History log of /netbsd/sys/netinet/tcp_usrreq.c (Results 1 – 25 of 238)
Revision Date Author Comments
# da7deee6 04-Nov-2022 ozaki-r <ozaki-r@NetBSD.org>

inpcb: rename functions to in6pcb_*


# aea30c9a 04-Nov-2022 ozaki-r <ozaki-r@NetBSD.org>

inpcb: rename functions to inpcb_*

Inspired by rmind-smpnet patches.


# 74557efd 30-Oct-2022 ozaki-r <ozaki-r@NetBSD.org>

tcp: restore NULL check for inp in tcp_ctloutput


# 443b5cdb 29-Oct-2022 ozaki-r <ozaki-r@NetBSD.org>

tcp: restore NULL checks for inp


# a094f1a1 28-Oct-2022 ozaki-r <ozaki-r@NetBSD.org>

inpcb: separate inpcb again to reduce the size of PCB for IPv4

The data size of PCB for IPv4 increased because of the merge of
struct in6pcb. The change decreases the size to the original size by
s

inpcb: separate inpcb again to reduce the size of PCB for IPv4

The data size of PCB for IPv4 increased because of the merge of
struct in6pcb. The change decreases the size to the original size by
separating struct inpcb (again). struct in4pcb and in6pcb that embed
struct inpcb are introduced.

Even after the separation, users don't need to realize the separation
and only have to use some macros to access dedicated data. For example,
inp->inp_laddr is now accessed through in4p_laddr(inp).

show more ...


# 140683a5 28-Oct-2022 ozaki-r <ozaki-r@NetBSD.org>

inpcb: integrate data structures of PCB into one

Data structures of network protocol control blocks (PCBs), i.e.,
struct inpcb, in6pcb and inpcb_hdr, are not organized well. Users of
the data struc

inpcb: integrate data structures of PCB into one

Data structures of network protocol control blocks (PCBs), i.e.,
struct inpcb, in6pcb and inpcb_hdr, are not organized well. Users of
the data structures have to handle them separately and thus the code
is cluttered and duplicated.

The commit integrates the data structures into one, struct inpcb. As a
result, users of PCBs only have to handle just one data structure, so
the code becomes simple.

One drawback is that the data size of PCB for IPv4 increases by 40 bytes
(from 248 bytes to 288 bytes).

show more ...


# ba12e300 20-Sep-2022 ozaki-r <ozaki-r@NetBSD.org>

tcp: separate syn cache stuffs into tcp_syncache.[ch] files

No functional change.


# a47097a9 28-Jun-2022 riastradh <riastradh@NetBSD.org>

tcp(4): Bail early on sendoob if not connected.

XXX Not sure if testing tp->t_template is the right way to discern
this -- I just reached for it because the downstream crash is a panic
on tp->t_temp

tcp(4): Bail early on sendoob if not connected.

XXX Not sure if testing tp->t_template is the right way to discern
this -- I just reached for it because the downstream crash is a panic
on tp->t_template == NULL in tcp_output.

XXX In principle this could try connecting to the address, except
it's not passed down from the logic in uipc_socket.c to tcp_sendoob.

Reported-by: syzbot+a01f4cfec72790855ce2@syzkaller.appspotmail.com

show more ...


# 8f8e9b8f 04-Aug-2021 christos <christos@NetBSD.org>

Get the value of the right variable (from RVP)


# 416f8aa3 08-Mar-2021 christos <christos@NetBSD.org>

Remove the unused "addin" argument (it was always 0) and go back using
a random iss by default (instead of rfc1948)


# 32551e77 23-Nov-2020 chs <chs@NetBSD.org>

Restore correct functioning of SIOCATMARK by removing the previous
change that was done to fix poll(POLLPRI | POLLRDBAND) and instead
add a separate flag to track when poll() should indicate that a
M

Restore correct functioning of SIOCATMARK by removing the previous
change that was done to fix poll(POLLPRI | POLLRDBAND) and instead
add a separate flag to track when poll() should indicate that a
MSG_OOB byte is available. Re-fixes PR 54435 properly.

show more ...


# 370fd266 17-Oct-2020 mlelstv <mlelstv@NetBSD.org>

Fix RTT values reported by TCP_INFO.


# ff56aaba 13-Apr-2020 maxv <maxv@NetBSD.org>

hardclock_ticks -> getticks()


# 9dcd3d55 06-Aug-2019 riastradh <riastradh@NetBSD.org>

Clamp tcp timer quantities to reasonable ranges.

Reported-by: syzbot+259675123340bf46a6de@syzkaller.appspotmail.com


# d66cc9e4 05-Feb-2019 mrg <mrg@NetBSD.org>

adjust fallthru comments to appease gcc7.


# 60987e77 28-Jan-2019 martin <martin@NetBSD.org>

Fix memory leaks pointed out by Ilja Van Sprundel: all
sendoob() functions are expted to free both passed
mbuf chains.


# 65093efe 16-Dec-2018 christos <christos@NetBSD.org>

sbspace() does not return negative values anymore and that broke OOB data
sending. Instead of depending on negative values, account for the 1024
bytes sosend() adds so that it can use all the space h

sbspace() does not return negative values anymore and that broke OOB data
sending. Instead of depending on negative values, account for the 1024
bytes sosend() adds so that it can use all the space here in a separate
function sbspace_oob(). Idea from mlelstv@

show more ...


# 9aafe161 24-Nov-2018 maxv <maxv@NetBSD.org>

KNF, no functional change.


# 5c284c41 24-Nov-2018 maxv <maxv@NetBSD.org>

Fix kernel pointer leaks in sysctl_inpcblist.


# ddb4dac5 03-May-2018 maxv <maxv@NetBSD.org>

Remove now unused tcpip.h includes. Some were already unused before.


# c615b2fb 07-Apr-2018 maxv <maxv@NetBSD.org>

Remove dead code.


# 4b1d2aa0 29-Mar-2018 maxv <maxv@NetBSD.org>

Remove #ifdef INET. Same as tcp_input.c. Makes the code easier to
understand.

Also make tcp6_mtudisc() static in tcp_subr.c.


# f42ac775 15-Aug-2017 christos <christos@NetBSD.org>

add some more getsockopt(2) params


# af908aef 28-Jul-2017 maxv <maxv@NetBSD.org>

Remove TCP_COMPAT_42. This feature is a workaround for a bug in the TCP
stack of BSD4.2. Having such features just does not make any sense, and
looking at the code, I'm not sure it actually works.


# 58ebac21 24-Jan-2017 ozaki-r <ozaki-r@NetBSD.org>

Tweak softnet_lock and NET_MPSAFE

- Don't hold softnet_lock in some functions if NET_MPSAFE
- Add softnet_lock to sysctl_net_inet_icmp_redirtimeout
- Add softnet_lock to expire_upcalls of ip_mroute.

Tweak softnet_lock and NET_MPSAFE

- Don't hold softnet_lock in some functions if NET_MPSAFE
- Add softnet_lock to sysctl_net_inet_icmp_redirtimeout
- Add softnet_lock to expire_upcalls of ip_mroute.c
- Restore softnet_lock for in{,6}_pcbpurgeif{,0} if NET_MPSAFE
- Mark some softnet_lock for future work

show more ...


12345678910