FreeBSD/src 4a77657sbin/ipfw ipfw2.c, sys/netpfil/ipfw ip_fw_sockopt.c ip_fw_compat.c

ipfw: migrate ipfw to 32-bit size rule numbers

This changes ABI due to the changed opcodes and includes the
following:
 * rule numbers and named object indexes converted to 32-bits
 * all hardcoded maximum rule number was replaced with
   IPFW_DEFAULT_RULE macro
 * now it is possible to grow maximum numbers or rules in
   build time
 * several opcodes converted to ipfw_insn_u32 to keep rulenum:
   O_CALL, O_SKIPTO
 * call stack modified to keep u32 rulenum. The behaviour of
   O_CALL opcode was changed to avoid possible packets looping.
   Now when call stack is overflowed or mbuf tag allocation
   failed, a packet will be dropped instead of skipping to next
   rule.
 * 'return' action now have two modes to specify return point:
   'next-rulenum' and 'next-rule'
 * new lookup key added for O_IP_DST_LOOKUP opcode 'lookup rulenum'

    [21 lines not shown]
DeltaFile
+624-1,581sys/netpfil/ipfw/ip_fw_sockopt.c
+714-0sys/netpfil/ipfw/ip_fw_compat.c
+411-186sbin/ipfw/ipfw2.c
+85-400sys/netpfil/ipfw/ip_fw_table.c
+293-180sys/netpfil/ipfw/ip_fw2.c
+271-119sys/netpfil/ipfw/nat64/nat64lsn.c
+2,398-2,46629 files not shown
+3,418-3,26135 files

FreeBSD/src b0f2df4lib/libc/sys getsockopt.2, sys/kern uipc_socket.c

socket: Add an option to retrieve a socket's FIB number

The SO_SETFIB option can be used to set a socket's FIB number, but there
is no way to retrieve it.  Rename SO_SETFIB to SO_FIB and implement a
handler for it for getsockopt(2).

Reviewed by:    glebius
MFC after:      2 weeks
Sponsored by:   Klara, Inc.
Sponsored by:   Stormshield
Differential Revision:  https://reviews.freebsd.org/D48834

(cherry picked from commit ee951eb59f2136a604e3fbb12abf8d8344da0c99)
DeltaFile
+6-0sys/kern/uipc_socket.c
+2-2lib/libc/sys/getsockopt.2
+2-1sys/sys/socket.h
+10-33 files

FreeBSD/src ee951eblib/libsys getsockopt.2, sys/kern uipc_socket.c

socket: Add an option to retrieve a socket's FIB number

The SO_SETFIB option can be used to set a socket's FIB number, but there
is no way to retrieve it.  Rename SO_SETFIB to SO_FIB and implement a
handler for it for getsockopt(2).

Reviewed by:    glebius
MFC after:      2 weeks
Sponsored by:   Klara, Inc.
Sponsored by:   Stormshield
Differential Revision:  https://reviews.freebsd.org/D48834
DeltaFile
+6-0sys/kern/uipc_socket.c
+2-2lib/libsys/getsockopt.2
+2-1sys/sys/socket.h
+10-33 files

FreeBSD/src 4425d92sys/sys socket.h

socket: Move SO_SPLICE next to other socket option constants

Reviewed by:    markj
Differential Revision:  https://reviews.freebsd.org/D47626

(cherry picked from commit 48a88a4ee95a725a435a817401ea4c0d9c990cd1)
DeltaFile
+1-1sys/sys/socket.h
+1-11 files

FreeBSD/src 48a88a4sys/sys socket.h

socket: Move SO_SPLICE next to other socket option constants

Reviewed by:    markj
Differential Revision:  https://reviews.freebsd.org/D47626
DeltaFile
+1-1sys/sys/socket.h
+1-11 files

FreeBSD/src 93ff7dblib/libc/sys getsockopt.2, sys/kern uipc_socket.c uipc_sockbuf.c

socket: Implement SO_SPLICE

This is a feature which allows one to splice two TCP sockets together
such that data which arrives on one socket is automatically pushed into
the send buffer of the spliced socket.  This can be used to make TCP
proxying more efficient as it eliminates the need to copy data into and
out of userspace.

