Date: Sat, 11 Sep 2010 15:02:42 -0400 From: Alexander Kabaev <kabaev@gmail.com> To: Matthew D Fleming <mdf@FreeBSD.org> Cc: svn-src-head@freebsd.org, svn-src-all@freebsd.org, src-committers@freebsd.org Subject: Re: svn commit: r212367 - in head: share/man/man9 sys/kern sys/sys Message-ID: <20100911150242.714ef287@kan.dnsalias.net> In-Reply-To: <201009091749.o89HnI0q012855@svn.freebsd.org> References: <201009091749.o89HnI0q012855@svn.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--Sig_/EjeclXe.uA8kbHX6JlUymQf Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable On Thu, 9 Sep 2010 17:49:18 +0000 (UTC) Matthew D Fleming <mdf@FreeBSD.org> wrote: > Author: mdf > Date: Thu Sep 9 17:49:18 2010 > New Revision: 212367 > URL: http://svn.freebsd.org/changeset/base/212367 >=20 > Log: > Add drain functionality to sbufs. The drain is a function that is > called when the sbuf internal buffer is filled. For kernel sbufs > with a drain, the internal buffer will never be expanded. For > userland sbufs with a drain, the internal buffer may still be > expanded by sbuf_[v]printf(3). > =20 > Sbufs now have three basic uses: > 1) static string manipulation. Overflow is marked. > 2) dynamic string manipulation. Overflow triggers string growth. > 3) drained string manipulation. Overflow triggers draining. > =20 > In all cases the manipulation is 'safe' in that overflow is > detected and managed. > =20 > Reviewed by: phk (the previous version) >=20 This one is responsible for hangs on my amd64 test box. --=20 Alexander Kabaev --Sig_/EjeclXe.uA8kbHX6JlUymQf Content-Type: application/pgp-signature; name=signature.asc Content-Disposition: attachment; filename=signature.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.16 (FreeBSD) iD8DBQFMi9JWQ6z1jMm+XZYRAnGOAJ4vQZYmtrli+X1GTjsmZXnlLwkUxQCcCvWD qmCBc7/YslVCmFU8BA8ElSw= =XkMQ -----END PGP SIGNATURE----- --Sig_/EjeclXe.uA8kbHX6JlUymQf--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20100911150242.714ef287>