From owner-cvs-src-old@FreeBSD.ORG Mon Mar 9 19:35:54 2009 Return-Path: Delivered-To: cvs-src-old@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id BF8551065672 for ; Mon, 9 Mar 2009 19:35:54 +0000 (UTC) (envelope-from jhb@FreeBSD.org) Received: from repoman.freebsd.org (repoman.freebsd.org [IPv6:2001:4f8:fff6::29]) by mx1.freebsd.org (Postfix) with ESMTP id AAA228FC14 for ; Mon, 9 Mar 2009 19:35:54 +0000 (UTC) (envelope-from jhb@FreeBSD.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.14.3/8.14.3) with ESMTP id n29JZsDG050131 for ; Mon, 9 Mar 2009 19:35:54 GMT (envelope-from jhb@repoman.freebsd.org) Received: (from svn2cvs@localhost) by repoman.freebsd.org (8.14.3/8.14.3/Submit) id n29JZs0B050130 for cvs-src-old@freebsd.org; Mon, 9 Mar 2009 19:35:54 GMT (envelope-from jhb@repoman.freebsd.org) Message-Id: <200903091935.n29JZs0B050130@repoman.freebsd.org> X-Authentication-Warning: repoman.freebsd.org: svn2cvs set sender to jhb@repoman.freebsd.org using -f From: John Baldwin Date: Mon, 9 Mar 2009 19:35:20 +0000 (UTC) To: cvs-src-old@freebsd.org X-FreeBSD-CVS-Branch: HEAD Subject: cvs commit: src/sys/kern subr_param.c sys_pipe.c vfs_bio.c src/sys/sys buf.h pipe.h src/sys/ufs/ffs ffs_snapshot.c ffs_vfsops.c src/sys/vm vm_init.c vnode_pager.c X-BeenThere: cvs-src-old@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: **OBSOLETE** CVS commit messages for the src tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 09 Mar 2009 19:35:55 -0000 jhb 2009-03-09 19:35:20 UTC FreeBSD src repository Modified files: sys/kern subr_param.c sys_pipe.c vfs_bio.c sys/sys buf.h pipe.h sys/ufs/ffs ffs_snapshot.c ffs_vfsops.c sys/vm vm_init.c vnode_pager.c Log: SVN rev 189595 on 2009-03-09 19:35:20Z by jhb Adjust some variables (mostly related to the buffer cache) that hold address space sizes to be longs instead of ints. Specifically, the follow values are now longs: runningbufspace, bufspace, maxbufspace, bufmallocspace, maxbufmallocspace, lobufspace, hibufspace, lorunningspace, hirunningspace, maxswzone, maxbcache, and maxpipekva. Previously, a relatively small number (~ 44000) of buffers set in kern.nbuf would result in integer overflows resulting either in hangs or bogus values of hidirtybuffers and lodirtybuffers. Now one has to overflow a long to see such problems. There was a check for a nbuf setting that would cause overflows in the auto-tuning of nbuf. I've changed it to always check and cap nbuf but warn if a user-supplied tunable would cause overflow. Note that this changes the ABI of several sysctls that are used by things like top(1), etc., so any MFC would probably require a some gross shims to allow for that. MFC after: 1 month Revision Changes Path 1.85 +6 -6 src/sys/kern/subr_param.c 1.200 +1 -1 src/sys/kern/sys_pipe.c 1.548 +40 -33 src/sys/kern/vfs_bio.c 1.208 +4 -4 src/sys/sys/buf.h 1.31 +1 -1 src/sys/sys/pipe.h 1.149 +2 -2 src/sys/ufs/ffs/ffs_snapshot.c 1.360 +1 -1 src/sys/ufs/ffs/ffs_vfsops.c 1.49 +3 -3 src/sys/vm/vm_init.c 1.250 +2 -2 src/sys/vm/vnode_pager.c