The interface is copied from OpenBSD, and this implementation aims to be
compatible.  Splicing is enabled by setting the SO_SPLICE socket option.
When spliced, data that arrives on the receive buffer is automatically
forwarded to the other socket.  In particular, splicing is a
unidirectional operation; to splice a socket pair in both directions,
SO_SPLICE needs to be applied to both sockets.  More concretely, when
setting the option one passes the following struct:

    struct splice {
            int fd;
            off_t max;

    [41 lines not shown]
DeltaFile
+698-4sys/kern/uipc_socket.c
+61-1lib/libc/sys/getsockopt.2
+47-2sys/sys/socketvar.h
+32-2sys/kern/uipc_sockbuf.c
+12-0sys/sys/socket.h
+2-1sys/sys/sockbuf.h
+852-101 files not shown
+854-107 files

FreeBSD/src a1da7dclib/libsys getsockopt.2, sys/kern uipc_socket.c uipc_sockbuf.c

socket: Implement SO_SPLICE

This is a feature which allows one to splice two TCP sockets together
such that data which arrives on one socket is automatically pushed into
the send buffer of the spliced socket.  This can be used to make TCP
proxying more efficient as it eliminates the need to copy data into and
out of userspace.

The interface is copied from OpenBSD, and this implementation aims to be
compatible.  Splicing is enabled by setting the SO_SPLICE socket option.
When spliced, data that arrives on the receive buffer is automatically
forwarded to the other socket.  In particular, splicing is a
unidirectional operation; to splice a socket pair in both directions,
SO_SPLICE needs to be applied to both sockets.  More concretely, when
setting the option one passes the following struct:

    struct splice {
            int fd;
            off_t max;

    [39 lines not shown]
DeltaFile
+698-4sys/kern/uipc_socket.c
+61-1lib/libsys/getsockopt.2
+47-2sys/sys/socketvar.h
+32-2sys/kern/uipc_sockbuf.c
+12-0sys/sys/socket.h
+2-1sys/sys/sockbuf.h
+852-101 files not shown
+854-107 files

FreeBSD/src 1f155d4include/ssp socket.h, lib/libc/tests/secure fortify_socket_test.c generate-fortify-tests.lua

include: ssp: fortify <sys/socket.h>

The entire recv*() implementation set is ripe for opportunities to
validate, so do what we can with what we have.

Reviewed by:    markj
Sponsored by:   Klara, Inc.
Sponsored by:   Stormshield
Differential Revision:  https://reviews.freebsd.org/D45686
DeltaFile
+1,817-0lib/libc/tests/secure/fortify_socket_test.c
+239-0lib/libc/tests/secure/generate-fortify-tests.lua
+119-0include/ssp/socket.h
+45-0lib/libc/tests/secure/fortify_select_test.c
+45-0lib/libc/tests/secure/fortify_poll_test.c
+45-0lib/libc/tests/secure/fortify_random_test.c
+2,310-014 files not shown
+2,641-720 files

FreeBSD/src 3fa9578sys/sys socket.h

sockets: define shutdown(2) constants in cpp namespace

There is software that uses SHUT_RD, SHUT_WR as preprocessor defines and
its build was broken by enum declaration.  Keep the enum, but provide
defines to propagate the constants to cpp namespace.

PR:             277994
PR:             277995
Fixes:          c3276e02beab825824e3147b31af33af66298430
DeltaFile
+3-0sys/sys/socket.h
+3-01 files

FreeBSD/src d62c460sys/kern uipc_socket.c, sys/netinet in_pcb.c tcp_offload.h

sockets: remove unused KPIs to manipulate sockets

These KPIs were added in dd0e6c383a9f0 and through 15 years had zero use.
They slightly remind what IfAPI does for struct ifnet.  But IfAPI does
that for the sake of large collection of NIC drivers not being aware of
struct ifnet.  For the sockets it is unclear what could be a large
collection of externally written kernel modules that need extensively use
sockets and not be aware of their internals at the same time. This
isolation of a structure knowledge requires a lot of work, and just
throwing in a few KPIs isn't helpful.

