Sponsored Content
The Lounge What is on Your Mind? Does your spouse nag you while you passionately code? Post 302905579 by sidnow on Thursday 12th of June 2014 08:18:00 AM
Old 06-12-2014
Robin,

This is by far the best double meaning set of phrases I have ever come across
May I ask a question, are the below out of past experience Smilie

Quote:
Originally Posted by rbatte1
A few thoughts that might help you:-
  • You might need to work on your interfacing
  • Negotiating access is critical before attempting IO
  • Ensure you use the agreed port
  • Take virus protection seriously
  • Try not to panic the server in any way
  • Interrupts can cause panics, so ensure you have the firewall closed
  • Server processor peaking at 100% active is a good thing
  • Make sure that there is a graceful disconnect in all conversations
  • Scheduled activities on a timer are not as good as following a processing flow in sequence
  • IT promises rarely live up to customer expectations and can cause resentment
  • Beware of setting a "while true" loop unless you can handle the performance requirements
  • Don't just try an upgrade for the fun of it. Commit to your choice as conflicts caused can be irreparable
  • Beware of becoming obsolete yourself

Some people say that men substitute inadequacies by purchasing a big car and perhaps driving it in & out of the garage, but most probably just polish what they've got.

I could go on, but they degrade and get more offensive, so I should stop there from the point of decency. I hope that this has not offended anyone.



Robin Smilie
 

We Also Found This Discussion For You

1. Shell Programming and Scripting

Block of code replacement in Java source code through Unix script

Hi, I want to remove the following code from Source files (or replace the code with empty.) from all the source files in given directory. finally { if (null != hibernateSession && hibernateSession.isOpen()) { //hibernateSession.close(); } } It would be great if the script has... (2 Replies)
Discussion started by: hareeshram
2 Replies
PFIL(9) 						   BSD Kernel Developer's Manual						   PFIL(9)

NAME
pfil, pfil_head_register, pfil_head_unregister, pfil_head_get, pfil_hook_get, pfil_add_hook, pfil_remove_hook, pfil_run_hooks -- packet fil- ter interface SYNOPSIS
#include <sys/param.h> #include <sys/mbuf.h> #include <net/if.h> #include <net/pfil.h> int pfil_head_register(struct pfil_head *ph); int pfil_head_unregister(struct pfil_head *ph); struct pfil_head * pfil_head_get(int af, u_long dlt); struct packet_filter_hook * pfil_hook_get(int dir, struct pfil_head *ph); int pfil_add_hook(int (*func)(), void *arg, int flags, struct pfil_head *ph); int pfil_remove_hook(int (*func)(), void *arg, int flags, struct pfil_head *ph); int (*func)(void *arg, struct mbuf **mp, struct ifnet *, int dir); int pfil_run_hooks(struct pfil_head *ph, struct mbuf **mp, struct ifnet *ifp, int dir); DESCRIPTION
The pfil framework allows for a specified function to be invoked for every incoming or outgoing packet for a particular network I/O stream. These hooks may be used to implement a firewall or perform packet transformations. Packet filtering points are registered with pfil_head_register(). Filtering points are identified by a key (void *) and a data link type (int) in the pfil_head structure. Packet filters use the key and data link type to look up the filtering point with which they register themselves. The key is unique to the filtering point. The data link type is a bpf(4) DLT constant indicating what kind of header is present on the packet at the filtering point. Filtering points may be unregistered with the pfil_head_unregister() function. Packet filters register/unregister themselves with a filtering point with the pfil_add_hook() and pfil_remove_hook() functions, respectively. The head is looked up using the pfil_head_get() function, which takes the key and data link type that the packet filter expects. Filters may provide an argument to be passed to the filter when invoked on a packet. When a filter is invoked, the packet appears just as if it ``came off the wire''. That is, all protocol fields are in network byte order. The filter is called with its specified argument, the pointer to the pointer to the mbuf containing the packet, the pointer to the network interface that the packet is traversing, and the direction (PFIL_IN or PFIL_OUT, see also below) that the packet is traveling. The filter may change which mbuf the mbuf ** argument references. The filter returns an errno if the packet processing is to stop, or 0 if the process- ing is to continue. If the packet processing is to stop, it is the responsibility of the filter to free the packet. The flags parameter, used in the pfil_add_hook() and pfil_remove_hook() functions, indicates when the filter should be called. The flags are: PFIL_IN call me on incoming packets PFIL_OUT call me on outgoing packets PFIL_ALL call me on all of the above PFIL_IFADDR call me on interface reconfig (mbuf ** is ioctl #) PFIL_IFNET call me on interface attach/detach (mbuf ** is either PFIL_IFNET_ATTACH or PFIL_IFNET_DETACH) PFIL_WAITOK OK to call malloc with M_WAITOK. The pfil interface is enabled in the kernel via the PFIL_HOOKS option. SEE ALSO
bpf(4) HISTORY
The pfil interface first appeared in NetBSD 1.3. The pfil input and output lists were originally implemented as <sys/queue.h> LIST struc- tures; however this was changed in NetBSD 1.4 to TAILQ structures. This change was to allow the input and output filters to be processed in reverse order, to allow the same path to be taken, in or out of the kernel. The pfil interface was changed in 1.4T to accept a 3rd parameter to both pfil_add_hook() and pfil_remove_hook(), introducing the capability of per-protocol filtering. This was done primarily in order to support filtering of IPv6. In 1.5K, the pfil framework was changed to work with an arbitrary number of filtering points, as well as be less IP-centric. AUTHORS
The pfil interface was designed and implemented by Matthew R. Green, with help from Darren Reed, Jason R. Thorpe and Charles M. Hannum. Dar- ren Reed added support for IPv6 in addition to IPv4. Jason R. Thorpe added support for multiple hooks and other clean up. BUGS
The current pfil implementation will need changes to suit a threaded kernel model. BSD
January 8, 2006 BSD
All times are GMT -4. The time now is 09:58 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy