User Details
- User Since
- Dec 19 2016, 4:11 AM (417 w, 6 d)
Oct 21 2024
Thank you for Documenting these.
Yes please!
Jul 4 2024
Arbitrarily large (and I consider 4096 in this case Arbitrary) are dangerous and lead to a condition known as buffer bloat. I suspect that the actual problem here is simply being sweep under the carpet by using a bloated interface queue. Some place we are overrunning something, and that place needs to more clearly identified.
May 7 2024
Feb 16 2024
Its getting much better, probably with pushing a commit soon.
Feb 15 2024
Just some nits.
Feb 8 2024
Ifyou open a review and tag a person into that review you should wait at least 24 hours before you commit the code, giving that person time to respond.
Jan 24 2024
Please put a a gonein(15) into the fdisk binary with a way for "users" to inform the project of there use before we just remove this silently.
First point, a manpage addition is pointless unless you have the binary emit a warning when invoked. Second how does one execute bsdlabel -e -A with gpart?
Given this I also assume one cat specify "atime" in /etc/fstab?
Jan 4 2024
I see this as the better of the two solutions in front of us.
Jan 3 2024
Sadly this should of been caught and corrected during the removal of $FreeBSD$. It should be possible to mechanically validate the raw diff with something:
net:root {1024}# egrep -v '^@@ |^\+\+\+|^---' D43290.diff | egrep '^-|^\+' | sort -u
net:root {1025}#
Ie, the diff does infact ONLY remove blank lines and adds nothing
Dec 18 2023
Dec 14 2023
Dec 13 2023
This certainly makes things better, but I wonder how it gets along with the other memory pigs, ZFS and bhyve?
This solves it too.
Dec 8 2023
Warner, does the protection added by my enhancements to this change meet your criteria of keeping it such that /usr does not become a requirement, thus reducing your concerns on that manner.
Dec 2 2023
See the PR where I go into details on why the OP had the failure. This "works as inteneded" without this change. Note to say that I wouldnt accept a carefully coded if [ -x block that would do the right things in most instances, including adding an error handling if neither tar exists.
Nov 5 2023
This looks appropriate to me.
May 13 2023
You could add the hier(7) man page update to this review since this change is what effects that man page too.
Thank you Mike
Sep 14 2022
Jul 28 2022
With the constraints that are here I am in favor of allowing these.
Jul 17 2022
Adding some more eyes to this, IIRC this is ofed code and actually maintained and imported from some place else. Though I agree with Glebius that this is the right way to fix it, it may need or be desired to do this upstream. Hselesky is the infiniband expert.
Jul 12 2022
Jul 11 2022
Agree that this should be committed at the same time as the functional code changes.
Jul 10 2022
I like the numberical ip_allow_netX version as well. I also agree that changing rc.firewall at this time is premature.
Jul 7 2022
Adding a reference to https://reviews.freebsd.org/D19316 for some historical discussion.
Jul 5 2022
Dec 6 2021
Pi, thank you for spotting this, and bz thanks for the quick fix. This explains some issues I had when I tried to migrate to 13 on a router, but had no time to investigate what was going wrong.
Sep 24 2021
I strongly disagree with adding "site and user specific" tweaks to the dot.cshrc files. Further I note that a huge down side of systems that do this xterm tittle setting create very miss leading situations when the terminal disconnects for any reason (ie your xterm is now local, not remote). Some systems do infact try to clean that up in the logout scripts, but that doesnt work if your disconnected for any other reason. There is already a very clear default prompt setting that shows you the hostname of the system you are logged into.
Sep 18 2021
Sep 12 2021
Sep 6 2021
Add some reviewers, and pull in most of the subscribers fro D19316
Looks ok to me, just a comment on keeping code speed the same in almost all cases.
Jul 27 2021
Jul 9 2021
Jul 8 2021
Jun 19 2021
Jun 11 2021
May 21 2021
Though I am not a big fan of these, as the src tree would need a massive quantity of these added to make much of a dent at all in documenting what part of what rfc is being implemented, I wont stand in the way of one more near useless comment.
May 13 2021
May 3 2021
The adding of blank lines between all the forward declarations seems wrong to me.
May 2 2021
May 1 2021
Apr 29 2021
Apr 27 2021
I am accepting this without the IPSTAT_INC(ips_forward) issue being fixed, as it looks to me as if that is an existing and separate problem in the code. Probably a walk through should be done to see that ips_forward and ips_cantforward are all done correctly.
