summaryrefslogtreecommitdiffstats
path: root/sys/netinet/tcp_reass.c
Commit message (Expand)AuthorAgeFilesLines
* Convert if (tp->t_state == TCPS_LISTEN) panic() into a KASSERT.rwatson2005-10-191-4/+2
* Remove a KASSERT in the sack path that fails because of a interactionps2005-08-241-3/+0
* Add socketoption IP_MINTTL. May be used to set the minimum acceptableandre2005-08-221-0/+5
* Fix for a bug in newreno partial ack handling where if a large amountps2005-07-051-1/+5
* Fix for a bug in the change that defers sack option processing untilps2005-07-011-2/+4
* Fix for a SACK crash caused by a bug in tcp_reass(). tcp_reass()ps2005-07-011-1/+3
* Fix ipfw packet matching errors with address tables.simon2005-06-291-1/+1
* - Postpone SACK option processing until after PAWS checks. SACK optionps2005-06-271-20/+16
* Fix a timer ticks wrap around bug for minmssoverload processing.ups2005-06-251-1/+1
* Assert that tcbinfo is locked in tcp_input() before calling intorwatson2005-06-011-1/+9
* Assert the tcbinfo lock whenever tcp_close() is to be called byrwatson2005-06-011-0/+11
* This is conform with the terminology inps2005-05-251-4/+3
* When looking for the next hole to retransmit from the scoreboard,ps2005-05-111-4/+5
* Fix for a TCP SACK bug where more than (win/2) bytes could have beenps2005-04-141-1/+21
* - Tighten up the Timestamp checks to prevent a spoofed segment fromps2005-04-101-3/+23
* - If the reassembly queue limit was reached or if we couldn't allocateps2005-04-101-1/+3
* Remove 2 (SACK) fields from the tcpcb. These are only used by aps2005-02-171-5/+2
* Fix for a SACK (receiver) bug where incorrect SACK blocks areps2005-02-161-4/+5
* - Retransmit just one segment on initiation of SACK recovery.ps2005-02-141-11/+1
* /* -> /*- for license, minor formatting changesimp2005-01-071-1/+1
* Add a sysctl (net.inet.tcp.insecure_rst) which allows one to specifysilby2005-01-031-1/+7
* In the dropafterack case of tcp_input(), it's OK to release the TCPrwatson2004-12-251-1/+1
* Revert parts of tcp_input.c:1.255 associated with the header predictedrwatson2004-12-251-2/+7
* Assert the inpcb lock in tcp_xmit_timer() as it performs read-modify-rwatson2004-11-281-0/+2
* Expand coverage of the receive socket buffer lock when handling urgentrwatson2004-11-281-2/+3
* Fix a problem where our TCP stack would ignore RST packets if the receivesilby2004-11-251-2/+3
* In tcp_reass(), assert the inpcb lock on the passed tcpcb, since therwatson2004-11-231-12/+19
* tcp_timewait() performs multiple non-atomic reads on the tcptwrwatson2004-11-231-0/+4
* Remove "Unlocked read" annotations associated with previously unlockedrwatson2004-11-221-3/+0
* Do some re-sorting of TCP pcbinfo locking and assertions: make sure torwatson2004-11-071-6/+5
* Remove RFC1644 T/TCP support from the TCP side of the network stack.andre2004-11-021-202/+10
* - Estimate the amount of data in flight in sack recovery and use itps2004-10-051-3/+9
* Convert ipfw to use PFIL_HOOKS. This is change is transparent to userlandandre2004-08-171-7/+19
* White space cleanup for netinet before branch:rwatson2004-08-161-57/+57
* After each label in tcp_input(), assert the inpcbinfo and inpcb lockrwatson2004-07-121-1/+17
* On receiving 3 duplicate acknowledgements, SACK recovery was not being entere...jayanth2004-07-011-7/+20
* Reduce the number of unnecessary unlock-relocks on socket buffer mutexesrwatson2004-06-261-8/+13
* White space & spelling fixesps2004-06-251-3/+3
* Broaden scope of the socket buffer lock when processing an ACK so thatrwatson2004-06-241-2/+4
* Protect so_oobmark with with SOCKBUF_LOCK(&so->so_rcv), and broadenrwatson2004-06-241-4/+3
* Introduce sbreserve_locked(), which asserts the socket buffer lock onrwatson2004-06-241-2/+6
* Add support for TCP Selective Acknowledgements. The work for thisps2004-06-231-16/+77
* Assert the inpcb lock before letting MAC check whether we can deliverrwatson2004-06-201-0/+1
* Fix build for IPSEC && !INET6bms2004-06-161-3/+6
* Grab the socket buffer send or receive mutex when performing arwatson2004-06-151-1/+4
* The socket field so_state is used to hold a variety of socket relatedrwatson2004-06-141-5/+5
* Socket MAC labels so_label and so_peerlabel are now protected byrwatson2004-06-131-0/+2
* Rename m_claim_next_hop() to m_claim_next(), as suggested by Max Laier.darrenr2004-05-021-1/+1
* oops, I forgot this file in a prior commit (change was still sitting here,darrenr2004-05-021-1/+1
* Tighten up reset handling in order to make reset attacks as difficult assilby2004-04-261-0/+10
OpenPOWER on IntegriCloud