Reviewed by:            kib, olce, markj
Differential Revision:  https://reviews.freebsd.org/D44311
DeltaFile
+0-101sys/kern/uipc_socket.c
+0-23sys/sys/socket.h
+0-7sys/netinet/in_pcb.c
+2-0sys/netinet/tcp_offload.h
+1-0sys/netinet/tcp_fastopen.h
+3-1315 files

FreeBSD/src 5bba272sys/dev/hyperv/hvsock hv_sock.c, sys/kern uipc_usrreq.c uipc_socket.c

sockets: make pr_shutdown fully protocol specific method

Disassemble a one-for-all soshutdown() into protocol specific methods.
This creates a small amount of copy & paste, but makes code a lot more
self documented, as protocol specific method would execute only the code
that is relevant to that protocol and nothing else.  This also fixes a
couple recent regressions and reduces risk of future regressions.  The
extended KPI for the new pr_shutdown removes need for the extra pr_flush
which was added for the sake of SCTP which could not perform its shutdown
properly with the old one.  Particularly for SCTP this change streamlines
a lot of code.

Some notes on why certain parts of code were copied or were not to certain
protocols:
* The (SS_ISCONNECTED | SS_ISCONNECTING | SS_ISDISCONNECTING) check is
  needed only for those protocols that may be connected or disconnected.
* The above reduces into only SS_ISCONNECTED for those protocols that
  always connect instantly.
* The ENOTCONN and continue processing hack is left only for datagram

    [16 lines not shown]
DeltaFile
+91-100sys/netinet/sctp_usrreq.c
+56-9sys/kern/uipc_usrreq.c
+45-19sys/netinet/tcp_usrreq.c
+6-47sys/kern/uipc_socket.c
+23-23sys/dev/hyperv/hvsock/hv_sock.c
+34-8sys/netinet/udp_usrreq.c
+255-20610 files not shown
+311-23816 files

FreeBSD/src c3276e0sys/kern uipc_socket.c uipc_syscalls.c, sys/sys socket.h socketvar.h

sockets: make shutdown(2) how argument a enum

Reviwed by:             tuexen
Differential Revision:  https://reviews.freebsd.org/D43412
DeltaFile
+5-3sys/sys/socket.h
+1-4sys/kern/uipc_socket.c
+3-0sys/kern/uipc_syscalls.c
+2-1sys/sys/socketvar.h
+11-84 files

FreeBSD/src 29363fbsys/libkern bcopy.c, sys/rpc rpcb_clnt.c rpcb_prot.c

sys: Remove ancient SCCS tags.

Remove ancient SCCS tags from the tree, automated scripting, with two
minor fixup to keep things compiling. All the common forms in the tree
were removed with a perl script.

Sponsored by:           Netflix
DeltaFile
+0-6sys/libkern/bcopy.c
+0-6sys/rpc/rpcb_clnt.c
+0-5sys/rpc/rpcb_prot.c
+0-5sys/rpc/clnt_vc.c
+0-5sys/rpc/clnt_bck.c
+0-4sys/rpc/rpc_callmsg.c
+0-31622 files not shown
+0-1,332628 files

FreeBSD/src 4b40a16sys/amd64/amd64 apic_vector.S atpic_vector.S, sys/amd64/include asm.h cpu.h

sys: Remove $FreeBSD$: one-line .h pattern

Remove /^\s*\*+\s*\$FreeBSD\$.*$\n/

Similar commit in current:
(cherry picked from commit 2ff63af9b88c)
DeltaFile
+0-1sys/netinet6/in6.h
+0-1sys/amd64/amd64/apic_vector.S
+0-1sys/amd64/amd64/atpic_vector.S
+0-1sys/amd64/include/asm.h
+0-1sys/amd64/include/cpu.h
+0-1sys/amd64/include/exec.h
+0-6903 files not shown
+0-909909 files

FreeBSD/src 2ff63afsys/dev/pms/RefTisa/sallsdk/spc saglobal.h sahwreg.h

sys: Remove $FreeBSD$: one-line .h pattern

Remove /^\s*\*+\s*\$FreeBSD\$.*$\n/
DeltaFile
+0-1sys/dev/pms/RefTisa/sallsdk/spc/saglobal.h
+0-1sys/dev/pms/RefTisa/sallsdk/spc/sahwreg.h
+0-1sys/dev/pms/RefTisa/sallsdk/spc/sallist.h
+0-1sys/dev/pms/RefTisa/sallsdk/spc/samacro.h
+0-1sys/dev/pms/RefTisa/sallsdk/spc/sampidefs.h
+0-1sys/dev/pms/RefTisa/sallsdk/spc/saproto.h
+0-6739 files not shown
+0-745745 files

