History log of /netbsd-src/sys/netinet/tcp_usrreq.c (Results 1 – 25 of 238)
Revision Date Author Comments
# b000e63f 04-Nov-2022 ozaki-r <ozaki-r@NetBSD.org>

inpcb: rename functions to in6pcb_*


# 2ba9f052 04-Nov-2022 ozaki-r <ozaki-r@NetBSD.org>

inpcb: rename functions to inpcb_*

Inspired by rmind-smpnet patches.


# 72e94eff 30-Oct-2022 ozaki-r <ozaki-r@NetBSD.org>

tcp: restore NULL check for inp in tcp_ctloutput


# 20dda336 29-Oct-2022 ozaki-r <ozaki-r@NetBSD.org>

tcp: restore NULL checks for inp


# a071c829 28-Oct-2022 ozaki-r <ozaki-r@NetBSD.org>

inpcb: separate inpcb again to reduce the size of PCB for IPv4

The data size of PCB for IPv4 increased because of the merge of
struct in6pcb. The change decreases the size to the original size by
s

inpcb: separate inpcb again to reduce the size of PCB for IPv4

The data size of PCB for IPv4 increased because of the merge of
struct in6pcb. The change decreases the size to the original size by
separating struct inpcb (again). struct in4pcb and in6pcb that embed
struct inpcb are introduced.

Even after the separation, users don't need to realize the separation
and only have to use some macros to access dedicated data. For example,
inp->inp_laddr is now accessed through in4p_laddr(inp).

show more ...


# 0e390eee 28-Oct-2022 ozaki-r <ozaki-r@NetBSD.org>

inpcb: integrate data structures of PCB into one

Data structures of network protocol control blocks (PCBs), i.e.,
struct inpcb, in6pcb and inpcb_hdr, are not organized well. Users of
the data struc

inpcb: integrate data structures of PCB into one

Data structures of network protocol control blocks (PCBs), i.e.,
struct inpcb, in6pcb and inpcb_hdr, are not organized well. Users of
the data structures have to handle them separately and thus the code
is cluttered and duplicated.

The commit integrates the data structures into one, struct inpcb. As a
result, users of PCBs only have to handle just one data structure, so
the code becomes simple.

One drawback is that the data size of PCB for IPv4 increases by 40 bytes
(from 248 bytes to 288 bytes).

show more ...


# 3761620b 20-Sep-2022 ozaki-r <ozaki-r@NetBSD.org>

tcp: separate syn cache stuffs into tcp_syncache.[ch] files

No functional change.


# 9515e062 28-Jun-2022 riastradh <riastradh@NetBSD.org>

tcp(4): Bail early on sendoob if not connected.

XXX Not sure if testing tp->t_template is the right way to discern
this -- I just reached for it because the downstream crash is a panic
on tp->t_temp

tcp(4): Bail early on sendoob if not connected.

XXX Not sure if testing tp->t_template is the right way to discern
this -- I just reached for it because the downstream crash is a panic
on tp->t_template == NULL in tcp_output.

XXX In principle this could try connecting to the address, except
it's not passed down from the logic in uipc_socket.c to tcp_sendoob.

Reported-by: syzbot+a01f4cfec72790855ce2@syzkaller.appspotmail.com

show more ...


# 72e6c96f 04-Aug-2021 christos <christos@NetBSD.org>

Get the value of the right variable (from RVP)


# 2f7bd770 08-Mar-2021 christos <christos@NetBSD.org>

Remove the unused "addin" argument (it was always 0) and go back using
a random iss by default (instead of rfc1948)


# 1777f82f 23-Nov-2020 chs <chs@NetBSD.org>

Restore correct functioning of SIOCATMARK by removing the previous
change that was done to fix poll(POLLPRI | POLLRDBAND) and instead
add a separate flag to track when poll() should indicate that a
M

Restore correct functioning of SIOCATMARK by removing the previous
change that was done to fix poll(POLLPRI | POLLRDBAND) and instead
add a separate flag to track when poll() should indicate that a
MSG_OOB byte is available. Re-fixes PR 54435 properly.

show more ...


# 77730fa8 17-Oct-2020 mlelstv <mlelstv@NetBSD.org>

Fix RTT values reported by TCP_INFO.


# 983fd9cc 13-Apr-2020 maxv <maxv@NetBSD.org>

hardclock_ticks -> getticks()


# 4952945b 06-Aug-2019 riastradh <riastradh@NetBSD.org>

Clamp tcp timer quantities to reasonable ranges.

Reported-by: syzbot+259675123340bf46a6de@syzkaller.appspotmail.com


# c9d1af0f 05-Feb-2019 mrg <mrg@NetBSD.org>

adjust fallthru comments to appease gcc7.


# dc194ae5 28-Jan-2019 martin <martin@NetBSD.org>

Fix memory leaks pointed out by Ilja Van Sprundel: all
sendoob() functions are expted to free both passed
mbuf chains.


# 5d8a69c4 16-Dec-2018 christos <christos@NetBSD.org>

sbspace() does not return negative values anymore and that broke OOB data
sending. Instead of depending on negative values, account for the 1024
bytes sosend() adds so that it can use all the space h

sbspace() does not return negative values anymore and that broke OOB data
sending. Instead of depending on negative values, account for the 1024
bytes sosend() adds so that it can use all the space here in a separate
function sbspace_oob(). Idea from mlelstv@

show more ...


# a5b7737f 24-Nov-2018 maxv <maxv@NetBSD.org>

KNF, no functional change.


# 15cc93be 24-Nov-2018 maxv <maxv@NetBSD.org>

Fix kernel pointer leaks in sysctl_inpcblist.


# 5d73803e 03-May-2018 maxv <maxv@NetBSD.org>

Remove now unused tcpip.h includes. Some were already unused before.


# 47f098b7 07-Apr-2018 maxv <maxv@NetBSD.org>

Remove dead code.


# 6ad323e9 29-Mar-2018 maxv <maxv@NetBSD.org>

Remove #ifdef INET. Same as tcp_input.c. Makes the code easier to
understand.

Also make tcp6_mtudisc() static in tcp_subr.c.


# f6b050ef 15-Aug-2017 christos <christos@NetBSD.org>

add some more getsockopt(2) params


# 0e2173f7 28-Jul-2017 maxv <maxv@NetBSD.org>

Remove TCP_COMPAT_42. This feature is a workaround for a bug in the TCP
stack of BSD4.2. Having such features just does not make any sense, and
looking at the code, I'm not sure it actually works.


# 9e8d969c 24-Jan-2017 ozaki-r <ozaki-r@NetBSD.org>

Tweak softnet_lock and NET_MPSAFE

- Don't hold softnet_lock in some functions if NET_MPSAFE
- Add softnet_lock to sysctl_net_inet_icmp_redirtimeout
- Add softnet_lock to expire_upcalls of ip_mroute.

Tweak softnet_lock and NET_MPSAFE

- Don't hold softnet_lock in some functions if NET_MPSAFE
- Add softnet_lock to sysctl_net_inet_icmp_redirtimeout
- Add softnet_lock to expire_upcalls of ip_mroute.c
- Restore softnet_lock for in{,6}_pcbpurgeif{,0} if NET_MPSAFE
- Mark some softnet_lock for future work

show more ...


12345678910