22 2019
Aug 19 2019
Conrad: it has now been more than a week since Marcel asked a question. If you can't or won't explain why you oppose this change, I think you need to drop your block on the review.
Aug 12 2019
change macro to take parameter
Sorry that this was unclear. There is a limitation in phabricator to the kinds of negative feedback metadata one can provide. It's "request changes" or nothing.
Aug 11 2019
@cem: phabricator says "cem requested changes to this revision.", but I see no changes requested.
@cem: Not if it is an improvement on another change, and makes better use of the existing space.
Apr 22 2019
Mar 19 2019
Although I have a couple of inline comments, I wouldn't object to committing this as-is. Touching up would be fine too.
Mar 7 2019
This seems good to me. If this is not to be MFC'd, compatibility wouldn't matter (in which case I wouldn't have reduced the number of spares). It's nice to have things in order, but maybe this isn't the time to break compatibility given the small scope.
Feb 26 2019
I agree with John that we should do everything we can to eliminate class A/B/C rather than just shuffle it around. Removing those macros will cause some turmoil; e.g. libc's inet_netof and inet_lnaof assume classes, and don't know about local netmasks. They should probably go away. I don't know how painful that will be. But we are way overdue to get rid of this stuff, and it appears that Linux (Ubuntu) doesn't have them. But the old A/B/C are a somewhat different problem than making Class E usable.
Feb 25 2019
Hi, John! Very, very long time no (anything). I am very happy to see tests in this area. I certainly expect this to work with minimal changes (i.e. this one). Re: Classs A/B/C: I'd be quite happy to see those definitions go away. Re: "loopback net": I'm aware of a small number of things using that other than 127.0.0.1 (including one of my company's legacy products), but they are minor. I still remember driving a Sun workstation crazy by pinging 127.0.0.2 (there was a network route, but obviously only one address recognized.).
Feb 24 2019
Sorry, that reference should have been RFC 1112, not RFC 112.
It looks like I am the guilty party in calling Class E IN_EXPERIMENTAL, which went in when "Class D" became multicast. I suspect it was actually called that in some document, although it doesn't really matter. https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml doesn't call it Class E, but refers to RFC112, which does. In any case, assuming that https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml is still current, the treatment is the same.
I don't understand the purpose of this review. As it says, these changes should not be committed. I'm not actually sure of the official status of Class E, although I suspect it is still experimental/not for production use.
Generally looks good, one small comment inline.
Jan 26 2019
I agree that arprequest_int is rather opaque. At first I thought that is was just the version that returns int, which is not useful. arprequest_internal would be better. Otherwise, I have no objection; returning any errors seems like a good thing. And yes, I did not see any of the earlier (presumed) emails for this review.
Dec 8 2018
Nov 16 2018
Oct 30 2018
Sep 22 2018
Sep 19 2018
It would be good to see if the crashes stop before committing this, but it looks right to me.
Sep 6 2018
Sep 3 2018
Sep 1 2018
I believe I understand the issue with route caching. in6_selectroute_fib checks for loopback,and substitutes the interface with the local address. ip6_output doesn't need to know that interface, it should just skip the scope check in that case. I'll email a possible kernel patch to Andrey and Harti.