FreeBSD/src 7ecc03csys/sys socket.h

netlink: add AF_NETLINK / PF_NETLINK definitions

Reviewed by:    glebius
Differential Revision: https://reviews.freebsd.org/D36174
MFC after:      1 weeks

(cherry picked from commit a4b8c6d9d50ec03f490587854ec82c9790193f46)
DeltaFile
+2-0sys/sys/socket.h
+2-01 files

FreeBSD/src b6a816fsys/netinet in_pcb.c, sys/sys socket.h

inpcb: garbage collect so_sototcpcb()

It had very little use and required inpcb layer to know tcpcb.
DeltaFile
+0-7sys/netinet/in_pcb.c
+0-1sys/sys/socket.h
+0-82 files

FreeBSD/src 8624f43share/man/man4 divert.4, sys/kern uipc_socket.c

divert: declare PF_DIVERT domain and stop abusing PF_INET

The divert(4) is not a protocol of IPv4.  It is a socket to
intercept packets from ipfw(4) to userland and re-inject them
back.  It can divert and re-inject IPv4 and IPv6 packets today,
but potentially it is not limited to these two protocols.  The
IPPROTO_DIVERT does not belong to known IP protocols, it
doesn't even fit into u_char.  I guess, the implementation of
divert(4) was done the way it is done basically because it was
easier to do it this way, back when protocols for sockets were
intertwined with IP protocols and domains were statically
compiled in.

Moving divert(4) out of inetsw accomplished two important things:

1) IPDIVERT is getting much closer to be not dependent on INET.
   This will be finalized in following changes.
2) Now divert socket no longer aliases with raw IPv4 socket.
   Domain/proto selection code won't need a hack for SOCK_RAW and

    [5 lines not shown]
DeltaFile
+23-15share/man/man4/divert.4
+14-9sys/netinet/ip_divert.c
+6-14sys/netinet6/in6_mcast.c
+6-14sys/netinet/in_mcast.c
+11-0sys/kern/uipc_socket.c
+3-4usr.bin/netstat/inet.c
+63-565 files not shown
+74-6311 files

FreeBSD/src a4b8c6dsys/sys socket.h

netlink: add AF_NETLINK / PF_NETLINK definitions

Reviewed by:    glebius
Differential Revision: https://reviews.freebsd.org/D36174
MFC after:      1 weeks
DeltaFile
+2-0sys/sys/socket.h
+2-01 files

FreeBSD/src 79669b0sys/kern uipc_socket.c, sys/sys ktls.h socket.h

uipc_socket.c: Modify MSG_TLSAPPDATA to only do Alert Records

Without this patch, the MSG_TLSAPPDATA flag would cause
soreceive_generic() to return ENXIO for any non-application
data record in a TLS receive stream.

This works ok for TLS1.2, since Alert records appear to be
the only non-application data records received.
However, for TLS1.3, there can be post-handshake handshake
records, such as NewSessionKey sent to the client from the
server. These handshake records cannot be handled by the
upcall which does an SSL_read() with length == 0.

It appears that the client can simply throw away these
NewSessionKey records, but to do so, it needs to receive
them within the kernel.

This patch modifies the semantics of MSG_TLSAPPDATA slightly,
so that it only applies to Alert records and not Handshake

    [3 lines not shown]
DeltaFile
+4-4sys/kern/uipc_socket.c
+2-0sys/sys/ktls.h
+1-1sys/sys/socket.h
+7-53 files

FreeBSD/src 3735113sys/kern uipc_socket.c, sys/sys ktls.h socket.h

uipc_socket.c: Modify MSG_TLSAPPDATA to only do Alert Records

Without this patch, the MSG_TLSAPPDATA flag would cause
soreceive_generic() to return ENXIO for any non-application
data record in a TLS receive stream.

This works ok for TLS1.2, since Alert records appear to be
the only non-application data records received.
However, for TLS1.3, there can be post-handshake handshake
records, such as NewSessionKey sent to the client from the
server. These handshake records cannot be handled by the
upcall which does an SSL_read() with length == 0.

It appears that the client can simply throw away these
NewSessionKey records, but to do so, it needs to receive
them within the kernel.

