Skip site navigation (1)Skip section navigation (2)
Date:      3 Jan 2003 14:02:57 -0000
From:      Paulius Bulotas <paulius@kaktusas.org>
To:        FreeBSD-gnats-submit@FreeBSD.org
Subject:   ports/46724: Upgrade net/etherboot -> 5.0.8
Message-ID:  <20030103140257.274.qmail@noname.csdl.lt>

next in thread | raw e-mail | index | archive | help

>Number:         46724
>Category:       ports
>Synopsis:       Upgrade net/etherboot -> 5.0.8
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Fri Jan 03 06:10:02 PST 2003
>Closed-Date:
>Last-Modified:
>Originator:     Paulius Bulotas
>Release:        FreeBSD 4.6.2-RELEASE i386
>Organization:
>Environment:
System: FreeBSD noname.csdl.lt 4.6.2-RELEASE FreeBSD 4.6.2-RELEASE #0: Thu Aug 15 06:12:24 GMT 2002 root@test.csdl.lt:/usr/src/sys/compile/NONAME i386


	
>Description:
Upgrade Etherboot to 5.0.8
>How-To-Repeat:
Apply provided patch.
>Fix:
--- net/etherboot/Makefile.orig	Fri Jan  3 15:37:20 2003
+++ net/etherboot/Makefile	Fri Jan  3 15:37:34 2003
@@ -6,7 +6,7 @@
 #
 
 PORTNAME=	etherboot
-PORTVERSION=	5.0.5
+PORTVERSION=	5.0.8
 CATEGORIES=	net
 #MASTER_SITES=	${MASTER_SITE_SOURCEFORGE}
 #MASTER_SITE_SUBDIR=	${PORTNAME}
--- net/etherboot/distinfo.orig	Fri Jan  3 15:37:20 2003
+++ net/etherboot/distinfo	Fri Jan  3 15:40:54 2003
@@ -1 +1 @@
-MD5 (etherboot-5.0.5.tar.bz2) = 1b7bcf5544ef8729bd6ea571ef8fc365
+MD5 (etherboot-5.0.8.tar.bz2) = 150e2b96961924e3c4e83c8de90d24fb
--- net/etherboot/files/patch-ab.orig	Fri Jan  3 15:37:20 2003
+++ net/etherboot/files/patch-ab	Fri Jan  3 15:52:49 2003
@@ -1,6 +1,6 @@
---- nfs.c.orig	Tue Mar 12 21:44:19 2002
-+++ nfs.c	Thu Mar 14 07:51:43 2002
-@@ -321,6 +321,14 @@
+--- nfs.c.orig	Mon Mar 18 00:18:17 2002
++++ nfs.c	Fri Jan  3 15:49:03 2003
+@@ -61,6 +61,14 @@
  	int retries;
  	long *p;
  
@@ -15,8 +15,23 @@
  	id = rpc_id++;
  	buf.u.call.id = htonl(id);
  	buf.u.call.type = htonl(MSG_CALL);
-@@ -336,9 +344,14 @@
- 	*p++ = 0;		/* unused parameter */
+@@ -267,6 +275,14 @@
+ 	int retries;
+ 	int pathlen = strlen(path);
+ 
++	static int tokens=0;
++	/*
++	 * Try to implement something similar to a window protocol in
++	 * terms of response to losses. On successful receive, increment
++	 * the number of tokens by 1 (cap at 256). On failure, halve it.
++	 * When the number of tokens is >= 2, use a very short timeout.
++	 */
++
+ 	id = rpc_id++;
+ 	buf.u.call.id = htonl(id);
+ 	buf.u.call.type = htonl(MSG_CALL);
+@@ -285,9 +301,14 @@
+ 	p += (pathlen + 3) / 4;
  	for (retries = 0; retries < MAX_RPC_RETRIES; retries++) {
  		long timeout = rfc2131_sleep_interval(TIMEOUT, retries);
 +		if (tokens >= 2)
@@ -30,8 +45,8 @@
  			rpc = (struct rpc_t *)&nic.packet[ETH_HLEN];
  			if (rpc->u.reply.rstatus || rpc->u.reply.verifier ||
  			    rpc->u.reply.astatus || rpc->u.reply.data[0]) {
-@@ -355,7 +368,8 @@
- 			} else {
+@@ -305,7 +326,8 @@
+ 				memcpy(nfh, rpc->u.reply.data + 1, NFS_FHSIZE);
  				return 0;
  			}
 -		}

>Release-Note:
>Audit-Trail:
>Unformatted:

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ports" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030103140257.274.qmail>