From owner-freebsd-hackers Wed Sep 25 4: 2:32 2002 Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.FreeBSD.org (mx1.FreeBSD.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 09CA137B401 for ; Wed, 25 Sep 2002 04:02:31 -0700 (PDT) Received: from nic.upatras.gr (nic.upatras.gr [150.140.129.30]) by mx1.FreeBSD.org (Postfix) with SMTP id C149843E42 for ; Wed, 25 Sep 2002 04:02:28 -0700 (PDT) (envelope-from keramida@ceid.upatras.gr) Received: (qmail 11285 invoked from network); 25 Sep 2002 10:55:36 -0000 Received: from upnet-dialinpool-88.upatras.gr (HELO hades.hell.gr) (150.140.128.166) by nic.upatras.gr with SMTP; 25 Sep 2002 10:55:36 -0000 Received: from hades.hell.gr (hades [127.0.0.1]) by hades.hell.gr (8.12.6/8.12.6) with ESMTP id g8P939fi002347; Wed, 25 Sep 2002 12:03:09 +0300 (EEST) (envelope-from keramida@ceid.upatras.gr) Received: (from keramida@localhost) by hades.hell.gr (8.12.6/8.12.6/Submit) id g8P939p5002346; Wed, 25 Sep 2002 12:03:09 +0300 (EEST) (envelope-from keramida@ceid.upatras.gr) Date: Wed, 25 Sep 2002 12:03:09 +0300 From: Giorgos Keramidas To: Prafulla Deuskar Cc: freebsd-hackers@FreeBSD.org Subject: Re: mbuf chain Message-ID: <20020925090309.GC597@hades.hell.gr> References: <20020924135748.A53562@hub.freebsd.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20020924135748.A53562@hub.freebsd.org> X-PGP-Fingerprint: C1EB 0653 DB8B A557 3829 00F9 D60F 941A 3186 03B6 Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG On 2002-09-24 13:57, Prafulla Deuskar wrote: > All, > > Is there a pre-set limit on maximum number of fragments in a > mbuf chain ? Not as a limit of the mbuf chain code, but as a limit of the IP packet input code. Look at the description of the ip_maxfragpackets sysctl value in src/sys/netinet/ip_input.c It is initialized by default to (nmbclusters / 4) in ip_init(). The relevant code, that enforces the limit, is near the beginning of the ip_reass() function in the same file. Giorgos. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message