This patch modifies the semantics of MSG_TLSAPPDATA slightly,
so that it only applies to Alert records and not Handshake

    [5 lines not shown]
DeltaFile
+4-4sys/kern/uipc_socket.c
+2-0sys/sys/ktls.h
+1-1sys/sys/socket.h
+7-53 files

FreeBSD/src 664077elib/libc/sys getsockopt.2, sbin/route route.c

socket: Implement SO_RERROR

SO_RERROR indicates that receive buffer overflows should be handled as
errors. Historically receive buffer overflows have been ignored and
programs could not tell if they missed messages or messages had been
truncated because of overflows. Since programs historically do not
expect to get receive overflow errors, this behavior is not the
default.

This is really really important for programs that use route(4) to keep
in sync with the system. If we loose a message then we need to reload
the full system state, otherwise the behaviour from that point is
undefined and can lead to chasing bogus bug reports.

Reviewed by:    philip (network), kbowling (transport), gbe (manpages)
MFC after:      2 weeks
Differential Revision:  https://reviews.freebsd.org/D26652

(cherry picked from commit 7045b1603bdf054145dd958a4acc17b410fb62a0)
DeltaFile
+22-8sys/kern/uipc_socket.c
+24-0sys/kern/uipc_sockbuf.c
+12-1sbin/route/route.c
+6-5sys/net/raw_usrreq.c
+5-5sys/netipsec/keysock.c
+9-1lib/libc/sys/getsockopt.2
+78-2015 files not shown
+100-3521 files

FreeBSD/src f452713lib/libc/sys getsockopt.2, sbin/route route.c

socket: Implement SO_RERROR

SO_RERROR indicates that receive buffer overflows should be handled as
errors. Historically receive buffer overflows have been ignored and
programs could not tell if they missed messages or messages had been
truncated because of overflows. Since programs historically do not
expect to get receive overflow errors, this behavior is not the
default.

This is really really important for programs that use route(4) to keep
in sync with the system. If we loose a message then we need to reload
the full system state, otherwise the behaviour from that point is
undefined and can lead to chasing bogus bug reports.

Reviewed by:    philip (network), kbowling (transport), gbe (manpages)
MFC after:      2 weeks
Differential Revision:  https://reviews.freebsd.org/D26652

(cherry picked from commit 7045b1603bdf054145dd958a4acc17b410fb62a0)
DeltaFile
+22-8sys/kern/uipc_socket.c
+24-0sys/kern/uipc_sockbuf.c
+12-1sbin/route/route.c
+6-5sys/net/raw_usrreq.c
+5-5sys/netipsec/keysock.c
+9-1lib/libc/sys/getsockopt.2
+78-2015 files not shown
+100-3521 files

FreeBSD/src 7045b16lib/libc/sys getsockopt.2, sbin/route route.c

socket: Implement SO_RERROR

SO_RERROR indicates that receive buffer overflows should be handled as
errors. Historically receive buffer overflows have been ignored and
programs could not tell if they missed messages or messages had been
truncated because of overflows. Since programs historically do not
expect to get receive overflow errors, this behavior is not the
default.

This is really really important for programs that use route(4) to keep
in sync with the system. If we loose a message then we need to reload
the full system state, otherwise the behaviour from that point is
undefined and can lead to chasing bogus bug reports.

Reviewed by:    philip (network), kbowling (transport), gbe (manpages)
MFC after:      2 weeks
Differential Revision:  https://reviews.freebsd.org/D26652
DeltaFile
+22-8sys/kern/uipc_socket.c
+24-0sys/kern/uipc_sockbuf.c
+12-1sbin/route/route.c
+6-5sys/net/raw_usrreq.c
+5-5sys/netipsec/keysock.c
+9-1lib/libc/sys/getsockopt.2
+78-2015 files not shown
+100-3521 files

FreeBSD/src 924d1c9lib/libc/sys getsockopt.2, sbin/route route.c

Revert "SO_RERROR indicates that receive buffer overflows should be handled as errors."
Wrong version of the change was pushed inadvertenly.

This reverts commit 4a01b854ca5c2e5124958363b3326708b913af71.
DeltaFile
+8-22sys/kern/uipc_socket.c
+0-24sys/kern/uipc_sockbuf.c
+1-12sbin/route/route.c
+5-6sys/net/raw_usrreq.c
+1-9lib/libc/sys/getsockopt.2
+5-5sys/netipsec/keysock.c
+20-7815 files not shown
+35-10021 files

FreeBSD/src 4a01b85lib/libc/sys getsockopt.2, sbin/route route.c

SO_RERROR indicates that receive buffer overflows should be handled as errors.
Historically receive buffer overflows have been ignored and programs
could not tell if they missed messages or messages had been truncated
because of overflows. Since programs historically do not expect to get
receive overflow errors, this behavior is not the default.

