diff options
author | bz <bz@FreeBSD.org> | 2009-02-01 21:11:08 +0000 |
---|---|---|
committer | bz <bz@FreeBSD.org> | 2009-02-01 21:11:08 +0000 |
commit | 5d8f0a53a75aefe97721f737758596bf3b542e2c (patch) | |
tree | a5470a3738df362d49e1bb6da8886ec0f93e4d7c /usr.bin | |
parent | 23001c70f6bbdc9d9fdf1e5004247a1ca399bca0 (diff) | |
download | FreeBSD-src-5d8f0a53a75aefe97721f737758596bf3b542e2c.zip FreeBSD-src-5d8f0a53a75aefe97721f737758596bf3b542e2c.tar.gz |
Remove the single global unlocked route cache ip6_forward_rt
from the inet6 stack along with statistics and make sure we
properly free the rt in all cases.
While the current situation is not better performance wise it
prevents panics seen more often these days.
After more inet6 and ipsec cleanup we should be able to improve
the situation again passing the rt to ip6_forward directly.
Leave the ip6_forward_rt entry in struct vinet6 but mark it
for removal.
PR: kern/128247, kern/131038
MFC after: 25 days
Committed from: Bugathon #6
Tested by: Denis Ahrens <denis@h3q.com> (different initial version)
Diffstat (limited to 'usr.bin')
-rw-r--r-- | usr.bin/netstat/inet6.c | 2 |
1 files changed, 0 insertions, 2 deletions
diff --git a/usr.bin/netstat/inet6.c b/usr.bin/netstat/inet6.c index b4aeb1a0..83a31c7f 100644 --- a/usr.bin/netstat/inet6.c +++ b/usr.bin/netstat/inet6.c @@ -512,8 +512,6 @@ ip6_stats(u_long off, const char *name, int af1 __unused, int proto __unused) } } - p1a(ip6s_forward_cachehit, "\t%ju forward cache hit\n"); - p1a(ip6s_forward_cachemiss, "\t%ju forward cache miss\n"); printf("\tSource addresses selection rule applied:\n"); for (i = 0; i < 16; i++) { if (ip6stat.ip6s_sources_rule[i]) |