Date: Sun, 17 Jan 2016 16:38:04 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 206338] [Patch] net/shadowsocks-libev disable TCP_FASTOPEN on FreeBSD Message-ID: <bug-206338-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D206338 Bug ID: 206338 Summary: [Patch] net/shadowsocks-libev disable TCP_FASTOPEN on FreeBSD Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Keywords: patch Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: loader@FreeBSD.org CC: xiaoding+freebsd@xiaoding.org Flags: maintainer-feedback?(xiaoding+freebsd@xiaoding.org) Keywords: patch CC: xiaoding+freebsd@xiaoding.org Created attachment 165720 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D165720&action= =3Dedit shadowsocks-libev-1.6.4.diff net/shadowsocks-libev failed to compile on FreeBSD 11.0-CURRENT: http://p.defau.lt/?03767uGJxTGOj9CtFItHOg It looks like TCP_FASTOPEN has been introduced into base recently: https://svnweb.freebsd.org/base/head/sys/netinet/tcp.h?r1=3D292309&r2=3D292= 706&pathrev=3D292706 I think we can just disable it on FreeBSD for now,=20 here's the poudriere log after applying the patch: http://p.defau.lt/?UyMsDov4iDA17iH00cQjWg --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-206338-13>