Apr 26 2021
I would still like to see the "169.254.0.0/16" changed to IN_LINKLOCAL, purpose of macro is to locate this value one place and one place only, scattering this string in the code undoes that.
Apr 23 2021
Apr 20 2021
Thanks for chasing these down
This is already a good improvement and acceptable as is with Greg's corrections.
Apr 10 2021
Apr 9 2021
Apr 7 2021
Though this is not exactly a normal service, to me listening on any by default is the correct thing to do here. One thing I would like to note, this code appears to only listens on one of IPv4 or IPv6, which is probably a short coming.
Apr 6 2021
Hum, not a core system functionality? May I remind you that ftp://ftp.freebsd.org exists? Though it probably does not run the base system ftpd, it DOES run that functionality. Also so much for the project being a democracy, seems that core@ and security@ now simply dictate to developers@ how things are to be done... nothing personal Gordon, but that is exactly how this is coming across.
Rather than spend cycles on deprecating USED features, please spend cycles on getting pkg base done so that those that feel they have no need for things like ftp/ftpd/telnet/telnetd/foo/bar/etc can choose to not have these and those of us who live and die by such tools can choose to have them.
Mar 5 2021
I am ok with doing this, though it still leaves all the other issues open.
Given the issues I would rather NOT add dscp support at all, until these issues can be addressed from down/upstream? The current situation, both in pfsense and freebsd is poor at best and may actually be one of the sources of issues we are seeing in our ECN data collection work. We know for a fact people are being told to use these ancient and obsolete TOS values by looking for them in blog posts and how-to's. Using the pry bar that is "reduce diffs between" as a reason to add a bad situation is an ever worse situation!
I'd be happy to extend the man page to make that clearer. Do you have any suggested phrasing?
I have a concern here, some of which goes beyond just this change, about aliasing DSCP to TOS. We (a small congestion control research group) have found that due to ambigious manual pages, headers and other factors, some present in PF it appears are causing mismarked traffic on the internet. DSCP is shifted left by the 2 ECN bits, the manual pages and any other documentation MUST be made explicity clear about this fact as to if your supplying the values as specified in the RFC"s on DSCP (unshifted) or are you applying TOS bits that may or may not have the ECN bits masked out.
This is a move in the right directions, at least this is state created by the installer.
Mar 4 2021
Maybe a seperate pass over this code to try and clean up the fact that we have used the string "/efi" many places such that it should probably become some type of #define or derived from the system make file values so that any changes to this value can be done in one place and one place only and all things using it are fixed.
Mar 3 2021
I personally prefer /efi, as I consider /boot to belong to FreeBSD and contain the FreeBSD specific boot code. EFI is a platform specific set of boot code and belongs to the system board, and though it may contain freeBSD specific code it may also contain OTHER code, especially in a multiboot environment.
Feb 14 2021
/24 is not an assumption of home lab, it is the longest of the 3 prefixes that would of been picked before, and infact is probably most often the correct mask to be used.
Feb 13 2021
I would like to see a survey of what some other OS's due in this situation. I have participated in discussions elsewhere on this issue and just blindly making these host only, IMHO, is probably going to silently cause a lot of failures on finger memory. Infact it is probalby safer to assume a /24 than a /32. BUTT I think the preferable solution here may be to return an error if the netmask is not specified, thus doing nothing rather than guessing and doing something wrong.
Feb 11 2021
No statement about do_prr being on by default?
Feb 9 2021
Feb 2 2021
Feb 1 2021
Jan 29 2021
Jan 25 2021
Jan 21 2021
How is the default 2 minute "linger" timer being implemented now if this is dead code? iirc this value use to be used when a socket was closed on the server side to control how long one waited in close_wait for the client to finish up the connection (server initiated close.)
Jan 17 2021
This fixes at least one dependance on /usr, I see another later, mktemp which is /usr/bin/mktemp. I would of marked it above, but a full file context was not uploaded to this review.
Dec 4 2020
Nov 24 2020
Oct 26 2020
Oct 25 2020
Though this is good intent, it is not a good approach. I'll assert again at one time we had erradicated all /usr/local from the base system, these above have crept in over time and again should be erradicated. There should never ever be a /usr/local #define in paths.h, having to recompile code to change this, again, is the wrong approach. This should _possibly_/_probably_ be moved to a kernel variable that can be changed at boot time.