History log of /dragonfly/sys/netbt/bt_proto.c (Results 1 – 18 of 18)
Revision (<<< Hide revision tags) (Show revision tags >>>) Date Author Comments
# 8bc4b666 14-Nov-2023 Aaron LI <aly@aaronly.me>

Minor cleanups to 'sruct domain' definitions


Revision tags: v6.4.0, v6.4.0rc1, v6.5.0, v6.2.2, v6.2.1, v6.2.0, v6.3.0, v6.0.1, v6.0.0, v6.0.0rc1, v6.1.0, v5.8.3, v5.8.2, v5.8.1, v5.8.0, v5.9.0, v5.8.0rc1, v5.6.3, v5.6.2, v5.6.1, v5.6.0, v5.6.0rc1, v5.7.0, v5.4.3, v5.4.2, v5.4.1, v5.4.0, v5.5.0, v5.4.0rc1, v5.2.2, v5.2.1, v5.2.0, v5.3.0, v5.2.0rc, v5.0.2, v5.0.1, v5.0.0, v5.0.0rc2, v5.1.0, v5.0.0rc1, v4.8.1
# 2eb060ca 01-Aug-2017 Sepherosa Ziehau <sephe@dragonflybsd.org>

domain: Nuke pfslowtimo.


# d2a45df8 31-Jul-2017 Sepherosa Ziehau <sephe@dragonflybsd.org>

domain: Nuke pffasttimo


Revision tags: v4.8.0, v4.6.2, v4.9.0, v4.8.0rc
# 3091de50 17-Dec-2016 Matthew Dillon <dillon@apollo.backplane.com>

kernel - Tag vm_map_entry structure, slight optimization to zalloc, misc.

* Tag the vm_map_entry structure, allowing debugging programs to
break-down how KMEM is being used more easily.

This re

kernel - Tag vm_map_entry structure, slight optimization to zalloc, misc.

* Tag the vm_map_entry structure, allowing debugging programs to
break-down how KMEM is being used more easily.

This requires an additional argument to vm_map_find() and most
kmem_alloc*() functions.

* Remove the page chunking parameter to zinit() and zinitna(). It was
only being used degeneratively. Increase the chunking from one page
to four pages, which will reduce the amount of vm_map_entry spam in
the kernel_map.

* Use atomic ops when adjusting zone_kern_pages.

show more ...


Revision tags: v4.6.1, v4.6.0, v4.6.0rc2, v4.6.0rc, v4.7.0, v4.4.3, v4.4.2, v4.4.1, v4.4.0, v4.5.0, v4.4.0rc, v4.2.4, v4.3.1, v4.2.3, v4.2.1, v4.2.0, v4.0.6, v4.3.0, v4.2.0rc, v4.0.5, v4.0.4, v4.0.3, v4.0.2, v4.0.1, v4.0.0, v4.0.0rc3, v4.0.0rc2, v4.0.0rc, v4.1.0, v3.8.2, v3.8.1, v3.6.3, v3.8.0, v3.8.0rc2, v3.9.0, v3.8.0rc, v3.6.2, v3.6.1, v3.6.0, v3.7.1, v3.6.0rc, v3.7.0, v3.4.3, v3.4.2, v3.4.0, v3.4.1, v3.4.0rc, v3.5.0, v3.2.2, v3.2.1, v3.2.0, v3.3.0, v3.0.3, v3.0.2, v3.0.1, v3.1.0, v3.0.0
# 86d7f5d3 26-Nov-2011 John Marino <draco@marino.st>

Initial import of binutils 2.22 on the new vendor branch

Future versions of binutils will also reside on this branch rather
than continuing to create new binutils branches for each new version.


Revision tags: v2.12.0, v2.13.0, v2.10.1, v2.11.0, v2.10.0, v2.9.1, v2.8.2, v2.8.1, v2.8.0, v2.9.0, v2.6.3, v2.7.3, v2.6.2, v2.7.2, v2.7.1, v2.6.1, v2.7.0, v2.6.0, v2.5.1, v2.4.1, v2.5.0, v2.4.0
# 3d0fe62d 05-Sep-2009 Alexander Polakov <polachok@gmail.com>

netbt: add MODULE_VERSION

Reported-by: Rumko <rumcic@gmail.com>
DragonFly-bug: http://bugs.dragonflybsd.org/issue1487


Revision tags: v2.3.2, v2.3.1, v2.2.1
# f92bfd8c 20-Mar-2009 Sepherosa Ziehau <sephe@dragonflybsd.org>

netisr: Add pktinfo struct; add new netisr method to find msgport using pktinfo

The new netisr method, ni_mport_pktinfo, returns NULL if the passed in pktinfo
does not contain enough information to

netisr: Add pktinfo struct; add new netisr method to find msgport using pktinfo

The new netisr method, ni_mport_pktinfo, returns NULL if the passed in pktinfo
does not contain enough information to determine the msgport.

show more ...


Revision tags: v2.2.0, v2.3.0, v2.1.1
# 716da958 01-Nov-2008 Sepherosa Ziehau <sephe@dragonflybsd.org>

Install pr_ctlport for the rest of the protocols.

Reported-by: tomas@


# 95af0087 24-Sep-2008 Sepherosa Ziehau <sephe@dragonflybsd.org>

Add NETISR_FLAG_NOTMPSAFE, which could be used as the last parameter to
netisr_register(), more expressive and less error-prone than 0.

