From owner-freebsd-hackers Mon Jan 13 02:12:43 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.4/8.8.4) id CAA03741 for hackers-outgoing; Mon, 13 Jan 1997 02:12:43 -0800 (PST) Received: from root.com (implode.root.com [198.145.90.17]) by freefall.freebsd.org (8.8.4/8.8.4) with ESMTP id CAA03733 for ; Mon, 13 Jan 1997 02:12:39 -0800 (PST) Received: from localhost (localhost [127.0.0.1]) by root.com (8.7.6/8.6.5) with SMTP id CAA28443; Mon, 13 Jan 1997 02:10:13 -0800 (PST) Message-Id: <199701131010.CAA28443@root.com> X-Authentication-Warning: implode.root.com: Host localhost [127.0.0.1] didn't use HELO protocol To: Ade Barkah cc: eka@werty.wasantara.net.id (Eka Kelana), freebsd-hackers@freebsd.org Subject: Re: bug in setsockopt()... ? In-reply-to: Your message of "Sun, 12 Jan 1997 23:50:55 MST." <199701130650.XAA17894@hemi.com> From: David Greenman Reply-To: dg@root.com Date: Mon, 13 Jan 1997 02:10:13 -0800 Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk >I've observed that in FreeBSD, after a connect(), the buffer size >is adjusted according to the MTU of the connecting interface inde- >pendent of the socket buffer high water mark. Perhaps the intent >is to automatically reserve reasonable buffer sizes based on the >interface MTU. This is actually a bug that Garrett has on his whiteboard... -DG David Greenman Core-team/Principal Architect, The FreeBSD Project