This is really really important for programs that use route(4) to keep in sync
with the system. If we loose a message then we need to reload the full system
state, otherwise the behaviour from that point is undefined and can lead
to chasing bogus bug reports.
DeltaFile
+22-8sys/kern/uipc_socket.c
+24-0sys/kern/uipc_sockbuf.c
+12-1sbin/route/route.c
+6-5sys/net/raw_usrreq.c
+5-5sys/netipsec/keysock.c
+9-1lib/libc/sys/getsockopt.2
+78-2015 files not shown
+100-3521 files

FreeBSD/src ede4af4 (r367776)share/man/man4 unix.4, sys/compat/linux linux_socket.c

unix(4): Enhance LOCAL_CREDS_PERSISTENT ABI

As this ABI is still fresh (r367287), let's correct some mistakes now:

- Version the structure to allow for future changes
- Include sender's pid in control message structure
- Use a distinct control message type from the cmsgcred / sockcred mess

Discussed with: kib, markj, trasz
Differential Revision:  https://reviews.freebsd.org/D27084
DeltaFile
+42-17sys/kern/uipc_usrreq.c
+36-1share/man/man4/unix.4
+18-1sys/sys/socket.h
+13-0sys/compat/linux/linux_socket.c
+109-194 files

FreeBSD/src fedeb08 (r366390)sys/net/route nhgrp_ctl.c nhgrp.c, usr.bin/netstat nhgrp.c

Introduce scalable route multipath.

This change is based on the nexthop objects landed in D24232.

The change introduces the concept of nexthop groups.
Each group contains the collection of nexthops with their
 relative weights and a dataplane-optimized structure to enable
 efficient nexthop selection.

Simular to the nexthops, nexthop groups are immutable. Dataplane part
 gets compiled during group creation and is basically an array of
 nexthop pointers, compiled w.r.t their weights.

With this change, `rt_nhop` field of `struct rtentry` contains either
 nexthop or nexthop group. They are distinguished by the presense of
 NHF_MULTIPATH flag.
All dataplane lookup functions returns pointer to the nexthop object,
leaving nexhop groups details inside routing subsystem.


    [37 lines not shown]
DeltaFile
+788-0sys/net/route/nhgrp_ctl.c
+355-0usr.bin/netstat/nhgrp.c
+344-0sys/net/route/nhgrp.c
+202-73sys/net/route/route_ctl.c
+165-0sys/net/route/mpath_ctl.c
+164-0sys/net/route/route_helpers.c
+2,018-7327 files not shown
+2,433-24433 files

FreeBSD/src f6e54eb (r365223)sys/sys buf_ring.h pmc.h

sys: clean up empty lines in .c and .h files
DeltaFile
+5-7sys/sys/buf_ring.h
+1-10sys/sys/pmc.h
+0-10sys/sys/cdio.h
+4-4sys/sys/endian.h
+0-6sys/sys/sysproto.h
+1-5sys/sys/ata.h
+11-4250 files not shown
+21-11056 files

FreeBSD/src e251528 (r364886)contrib/llvm-project/llvm/lib/Analysis/models/inliner saved_model.pbtxt, contrib/llvm-project/llvm/lib/Target/Hexagon HexagonDepIICScalar.td

MFH

Sponsored by:   Rubicon Communications, LLC (netgate.com)
DeltaFile
+35,376-0sys/contrib/openzfs/include/sys/u8_textprep_data.h
+32,634-0contrib/llvm-project/llvm/lib/Analysis/models/inliner/saved_model.pbtxt
+27,826-0sys/contrib/openzfs/module/zstd/lib/zstd.c
+9,980-9,250contrib/sqlite3/sqlite3.c
+10,565-0sys/contrib/openzfs/module/zfs/arc.c
+6,876-3,589contrib/llvm-project/llvm/lib/Target/Hexagon/HexagonDepIICScalar.td
+123,257-12,83911,178 files not shown
+1,373,540-560,26311,184 files