Date: Mon, 9 Mar 2009 19:35:20 +0000 (UTC) From: John Baldwin <jhb@FreeBSD.org> To: cvs-src-old@freebsd.org Subject: cvs commit: src/sys/kern subr_param.c sys_pipe.c vfs_bio.c src/sys/sys buf.h pipe.h src/sys/ufs/ffs ffs_snapshot.c ffs_vfsops.c src/sys/vm vm_init.c vnode_pager.c Message-ID: <200903091935.n29JZs0B050130@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
jhb 2009-03-09 19:35:20 UTC FreeBSD src repository Modified files: sys/kern subr_param.c sys_pipe.c vfs_bio.c sys/sys buf.h pipe.h sys/ufs/ffs ffs_snapshot.c ffs_vfsops.c sys/vm vm_init.c vnode_pager.c Log: SVN rev 189595 on 2009-03-09 19:35:20Z by jhb Adjust some variables (mostly related to the buffer cache) that hold address space sizes to be longs instead of ints. Specifically, the follow values are now longs: runningbufspace, bufspace, maxbufspace, bufmallocspace, maxbufmallocspace, lobufspace, hibufspace, lorunningspace, hirunningspace, maxswzone, maxbcache, and maxpipekva. Previously, a relatively small number (~ 44000) of buffers set in kern.nbuf would result in integer overflows resulting either in hangs or bogus values of hidirtybuffers and lodirtybuffers. Now one has to overflow a long to see such problems. There was a check for a nbuf setting that would cause overflows in the auto-tuning of nbuf. I've changed it to always check and cap nbuf but warn if a user-supplied tunable would cause overflow. Note that this changes the ABI of several sysctls that are used by things like top(1), etc., so any MFC would probably require a some gross shims to allow for that. MFC after: 1 month Revision Changes Path 1.85 +6 -6 src/sys/kern/subr_param.c 1.200 +1 -1 src/sys/kern/sys_pipe.c 1.548 +40 -33 src/sys/kern/vfs_bio.c 1.208 +4 -4 src/sys/sys/buf.h 1.31 +1 -1 src/sys/sys/pipe.h 1.149 +2 -2 src/sys/ufs/ffs/ffs_snapshot.c 1.360 +1 -1 src/sys/ufs/ffs/ffs_vfsops.c 1.49 +3 -3 src/sys/vm/vm_init.c 1.250 +2 -2 src/sys/vm/vnode_pager.c
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200903091935.n29JZs0B050130>