From owner-freebsd-net@freebsd.org Wed Nov 11 20:38:39 2015 Return-Path: Delivered-To: freebsd-net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D2116A2A669 for ; Wed, 11 Nov 2015 20:38:39 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id B521C1BDA for ; Wed, 11 Nov 2015 20:38:39 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id tABKcdSI095280 for ; Wed, 11 Nov 2015 20:38:39 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-net@FreeBSD.org Subject: [Bug 204438] setsockopt() handling of kern.ipc.maxsockbuf limit Date: Wed, 11 Nov 2015 20:38:39 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.0-CURRENT X-Bugzilla-Keywords: needs-patch, needs-qa X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: cameronsparr@gmail.com X-Bugzilla-Status: New X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-net@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: mfc-stable9? mfc-stable10? X-Bugzilla-Changed-Fields: attachments.created Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 11 Nov 2015 20:38:39 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=204438 --- Comment #6 from Cameron Sparr --- Created attachment 163023 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=163023&action=edit Patch of the diff in the URL section. Changes behavior of setsockopt This change makes it so that the setsockopt() function does not error when a user passes a value for SO_RCVBUF equal or under the maximim (kern.ipc.maxsockbuf). Currently the behavior is to error if the value is greater than the _adjusted_ max, which on amd64 turns out to be something like kern.ipc.maxsockbuf * 0.889 This is confusing for users, and this change will set the value passed to the adjusted max if the value is greater than the adjusted and less than the actual max. -- You are receiving this mail because: You are the assignee for the bug.