Date: Mon, 9 Mar 2009 19:35:20 +0000 (UTC) From: John Baldwin <jhb@FreeBSD.org> To: cvs-src-old@freebsd.org Subject: cvs commit: src/sys/kern subr_param.c sys_pipe.c vfs_bio.c src/sys/sys buf.h pipe.h src/sys/ufs/ffs ffs_snapshot.c ffs_vfsops.c src/sys/vm vm_init.c vnode_pager.c Message-ID: <200903091935.n29JZs0B050130@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
jhb 2009-03-09 19:35:20 UTC
FreeBSD src repository
Modified files:
sys/kern subr_param.c sys_pipe.c vfs_bio.c
sys/sys buf.h pipe.h
sys/ufs/ffs ffs_snapshot.c ffs_vfsops.c
sys/vm vm_init.c vnode_pager.c
Log:
SVN rev 189595 on 2009-03-09 19:35:20Z by jhb
Adjust some variables (mostly related to the buffer cache) that hold
address space sizes to be longs instead of ints. Specifically, the follow
values are now longs: runningbufspace, bufspace, maxbufspace,
bufmallocspace, maxbufmallocspace, lobufspace, hibufspace, lorunningspace,
hirunningspace, maxswzone, maxbcache, and maxpipekva. Previously, a
relatively small number (~ 44000) of buffers set in kern.nbuf would result
in integer overflows resulting either in hangs or bogus values of
hidirtybuffers and lodirtybuffers. Now one has to overflow a long to see
such problems. There was a check for a nbuf setting that would cause
overflows in the auto-tuning of nbuf. I've changed it to always check and
cap nbuf but warn if a user-supplied tunable would cause overflow.
Note that this changes the ABI of several sysctls that are used by things
like top(1), etc., so any MFC would probably require a some gross shims
to allow for that.
MFC after: 1 month
Revision Changes Path
1.85 +6 -6 src/sys/kern/subr_param.c
1.200 +1 -1 src/sys/kern/sys_pipe.c
1.548 +40 -33 src/sys/kern/vfs_bio.c
1.208 +4 -4 src/sys/sys/buf.h
1.31 +1 -1 src/sys/sys/pipe.h
1.149 +2 -2 src/sys/ufs/ffs/ffs_snapshot.c
1.360 +1 -1 src/sys/ufs/ffs/ffs_vfsops.c
1.49 +3 -3 src/sys/vm/vm_init.c
1.250 +2 -2 src/sys/vm/vnode_pager.c
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200903091935.n29JZs0B050130>
