| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
| |
we don't currently set, but might in the future.
|
|
|
|
|
| |
Reviewed by: Andras Olah
Obtained from: 4.4BSD-lite2 via W. Richard Stevens
|
|
|
|
|
|
|
|
|
| |
or ssthresh that we were able to use
tcp_var.h - declare tcpstat entries for above; declare tcp_{send,recv}space
in_rmx.c - fill in the MTU and pipe sizes with the defaults TCP would have
used anyway in the absence of values here
|
|
|
|
|
|
| |
know better when to cache values in the route, rather than relying on a
heuristic involving sequence numbers that broke when tcp_sendspace
was increased to 16k.
|
|
|
|
|
|
|
|
| |
its connection parameters, we want to keep statistics on how often this
actually happens to see whether there is any work that needs to be done in
TCP itself.
Suggested by: John Wroclawski <jtw@lcs.mit.edu>
|
|
|
|
| |
and in_pcblookuphash.
|
|
|
|
|
|
| |
(except in netccitt, netiso and netns) and most of the warnings from
`gcc -Wnested-externs'. Fix all the bugs found. There were no serious
ones.
|
| |
|
|
|
|
| |
completeness.
|
|
|
|
| |
bogus commons declared in header files.
|
|
|
|
|
|
|
|
|
| |
Bob Braden <braden@isi.edu>.
NB: This has not had David's TCP ACK hack re-integrated. It is not clear
what the correct solution to this problem is, if any. If a better solution
doesn't pop up in response to this message, I'll put David's code back in
(or he's welcome to do so himself).
|
| |
|
| |
|
|
|
|
| |
Submitted by: Paul
|
| |
|
|
|