Suggested-by: hsu@


# 92db3805 23-Sep-2008 Sepherosa Ziehau <sephe@dragonflybsd.org>

Add following three network protocol threads running mode:
1) BGL (default)
2) Adaptive BGL. Protocol threads run without BGL by default. BGL will be
held if the received msg does not have MSGF_

Add following three network protocol threads running mode:
1) BGL (default)
2) Adaptive BGL. Protocol threads run without BGL by default. BGL will be
held if the received msg does not have MSGF_MPSAFE turned on the ms_flags
field
3) No BGL (experimental)

The code on the main path is done by dillon@

Following three sysctls and tunables are added to adjust the "mode":
net.netisr.mpsafe_thread
net.inet.tcp.mpsafe_thread
net.inet.udp.mpsafe_thread

They have same set of values,
0 (default) -- BGL
1 -- Adaptive BGL
2 -- No BGL



NETISR_FLAG_MPSAFE is added (netisr.ni_flags), so that:
- netisr_queue() and schednetisr() could set MSGF_MPSAFE during msg
initialization
- netisr_run() (called by ether_input_oncpu()) could hold BGL based on this flag
before calling netisr's handler



PR_MPSAFE is added (protosw.pr_flags), so that tranport_processing_oncpu() could
hold BGL before calling protocol's input handler



Kernel API changes:
- The thread parameter to netmsg_service_loop() must be supplied (running mode)
and it must have the type of "int *"
- netisr_register() takes additional flags parameter to indicate whether its
handler is MPSAFE (NETISR_FLAG_MPSAFE) or not

Reviewed-by: dillon@

show more ...


Revision tags: v2.0.1
# 0ca0cd25 20-Apr-2008 Sascha Wildner <swildner@dragonflybsd.org>

Another round of typo fixes (mostly in messages).


# 83aacede 18-Mar-2008 Hasso Tepper <hasso@dragonflybsd.org>

Sync Bluetooth stack with NetBSD.

Obtained-from: NetBSD via OpenBSD


# 9ce3a983 01-Feb-2008 Hasso Tepper <hasso@dragonflybsd.org>

Implement net.bluetooth sysctls.

Obtained-from: NetBSD


# 0a9108eb 30-Dec-2007 Hasso Tepper <hasso@dragonflybsd.org>

Kernel part of bluetooth stack ported by Dmitry Komissaroff. Very much work
in progress.

Obtained-from: NetBSD via OpenBSD


# c157ff7a 17-Jan-2011 Sascha Wildner <saw@online.de>

kernel: Use NELEM() where we can.


# 5179415a 02-Jan-2011 Sascha Wildner <saw@online.de>

bluetooth(4): Fix loading bluetooth without pf.

bluetooth(4) was previously using pf(4)'s pool_* macros. Now that pool_get()
has been turned into a function in pf(4), this is no longer possible, sin

bluetooth(4): Fix loading bluetooth without pf.

bluetooth(4) was previously using pf(4)'s pool_* macros. Now that pool_get()
has been turned into a function in pf(4), this is no longer possible, since
the bluetooth(4) module would have to depend on the pf(4) module for that.

To unbreak module loading, convert all calls to these macros to the zone(9)
calls which they really are.

show more ...


# 002c1265 14-Sep-2010 Matthew Dillon <dillon@apollo.backplane.com>

network - Major netmsg retooling, part 1

* Remove all the netmsg shims and make all pr_usrreqs and some proto->pr_*
requests directly netmsg'd.

* Fix issues with tcp implied connects and tcp6->tc

network - Major netmsg retooling, part 1

* Remove all the netmsg shims and make all pr_usrreqs and some proto->pr_*
requests directly netmsg'd.

* Fix issues with tcp implied connects and tcp6->tcp4 fallbacks with
implied connects.

* Fix an issue with a stack-based udp netmsg (allocate it)

* Consolidate struct ip6protosw and struct protosw into a single
structure and normalize the API functions which differed between
the two (primarily proto->pr_input()).

* Remove protosw->pr_soport()

* Replace varargs protocol *_input() functions (ongoing) with fixed
arguments.

show more ...


# c3c96e44 09-Sep-2010 Matthew Dillon <dillon@apollo.backplane.com>

network - Completely revamp the netisr / dispatch code

* All netisrs are dispatched MPSAFE (followup in later commits)

* Centralize the protocol threads. There is now just one thread
per cpu man

network - Completely revamp the netisr / dispatch code

* All netisrs are dispatched MPSAFE (followup in later commits)

* Centralize the protocol threads. There is now just one thread
per cpu managed by the netisr code. No more separate tcp/udp threads
on each cpu.

* Make the mbuf M_HASH/m_pkthdr.hash mechanic the central routing
mechanic for netmsgs.

* Remove the netisr ip_mport and pktinfo_portfn stuff and replace with a
cpufn function which handles M_HASH/m_pkthdr.hash when M_HASH is not
already set.

* Seriously clean up the packet input paths. Adjust ether_input_chain() and
friends to not have to adjust the mbuf forwards and backwards, instead
pass a header offset to the ni_cpufn function. The ip pullup and other
related code will use the offset to determine where the ip header is
within the packet.

show more ...